Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

8-bit

Known as: X86-8, 8-bit computer, 8-bit (disambiguation) 
In computer architecture, 8-bit integers, memory addresses, or other data units are those that are at most 8 bits (1 octet) wide. Also, 8-bit CPU and… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
The state-of-the-art hardware platforms for training deep neural networks are moving from traditional single precision (32-bit… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2015
Highly Cited
2015
This paper presents new speed records for 128-bit secure elliptic-curve Diffie–Hellman key-exchange software on three different… Expand
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2013
Highly Cited
2013
This paper presents first results of the Networking and Cryptography library (NaCl) on the 8-bit AVR family of microcontrollers… Expand
  • table 1
Is this relevant?
Highly Cited
2011
Highly Cited
2011
This paper presents an asynchronous SAR ADC for flexible, low energy radios. To achieve excellent power efficiency for a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
Highly Cited
2008
Highly Cited
2008
In this paper, we propose a new descriptor for texture classification that is robust to image blurring. The descriptor utilizes… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Strong public-key cryptography is often considered to be too computationally expensive for small devices if not accelerated by… Expand
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Twofish is a 128-bit block cipher that accepts a variable-length key up to 256 bits. The cipher is a 16-round Feistel network… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
1998
Highly Cited
1998
The audio watermarking method presented below offers copyright protection to an audio signal by modifying its temporal… Expand
Is this relevant?
Highly Cited
1993
Highly Cited
1993
Blowfish, a new secret-key block cipher, is proposed. It is a Feistel network, iterating a simple encryption function 16 times… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 7
Is this relevant?