Skip to search formSkip to main contentSkip to account menu

8-bit

Known as: X86-8, 8-bit computer, 8-bit (disambiguation) 
In computer architecture, 8-bit integers, memory addresses, or other data units are those that are at most 8 bits (1 octet) wide. Also, 8-bit CPU and… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
The state-of-the-art hardware platforms for training deep neural networks are moving from traditional single precision (32-bit… 
Highly Cited
2018
Highly Cited
2018
Quantized Neural Networks (QNNs) are often used to improve network efficiency during the inference phase, i.e. after the network… 
Highly Cited
2018
Highly Cited
2018
Hardware acceleration of Deep Neural Networks (DNNs) aims to tame their enormous compute intensity. Fully realizing the potential… 
Highly Cited
2015
Highly Cited
2015
This paper presents new speed records for 128-bit secure elliptic-curve Diffie–Hellman key-exchange software on three different… 
Highly Cited
2011
Highly Cited
2011
This paper presents an asynchronous SAR ADC for flexible, low energy radios. To achieve excellent power efficiency for a… 
Highly Cited
2010
Highly Cited
2010
This note describes laser fault experiments on an 8-bit 0.35μm microcontroller with no countermeasures. We show that reproducible… 
Highly Cited
2004
Highly Cited
2004
Strong public-key cryptography is often considered to be too computationally expensive for small devices if not accelerated by… 
Highly Cited
2000
Highly Cited
2000
This paper describes an 8-bit 5-stage pipelined and interleaved analog-to-digital converter that performs analog processing only… 
Highly Cited
1998
Highly Cited
1998
Twofish is a 128-bit block cipher that accepts a variable-length key up to 256 bits. The cipher is a 16-round Feistel network… 
Highly Cited
1993
Highly Cited
1993
  • B. Schneier
  • Fast Software Encryption Workshop
  • 1993
  • Corpus ID: 15840323
Blowfish, a new secret-key block cipher, is proposed. It is a Feistel network, iterating a simple encryption function 16 times…