Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,097,439 papers from all fields of science
Search
Sign In
Create Free Account
Bit-length
Known as:
Bit length
Bit-length is the number of binary digits, called bits, necessary to represent an integer in the binary number system. At their most fundamental…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Analog signal
Binary code
Canonical Huffman code
Key (cryptography)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
A NOVEL PSYCHOVISUAL MODEL ON A STANDARD RESOLUTION FOR VIDEO COMPRESSION
N. A. Abu
,
A. Basari
,
B. Hussin
2016
Corpus ID: 189800860
A psychoacoustic model is well established in an audio coding. A psychoacoustic quite threshold is a basic tool on audio coding…
Expand
2008
2008
A New Blind Signature Scheme Based On Factoring and Discrete Logarithms
N. Tahat
,
E. S. Ismail
,
R. Ahmad
2008
Corpus ID: 9265632
Blind signature scheme, an important cryptographic primitive, is useful in protocols that guarantee the anonymity of the…
Expand
2008
2008
Error detection and concealment for video transmission using information hiding
A. Yılmaz
,
Aydin Alatan
Signal processing. Image communication
2008
Corpus ID: 205393686
2007
2007
Computational efficiency analysis of Wu et al.'s fast modular multi-exponentiation algorithm
Da-Zhi Sun
,
Jin-Peng Huai
,
Ji-zhou Sun
,
Jiawan Zhang
Applied Mathematics and Computation
2007
Corpus ID: 31239654
2007
2007
A Robust GF(p) Parallel Arithmetic Unit for Public Key Cryptography
Santosh K. Ghosh
,
Monjur Alam
,
I. Sengupta
,
D. R. Chowdhury
Euromicro Symposium on Digital Systems Design
2007
Corpus ID: 14524299
This paper presents the architecture and FPGA implementation of a robust GF(p) parallel arithmetic unit. The most efficient…
Expand
2006
2006
Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution
Satoshi Obana
,
Toshinori Araki
International Conference on the Theory and…
2006
Corpus ID: 2819406
We consider the problem of cheating in secret sharing schemes, cheating in which individuals submit forged shares in the secret…
Expand
2004
2004
Effect of island geometry on the replay signal in patterned media storage
P. Nutter
,
D. M. McKirdy
,
Barry K. Middleton
,
David T. Wilton
,
H. Shute
IEEE transactions on magnetics
2004
Corpus ID: 26010885
In a move to extend the storage capabilities of magnetic storage systems beyond 1 Tb/in/sup 2/, the use of patterned media has…
Expand
2004
2004
Accelerating network security services with fast packet classification
S. Shieh
,
Fu-Yuan Lee
,
Ya-Wen Lin
Computer Communications
2004
Corpus ID: 5979967
1999
1999
A concept of designing cheater identification methods for secret sharing
Ren-Junn Hwang
,
Wei-Bin Lee
,
Chinchen Chang
Journal of Systems and Software
1999
Corpus ID: 8397666
1997
1997
Dynamic operand interchange for low power
Taekyoon Ahn
,
Kiyoung Choi
1997
Corpus ID: 14650262
Power consumption of an execution unit can be reduced by interchanging its two input operands. A dynamic operand interchange…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE