Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,206,524 papers from all fields of science
Search
Sign In
Create Free Account
Bit manipulation
Known as:
Bit twiddle
, Bit twisting
, Bit twiddling
Expand
Bit manipulation is the act of algorithmically manipulating bits or other pieces of data shorter than a word. Computer programming tasks that require…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
34 relations
Algorithm
Assembly language
BIT predicate
Bit array
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
New Symmetric Key Cryptographic Algorithm Using Combined Bit Manipulation And MSA Encryption Algorithm: NJJSAA Symmetric Key Algorithm
B. Nagar
2013
Corpus ID: 61319372
In the present work the authors have introduced a new advanced symmetric key cryptographic method called NJJSAA. The authors…
Expand
2012
2012
P8P Parallel Phase Change Memory (PCM) data sheet
2012
Corpus ID: 32673472
Features • High-performance READ – 115ns initial READ access – 135ns initial READ access – 25ns, 8-word asynchronous-page READ…
Expand
2012
2012
Pixel bit manipulation for encoded hiding — An inherent stego
S. Janakiraman
,
A. Mary
,
J. Chakravarthy
,
Rengarajan Amirtharajan
,
K. Thenmozhi
,
J. Rayappan
International Conference on Computational…
2012
Corpus ID: 14192294
Steganography is a science dealing with the hiding of the secured information in a harmless signal. The information may be…
Expand
Highly Cited
2011
Highly Cited
2011
New Symmetric Key Cryptographic Algorithm Using Combined Bit Manipulation and MSA Encryption Algorithm: NJJSAA Symmetric Key Algorithm
Neeraj Khanna
,
J. Nath
,
Joel James
,
Sayantan Chakraborty
,
A. Chakrabarti
,
A. Nath
International Conference on Communication Systems…
2011
Corpus ID: 45219711
In the present work the authors have introduced a new advanced symmetric key cryptographic method called NJJSAA. The authors…
Expand
2009
2009
A New Basis for Shifters in General-Purpose Processors for Existing and Advanced Bit Manipulations
Yedidya Hilewitz
,
R. Lee
IEEE transactions on computers
2009
Corpus ID: 846522
This paper describes a new basis for the implementation of the shifter functional unit in microprocessors that can implement new…
Expand
2008
2008
Bit manipulation techniques for LDPC coding in OFDM
T. Salamon
,
O. Amrani
IEEE Convention of Electrical and Electronics…
2008
Corpus ID: 22223174
This work considers a wireless OFDM system employing a short-length, regular, low density parity check code (LDPC) when only…
Expand
2007
2007
Upper and Lower Bounds on the Number of Solutions
Jean-Phillipe Martin
2007
Corpus ID: 123404314
We present a fast an extensible algorithm for computing upper and lower bounds on the number of solutions to a system of…
Expand
2006
2006
Advanced Bit Manipulation Instruction Set Architecture
Yedidya Hilewitz
,
R. Lee
,
P. Architecture
2006
Corpus ID: 250820
Microprocessor instruction set architectures currently offer support for operations on full processor words and, more recently…
Expand
1977
1977
Fault Tree Analysis Using Bit Manipulation
D. Wheeler
,
Jason S. Hsuan
,
R. R. Duersch
,
Glenn M. Roe
IEEE Transactions on Reliability
1977
Corpus ID: 2619169
This paper describes an efficient technique for computerized fault-tree analysis. The technique is based upon binary coding of…
Expand
1976
1976
The automatic recognition of silicon gate transistor geometries: An LSI design aid program
I. Dobes
,
Ron Byrd
Design Automation Conference
1976
Corpus ID: 37603403
This paper describes a computer program (SIGAP) that analyzes digitized LSI mask data for valid and invalid Silicon Gate…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE