In computing, the most significant bit (MSB, also called the high-order bit) is the bit position in a binary number having the greatest value. The… (More)

Semantic Scholar uses AI to extract papers important to this topic.

2014

2014

- Saruchi, Ivan Morel, Damien Stehlé, Gilles Villard
- ISSAC
- 2014

Let <i>B</i> be a basis of a Euclidean lattice, and B an approximation thereof. We give a sufficient condition on the closeness… (More)

Is this relevant?

2010

2010

- Jean-Charles Faugère, Raphaël Marinier, Guénaël Renault
- Public Key Cryptography
- 2010

We study the problem of integer factoring given implicit information of a special kind. The problem is as follows: let N1 = p1q1… (More)

Is this relevant?

2009

2009

- Fu Bing, Zhou Xiansan
- 2009 International Conference on Image Analysis…
- 2009

Information hiding techniques have received much attention in the fields of the copyright protection and covert communication etc… (More)

Is this relevant?

2008

2008

- Beate Bollig, Jochen Klump
- Theory of Computing Systems
- 2008

Integer multiplication as one of the basic arithmetic functions has been in the focus of several complexity theoretical… (More)

Is this relevant?

2008

2008

- M.A. Mehrabi, H. Aghaeinia, M. Abolghasemi
- 2008 International Symposium on…
- 2008

This paper proposed a new steganalysis scheme of LSB-matching steganography based on statistical moments of the DFT of histogram… (More)

Is this relevant?

2008

2008

- Mojtaba Abolghasemi, H. Aghainia, Karim Faez, Mohammad Ali Mehrabi
- 2008 International Conference on Intelligent…
- 2008

In this paper we present a novel LSB matching steganalysis method based on feature vectors derived from co-occurrence matrix in… (More)

Is this relevant?

2008

2008

- Beate Bollig
- TAMC
- 2008

Integer multiplication as one of the basic arithmetic functions has been in the focus of several complexity theoretical… (More)

Is this relevant?

2002

2002

- Igor E. Shparlinski
- Inf. Process. Lett.
- 2002

Boneh and Venkatesan have recently proposed a polynomial time algorithm for recovering a “hidden” element α of a finite field Fp… (More)

Is this relevant?

Highly Cited

1999

Highly Cited

1999

- Charles Lynn
- IEEE Journal on Selected Areas in Communications
- 1999

The Border Gateway Protocol (BGP), which is used to distribute routing information between autonomous systems (ASes), is a… (More)

Is this relevant?

Highly Cited

1995

Highly Cited

1995

- Paul E. Landman, Jan M. Rabaey
- IEEE Trans. VLSI Syst.
- 1995

This paper describes a novel strategy for generating accurate black-box models of datapath power consumption at the architecture… (More)

Is this relevant?