13 papers
12 files
14 references

Papers Referenced in This Repository

Module-Lattice-Based Key-Encapsulation Mechanism Standard

National Institute of Standards and Technology (US)
2024
2 references

A key-encapsulation mechanism (KEM) is a set of algorithms that, under certain conditions, can be used by two parties to establish a shared secret key over a public channel. A shared secret key that is securely established using a KEM can then be used with symmetric-key cryptographic algorithms to p...

Show 2 references in code

The keyed-hash message authentication code (HMAC)

2008
1 reference

This Standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative Approved cryptographic hash function, in combination with a shared secret key. [Supersedes FIPS 198 (March 2002)]

Show 1 reference in code

SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

National Institute of Standards and Technology (US)
2015
1 reference
Show 1 reference in code

SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash, and ParallelHash

John Kelsey, Shu-jen Change, Ray Perlner
2016
1 reference

The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's measurement and standards infrastructure.ITL develops tests, test methods, reference data, proof of...

Show 1 reference in code

The Least Weight Subsequence Problem (Extended Abstract)

D. Hirschberg, L. Larmore
1985
1 reference

The least weight subsequence (LWS) problem is introduced, and is shown to be equivalent to the classic minimum path problem for directed graphs. A special case of the LWS problem is shown to be solvable in O(n log n) time generally and, for certain weight functions, in linear time. A number of appli...

Show 1 reference in code

Optimization of cyclic redundancy-check codes with 24 and 32 parity bits

G. Castagnoli, Sascha Brauer, M. Herrmann
1993
2 references

The method developed by T. Fujiwara et al. (1985) for efficiently computing the minimum distance of shortened Hamming codes using the weight distribution of their dual codes is extended to treat arbitrary shortened cyclic codes. Using this method implemented on a high-speed special-purpose processor...

Show 1 reference in code

32-bit cyclic redundancy codes for Internet applications

P. Koopman
2002
2 references

Standardized 32-bit Cyclic Redundancy Codes provide fewer bits of guaranteed error detection than they could, achieving a Hamming Distance (HD) of only 4 for maximum-length Ethernet messages, whereas HD=6 is possible. Although research has revealed improved codes, exploring the entire design space h...

Show 1 reference in code

Ryū: fast float-to-string conversion

Ulf Adams
2018
4 references

We present Ryū, a new routine to convert binary floating point numbers to their decimal representations using only fixed-size integer operations, and prove its correctness. Ryū is simpler and approximately three times faster than the previously fastest implementation.

Show 1 reference in code

Faster Remainder by Direct Computation: Applications to Compilers and Software Libraries

D. Lemire, Owen Kaser, Nathan Kurz
2019
2 references

On common processors, integer multiplication is many times faster than integer division. Dividing a numerator n by a divisor d is mathematically equivalent to multiplication by the inverse of the divisor (n / d = n x 1/d). If the divisor is known in advance---or if repeated integer divisions will be...

Show 1 reference in code

Unveiling and Vanquishing Goroutine Leaks in Enterprise Microservices: A Dynamic Analysis Approach

Georgian-Vlad Saioc, Dmitriy Shirchenko, Milind Chabbi
2023
1 reference

Go is a modern programming language gaining popularity in enterprise microservice systems. Concurrency is a first-class citizen in Go with lightweight “goroutines” as the building blocks of concurrent execution. Go advocates message-passing to communicate and synchronize among goroutines. Improper u...

Show 1 reference in code

GoBench: A Benchmark Suite of Real-World Go Concurrency Bugs

Ting Yuan, Guangwei Li, Jie Lu, Chen Liu, Lian Li, Jingling Xue
2021
1 reference

Go, a fast growing programming language, is often considered as “the programming language of the cloud”. The language provides a rich set of synchronization primitives, making it easy to write concurrent programs with great parallelism. However. the rich set of primitives also introduces many bugs. ...

Show 1 reference in code
Show 1 reference in code

Euclidean Affine Functions and Applications to Calendar Algorithms

Cassio Neri, Lorenz Schneider
2021
5 references

We study properties of Euclidean affine functions (EAFs), namely those of the form $f(r) = (α\cdot r + β)/δ$, and their closely related expression $\mathring{f}(r) = (α\cdot r + β)\%δ$, where $r$, $α$, $β$ and $δ$ are integers, and where $/$ and $\%$ respectively denote the quotient and remainder of...

Show 1 reference in code
Link copied to clipboard!