The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Karl C. Posch: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. P. Lippitsch, Karl C. Posch, Reinhard Posch
    Multiplication as Parallel as Possible. [Citation Graph (0, 0)][DBLP]
    ACPC, 1991, pp:350-358 [Conf]
  2. Karl C. Posch
    Objektigeneratoren zur Echtzeitdarstellung von Dreiecken. [Citation Graph (0, 0)][DBLP]
    Austrographics, 1988, pp:139-153 [Conf]
  3. Herbert Leitold, Wolfgang Mayerwieser, Udo Payer, Karl C. Posch, Reinhard Posch, Johannes Wolkerstorfer
    A 155 Mbps Triple-DES Network Encryptor. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:164-174 [Conf]
  4. Herbert Leitold, Karl C. Posch, Reinhard Posch
    ISDN Security services. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:21-35 [Conf]
  5. Herbert Leitold, Wolfgang Mayerwieser, Udo Payer, Karl C. Posch, Reinhard Posch, Johannes Wolkerstorfer
    Robustness-Agile Encryptor for ATM Networks. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:231-240 [Conf]
  6. Karl C. Posch, Reinhard Posch
    Residue Number Systems: A Key to Parallelism in Public Key Cryptography. [Citation Graph (0, 0)][DBLP]
    SPDP, 1992, pp:432-435 [Conf]
  7. Karl C. Posch
    Blocktransferprozessor: Echtzeitdarstellung alphanumerischer Bilder in CEPT-Kodierung. [Citation Graph (0, 0)][DBLP]
    Visualisierungstechniken und Algorithmen, 1988, pp:119-134 [Conf]
  8. Johann Großschädl, Karl C. Posch, Stefan Tillich
    Architectural Enhancements to Support Digital Signal Processing and Public-Key Cryptography. [Citation Graph (0, 0)][DBLP]
    WISES, 2004, pp:129-143 [Conf]
  9. Karl C. Posch
    Proceedings of the 1988 IEEE International Conference on Computer Design: VLSI in Computers and Processors : IEEE Computer Society Press, Los Alamitos, CA, USA (1988) 618pp. [Citation Graph (0, 0)][DBLP]
    Computer-Aided Design, 1990, v:22, n:4, pp:254- [Journal]
  10. J. Schwemmlein, Karl C. Posch, Reinhard Posch
    RNS-modulo reduction upon a restricted base value set and its applicability to RSA cryptography. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:7, pp:637-650 [Journal]
  11. Wolfgang Mayerwieser, Karl C. Posch, Reinhard Posch, Volker Schindler
    Testing a High-Speed Data Path: The Design of the RSAs Crypto Chip. [Citation Graph (0, 0)][DBLP]
    J. UCS, 1995, v:1, n:11, pp:728-743 [Journal]
  12. Karl C. Posch, Dieter W. Fellner
    The circle-brush algorithm. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Graph., 1989, v:8, n:1, pp:1-24 [Journal]
  13. Karl C. Posch, Reinhard Posch
    Modulo Reduction in Residue Number Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 1995, v:6, n:5, pp:449-454 [Journal]

Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002