1992
DOI: 10.1109/78.149994
|View full text |Cite
|
Sign up to set email alerts
|

Autocorrelation analysis of speech signals using Fermat number transform (FNT)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…Moreover, for the reason that NTT can compute the circular convolutions without truncation error and with only few multiplications, the algorithm named Winograd number theoretic transform algorithm (WNTA) was proposed by Bailey (1977). By exploiting the WNTA, people could significantly extend the length of data sequence as well as the width of data quantisation bit, which must be much larger than those of conventional fast NTTs, such as the Fermat number transform (FNT) (Boussakta & Holt, 1989;Xu, Dai & Lee, 1992). Besides, since WNTA is similar as the WFTA in the arithmetic, we can extend the convolution length in the number theory field by employing the 2-D transform of NTT.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, for the reason that NTT can compute the circular convolutions without truncation error and with only few multiplications, the algorithm named Winograd number theoretic transform algorithm (WNTA) was proposed by Bailey (1977). By exploiting the WNTA, people could significantly extend the length of data sequence as well as the width of data quantisation bit, which must be much larger than those of conventional fast NTTs, such as the Fermat number transform (FNT) (Boussakta & Holt, 1989;Xu, Dai & Lee, 1992). Besides, since WNTA is similar as the WFTA in the arithmetic, we can extend the convolution length in the number theory field by employing the 2-D transform of NTT.…”
Section: Introductionmentioning
confidence: 99%
“…The FFT architectures for NTT were proposed more than three decades ago [6], and extensively found for DSP applications in the literature [7], [8], [9]. However, the existing methods are not suitable of cryptographic applications.…”
Section: Introductionmentioning
confidence: 99%