The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase RSA-encryption (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-1997 (17) 1998-2002 (21) 2003-2005 (19) 2006-2008 (16) 2009-2018 (17) 2019-2022 (7)
Publication types (Num. hits)
article(24) inproceedings(73)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 86 occurrences of 72 keywords

Results
Found 97 publication records. Showing 97 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
75Jakob Jonsson, Burton S. Kaliski Jr. On the Security of RSA Encryption in TLS. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF key encapsulation, RSA encryption, TLS
70Ulrich Kühn 0001 Side-Channel Attacks on Textbook RSA and ElGamal Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF RSA encryption, Side-channel attack, ElGamal encryption
62David Pointcheval New Public Key Cryptosystems Based on the Dependent-RSA Problems. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF the Dependent-RSA Problem, Public-Key Encryption, Semantic Security, Chosen-Ciphertext Attacks
62Josef Pieprzyk, David Pointcheval Josef Pieprzyk, David Pointcheval. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF privacy, authentication, parallelization, Signcryption
60Sattar J. Aboud, Mohammad Ahmed Al-Fayoumi, Mustafa Al-Fayoumi, Haidar S. Jabbar An Efficient RSA Public Key Encryption Scheme. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RSA public encryption scheme, square matrices, general linear group, digital signature scheme
58Amos Fiat Batch RSA. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
48Dan Boneh, Antoine Joux, Phong Q. Nguyen Why Textbook ElGamal and RSA Encryption Are Insecure. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
46Benny Chor, Oded Goldreich 0001 RSA/Rabin Least Significant Bits are 1/2 + 1/(poly(log N)) Secure. Search on Bibsonomy CRYPTO The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
38Apostolos P. Fournaris, Odysseas G. Koufopavlou A new RSA encryption architecture and hardware implementation based on optimized Montgomery multiplication. Search on Bibsonomy ISCAS (5) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Nick A. Moldovyan New Public Key Cryptosystems Based on Difficulty of Factorization and Discrete Logarithm Problems. Search on Bibsonomy IF&GIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF public encryption, Digital signature, public key cryptosystem, key agreement protocol
36Kaoru Kurosawa, Toshihiko Matsuo How to Remove MAC from DHIES. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF DHIES, hybrid encryption scheme
34Jonathan Katz Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A. Mollin (Chapman & Hall/CRC Press, 2003); Foundations of Cryptography, vol. 1: Basic Tools by O. Goldreich, (Cambridge University Press, 2001). Search on Bibsonomy SIGACT News The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Ping Li 0034, Yaping Lin A Protocol for Designated Confirmer Signatures Based on RSA Cryptographic Algorithms. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Vlastimil Klíma, Tomás Rosa Further Results and Considerations on Side Channel Attacks on RSA. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
34Mihir Bellare, Phillip Rogaway The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin. Search on Bibsonomy EUROCRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
32Guillaume Barbu FA-LLLing for RSA: Lattice-based Fault Attacks against RSA Encryption and Signature. Search on Bibsonomy FDTC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
31Wenbo Mao Timed-Release Cryptography. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
31Christophe Coupé, Phong Q. Nguyen, Jacques Stern The Effectiveness of Lattice Attacks Against Low-Exponent RSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
31Koji Nakano, Kensuke Kawakami, Koji Shigemoto RSA encryption and decryption using the redundant number system on the FPGA. Search on Bibsonomy IPDPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Glenn A. Orton, M. P. Roy, P. Andrew Scott, Lloyd E. Peppard, Stafford E. Tavares VLSI Implementation of Public-Key Encryption Algorithms. Search on Bibsonomy CRYPTO The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
26Keklik Alptekin Bayam, Siddika Berna Örs Differential Power Analysis resistant hardware implementation of the RSA cryptosystem. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Jean-Sébastien Coron, David Naccache, Yvo Desmedt, Andrew M. Odlyzko, Julien P. Stern Index Calculation Attacks on RSA Signature and Encryption. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptanalsis, Index Calculation, ISO 9796, RSA, smoothness, signature, forgery
26Yi Wang, Zhiping Tan Modified RSA Encryption Algorithm Based on Chaos and Its Application in Voice Encryption System. Search on Bibsonomy CIS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Wenhe Fang, Guohe Li, Weijiang Wu, Yunfeng Hong, Xiaoming Zhou 面向Android的RSA算法优化与二维码加密防伪系统设计 (Optimization of RSA Encryption Algorithm for Android Mobile Phone and Design of QR Code Encryption Security System). Search on Bibsonomy 计算机科学 The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume A Black Hen Lays White Eggs. Search on Bibsonomy CARDIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF double-size technique, RSA, smartcard, Montgomery multiplication, efficient implementation
24Ernest F. Brickell A Survey of Hardware Implementation of RSA (Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
22Johan Håstad, Mats Näslund The security of all RSA and discrete log bits. Search on Bibsonomy J. ACM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF RSA-encryption, bit-security, complexity, Cryptography, discrete logarithms
22Johann Großschädl The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF RSA/spl gamma/ crypto-chip, RSA encryption scheme, hardware performance, long-integer modular arithmetic, private key operations, multiplier architecture, high-speed hardware accelerator, reconfigurable multiplier datapath, word-serial multiplier, modular reduction method, multiplier core, decryption rate, 200 MHz, 560 kbit/s, 2 Mbit/s, parallelism, pipelining, public key cryptography, reconfigurable architectures, clocks, Chinese Remainder Theorem, microprocessor chips, multiplying circuits, modular multiplications, modular exponentiations, pipeline arithmetic, clock frequency
22Peter Kornerup A Systolic, Linear-Array Multiplier for a Class of Right-Shift Algorithms. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1994 DBLP  DOI  BibTeX  RDF systolic linear-array multiplier, right-shift algorithms, multiplier cell, digit-product terms, least significant digit first, active elements, module-multiplier, Montgomery module-reduction, RSA encryption, modular division, cryptography, logic design, systolic arrays, systolic array, digital arithmetic, multiplying circuits, latches, modular inverses, Hensel codes, digit-serial multiplier
22Lein Harn, David Huang A Protocol for Establishing Secure Communication Channels in a Large Network. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF secure communication channels, open media, large distributed network, data attack vulnerability, data encryption/decryption techniques, secret session key, locally trusted centers, public-key distribution, RSA encryption scheme, authentication, protocols, protocol, computer networks, public key cryptography, security of data, key distribution, information access, data storage, data transformation, telecommunication channels, multi-user system, knowledge exchange
19Yongdong Wu, Feng Bao 0001 Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Vlastimil Klíma, Ondrej Pokorný, Tomás Rosa Attacking RSA-Based Sessions in SSL/TLS. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Johann Großschädl High-Speed RSA Hardware Based on Barret's Modular Reduction Method. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF RSA algorithm, partial parallel multiplier, full-custom VLSI design, pipelining, Public-key cryptography, modular arithmetic
19Priyadharshini Kaliyamoorthy, Aroul Canessane Ramalingam Security in Data Sharing for Blockchain-Intersected IoT Using Novel Chaotic-RSA Encryption. Search on Bibsonomy Int. J. Inf. Secur. Priv. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Ibrahim F. Elashry Cryptanalysis of Jain-Singh's identity-based RSA encryption. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Huifang Wang, Kang Zhou, Gexiang Zhang, Prithwineel Paul, Yingying Duan, Huaqing Qi, Haina Rong Application of Weighted Spiking Neural P Systems with Rules on Synapses for Breaking RSA Encryption. Search on Bibsonomy Int. J. Unconv. Comput. The full citation details ... 2020 DBLP  BibTeX  RDF
19Zhibo Wang, Wei Ma, Bei Gong An Attack Scheme of RSA Encryption System with Protocol Failure. Search on Bibsonomy SmartBlock The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Danenkov Ilya, Alexey A. Margun, Radda A. Iureva, Artem Kremlev Protected Control System with RSA Encryption. Search on Bibsonomy KES-AMSTA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Salma Ezziri, Omar Khadir Amelioration of a proxy signature using RSA encryption. Search on Bibsonomy NISS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Yang Liu, Shanyu Tang, Ran Liu, Liping Zhang 0003, Zhao Ma Secure and robust digital image watermarking scheme using logistic and RSA encryption. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Feng-Hsiag Hsiao Chaotic synchronization cryptosystems combined with RSA encryption algorithm. Search on Bibsonomy Fuzzy Sets Syst. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Said E. El-Khamy, Noha O. Korany, Marwa H. El-Sherif A security enhanced robust audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and RSA encryption. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Bei Cao, Tianliang Xu, Pengfei Wu RSA Encryption Algorithm Design and Verification Based on Verilog HDL. Search on Bibsonomy MLICOM (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Xu Bai, Lei Jiang 0003, Xinxing Liu, Jianlong Tan RSA Encryption/Decryption Implementation Based on Zedboard. Search on Bibsonomy ISCTCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Chu-Hsing Lin, Jung-Chun Liu, Cheng-Chieh Li, Po-Wei Chu Parallel Modulus Operations in RSA Encryption by CPU/GPU Hybrid Computation. Search on Bibsonomy AsiaJCIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Shugang Wei An RSA encryption implementation method using residue signed-digit arithmetic circuits. Search on Bibsonomy BMEI The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
19Bo Song, Kensuke Kawakami, Koji Nakano, Yasuaki Ito An RSA Encryption Hardware Algorithm using a Single DSP Block and a Single Block RAM on the FPGA. Search on Bibsonomy Int. J. Netw. Comput. The full citation details ... 2011 DBLP  BibTeX  RDF
19Loránd Szöllösi, Tamás Marosits, Gábor Fehér Accelerating RSA Encryption Using Random Precalculations. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2010 DBLP  BibTeX  RDF
19Andrzej Chmielowiec Fixed points of the RSA encryption algorithm. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
19Bo Song, Kensuke Kawakami, Koji Nakano, Yasuaki Ito An RSA Encryption Hardware Algorithm Using a Single DSP Block and a Single Block RAM on the FPGA. Search on Bibsonomy ICNC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
19Meng Haoyu The Study of the Electronic Gift Certificate System Based on 3G Mobile and RSA Encryption. Search on Bibsonomy ICEE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
19Seth Bergmann Degenerate keys for RSA encryption. Search on Bibsonomy ACM SIGCSE Bull. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Himanshu Thapliyal, M. B. Srinivas VLSI Implementation of RSA Encryption System Using Ancient Indian Vedic Mathematics Search on Bibsonomy CoRR The full citation details ... 2006 DBLP  BibTeX  RDF
19Himanshu Thapliyal, M. B. Srinivas, Hamid R. Arabnia Implementation of A Fast Square In RSA Encryption/Decryption Architecture. Search on Bibsonomy Security and Management The full citation details ... 2005 DBLP  BibTeX  RDF
19Himanshu Thapliyal, M. B. Srinivas, Hamid R. Arabnia Faster RSA Encryption/Decryption Architecture Using an Efficient High Speed Overlay Multiplier. Search on Bibsonomy Security and Management The full citation details ... 2005 DBLP  BibTeX  RDF
19Omar Nibouche, Mokhtar Nibouche, Ahmed Bouridane, Ammar Belatreche Fast architectures for FPGA-based implementation of RSA encryption algorithm. Search on Bibsonomy FPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Ljupco Kocarev, Marjan Sterjev, Paolo Amato RSA encryption algorithm based on torus automorphisms. Search on Bibsonomy ISCAS (4) The full citation details ... 2004 DBLP  BibTeX  RDF
19Gene Eu Jan, Lokar J. Y. Lin, W. R. Liou, Y. Y. Chen The Design and Implementation of a 2048-Bit RSA Encryption/Decryption Chip. Search on Bibsonomy VLSI The full citation details ... 2003 DBLP  BibTeX  RDF
19Omar Nibouche, Mokhtar Nibouche, Ahmed Bouridane High speed FPGA implementation of RSA encryption algorithm. Search on Bibsonomy ICECS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Kiran Puttegowda, Peter Athanas RSA encryption using Extended Modular Arithmetic on the Quicksilver COSM Adaptive Computing Machine. Search on Bibsonomy FCCM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Christopher Harm, Xiannong Meng Feasibility Study of Real-Time RSA Encryption in Mobile Computing. Search on Bibsonomy International Conference on Internet Computing The full citation details ... 2003 DBLP  BibTeX  RDF
19Nobuhiro Tomabechi, Teruki Ito Design of a high-speed RSA encryption processor based on the residue table for redundant binary numbers. Search on Bibsonomy Syst. Comput. Jpn. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Shugang Wei, Kensuke Shimizu Residue signed-digit arithmetic circuit with a complement of modulus and the application to RSA encryption processor. Search on Bibsonomy ICECS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Nobuhiro Tomabechi, Teruki Ito Defect-tolerance design of the high-speed RSA encryption processor with built-in table for residue calculation of redundant binary numbers. Search on Bibsonomy ICECS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Nobuhiro Tomabechi, Teruki Ito Design of a high-speed RSA encryption processor with built-in table for residue calculation of redundant binary numbers. Search on Bibsonomy ISCAS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
19Chang N. Zhang, Hua Li DCSA Systolic Array for Modular Multiplication and RSA Encryption. Search on Bibsonomy PDPTA The full citation details ... 2000 DBLP  BibTeX  RDF
19Burt Kaliski PKCS #1: RSA Encryption Version 1.5. Search on Bibsonomy RFC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
19Daniel Bleichenbacher Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF PKCS, RSA, SSL, chosen ciphertext attack
19Ari Musriami Barmawi, Shingo Takada 0001, Norihisa Doi Augmented encrypted key exchange using RSA encryption. Search on Bibsonomy PIMRC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
19Akashi Satoh, Yoshinao Kobayashi, Hideto Niijima, Nobuyuki Ooba, Seiji Munetoh, Sadamichi Sone A High-Speed Small RSA Encryption LSI with Low Power Dissipation. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
19Shugang Wei, Michitaka Kameyama, Tatsuo Higuchi 0001 Performance evaluation of a multivalued rsa encryption vlsi. Search on Bibsonomy Syst. Comput. Jpn. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
19Michitaka Kameyama, Shugang Wei, Tatsuo Higuchi 0001 Design of an RSA Encryption Processor Based on Signed-Digit Multivalued Arithmetic Circuits. Search on Bibsonomy Syst. Comput. Jpn. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
17Nadia Nedjah, Luiza de Macedo Mourelle Multi-Objective Evolutionary Hardware for RSA-Based Cryptosystems. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Ari Musriami Barmawi, Shingo Takada 0001, Norihisa Doi A Proposal for Generating Shared RSA Parameters. Search on Bibsonomy ICPP Workshops The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
12Patrik Bichsel, Jan Camenisch, Thomas Groß 0001, Victor Shoup Anonymous credentials on a standard java card. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF privacy-enhancing systems, smart card, java card, anonymous credential systems
12Koji Shigemoto, Kensuke Kawakami, Koji Nakano Accelerating Montgomery Modulo Multiplication for Redundant Radix-64k Number System on the FPGA Using Dual-Port Block RAMs. Search on Bibsonomy EUC (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Koji Nakano, Kensuke Kawakami, Koji Shigemoto, Yuki Kamada, Yasuaki Ito A Tiny Processing System for Education and Small Embedded Systems on the FPGAs. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Kensuke Kawakami, Koji Shigemoto, Koji Nakano Redundant Radix-2r Number System for Accelerating Arithmetic Operations on the FPGAs. Search on Bibsonomy PDCAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Régis Leveugle Early Analysis of Fault-based Attack Effects in Secure Circuits. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RTL dependability evaluation, security validation, fault models, fault injection, fault attacks
12Young-Soo Kim, Seok-Soo Kim Delay Model for Flooding of Service Prevention in E-Commerce System. Search on Bibsonomy FGCN (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Lasse Øverlier, Paul F. Syverson Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Fatih Gelgi, Melih Onus Heuristics for Minimum Brauer Chain Problem. Search on Bibsonomy ISCIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Brauer chain, dynamic programming, greedy algorithms, exponentiation, addition chain
12Yibo Fan, Xiaoyang Zeng, Yu Yu, Gang Wang, Qianling Zhang A modified high-radix scalable Montgomery multiplier. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Feng Gang Design of Modular Multiplier Based on Improved Montgomery Algorithm and Systolic Array. Search on Bibsonomy IMSCCS (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Christoph Walther, Stephan Schweitzer Verification in the Classroom. Search on Bibsonomy J. Autom. Reason. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF computer uses in education, deduction and automated theorem proving, computer-aided verification
12Nadia Nedjah, Luiza de Macedo Mourelle Fast Hardware of Booth-Barrett?s Modular Multiplication for Efficient Cryptosystems. Search on Bibsonomy ISCIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Alan Daly, William P. Marnane Efficient architectures for implementing montgomery modular multiplication and RSA modular exponentiation on reconfigurable logic. Search on Bibsonomy FPGA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF FPGA, encryption, RSA, public key, exponentiation, modular multiplication, montgomery
12Nadia Nedjah, Luiza de Macedo Mourelle Minimal Addition Chain for Efficient Modular Exponentiation Using Genetic Algorithms. Search on Bibsonomy IEA/AIE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Nadia Nedjah, Luiza de Macedo Mourelle Efficient Parallel Modular Exponentiation Algorithm. Search on Bibsonomy ADVIS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Ari Moesriami Barmawi, Shingo Takada 0001, Norihisa Doi Robust Protocol for Generating Shared RSA Parameters. Search on Bibsonomy IMACC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
12Bertil Schmidt, Manfred Schimmler, Heiko Schröder 0001 Long Operand Arithmetic on Instruction Systolic Computer Architectures and Its Application in RSA Cryptography. Search on Bibsonomy Euro-Par The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
12Don Coppersmith Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities. Search on Bibsonomy J. Cryptol. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF RSA, RSA, Polynomial, Polynomial, Factoring, Factoring, Key words
12Don Coppersmith Finding a Small Root of a Univariate Modular Equation. Search on Bibsonomy EUROCRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
12James A. Davis, Diane B. Holdridge Factorization of Large Integers on a Massively Parallel Computer. Search on Bibsonomy EUROCRYPT The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
12Paul Barrett Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor. Search on Bibsonomy CRYPTO The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
12Ernest F. Brickell, John M. DeLaurentis An Attack on a Signature Scheme Proposed by Okamoto and Shiraishi. Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
12Ronald L. Rivest RSA Chips (Past/Present/Future). Search on Bibsonomy EUROCRYPT The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #97 of 97 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license