|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 645 occurrences of 247 keywords
|
|
|
Results
Found 875 publication records. Showing 875 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
98 | Colin D. Walter |
Some Security Aspects of the M IST Randomized Exponentiation Algorithm.  |
CHES  |
2002 |
DBLP DOI BibTeX RDF |
Randomary exponentiation, Mist exponentiation algorithm, division chains, DPA, blinding, power analysis, smartcard, addition chains, DEMA |
91 | Sung-Ming Yen, Chien-Ning Chen, Sang-Jae Moon, JaeCheol Ha |
Improvement on Ha-Moon Randomized Exponentiation Algorithm.  |
ICISC  |
2004 |
DBLP DOI BibTeX RDF |
Randomized recoding, Signed-digit recoding, Side-channel attack, Differential power analysis (DPA), Simple power analysis (SPA), Modular exponentiation, Physical cryptanalysis |
91 | Colin D. Walter |
MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis.  |
CT-RSA  |
2002 |
DBLP DOI BibTeX RDF |
Mist exponentiation algorithm, division chains, smart card, DPA, blinding, power analysis, addition chains |
91 | Christophe Clavier, Marc Joye |
Universal Exponentiation Algorithm.  |
CHES  |
2001 |
DBLP DOI BibTeX RDF |
Implementation, smart-cards, provable security, side-channel attacks, discrete logarithm, exponentiation, simple power analysis (SPA), RSA cryptosystem, addition chains |
82 | Mun-Kyu Lee, Howon Kim 0001, Dowon Hong, Kyoil Chung |
Efficient Exponentiation in GF(pm) Using the Frobenius Map.  |
ICCSA (4)  |
2006 |
DBLP DOI BibTeX RDF |
Cryptography, Finite Field, Elliptic Curve, Exponentiation, Optimal Extension Field |
82 | Chin-Chen Chang 0001, Yeu-Pong Lai |
A Parallel Modular Exponentiation Scheme for Transformed Exponents.  |
APPT  |
2005 |
DBLP DOI BibTeX RDF |
Mixed radix conversion, parallel computation, residue number system, modular exponentiation |
82 | Yasuyuki Sakai, Kouichi Sakurai |
Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation.  |
ACNS  |
2003 |
DBLP DOI BibTeX RDF |
Parallel modular exponentiation, Side channel attack, Montgomery multiplication, Timing attack, RSA cryptosystems |
75 | Marten van Dijk, Dwaine E. Clarke, Blaise Gassend, G. Edward Suh, Srinivas Devadas |
Speeding up Exponentiation using an Untrusted Computational Resource.  |
Des. Codes Cryptogr.  |
2006 |
DBLP DOI BibTeX RDF |
AMS Classification 94A60 |
75 | Chi Seong Park, Mun-Kyu Lee, Dong Kyue Kim |
New Computation Paradigm for Modular Exponentiation Using a Graph Model.  |
SAGA  |
2005 |
DBLP DOI BibTeX RDF |
|
75 | Werner Kuich, Klaus W. Wagner |
On the Exponentiation of Languages.  |
FCT  |
2003 |
DBLP DOI BibTeX RDF |
|
72 | Colin D. Walter |
Seeing through MIST Given a Small Fraction of an RSA Private Key.  |
CT-RSA  |
2003 |
DBLP DOI BibTeX RDF |
division chains, randomized exponentiation, Mist, randomary exponentiation, RSA, DPA, blinding, power analysis, smartcard, SPA, Addition chains, DEMA, side channel leakage, SEMA |
69 | Vassil S. Dimitrov, Graham A. Jullien, William C. Miller |
Algorithms for Multi-Exponentiation Based on Complex Arithmetic.  |
IEEE Symposium on Computer Arithmetic  |
1997 |
DBLP DOI BibTeX RDF |
multi-exponentiation algorithms, binary-like complex arithmetic, multiple modular exponentiation operations, performance, cryptographic protocols, digital arithmetic |
65 | Ming-Der Shieh, Jun-Hong Chen, Hao-Hsuan Wu, Wen-Ching Lin |
A New Modular Exponentiation Architecture for Efficient Design of RSA Cryptosystem.  |
IEEE Trans. Very Large Scale Integr. Syst.  |
2008 |
DBLP DOI BibTeX RDF |
|
65 | Benoît Chevallier-Mames |
Self-Randomized Exponentiation Algorithms.  |
CT-RSA  |
2004 |
DBLP DOI BibTeX RDF |
|
65 | Daoud Bshouty, Nader H. Bshouty |
On Learning Arithmetic Read-Once Formulas with Exponentiation (Extended Abstract).  |
COLT  |
1994 |
DBLP DOI BibTeX RDF |
|
65 | Fritz Bauspieß, Hans-Joachim Knobloch, Peer Wichmann |
Inverting the Pseudo Exponentiation.  |
EUROCRYPT  |
1990 |
DBLP DOI BibTeX RDF |
|
62 | Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto |
Some Efficient Algorithms for the Final Exponentiation of eta T Pairing.  |
ISPEC  |
2007 |
DBLP DOI BibTeX RDF |
?T pairing, final exponentiation, torus, Tate pairing |
62 | Soonhak Kwon |
Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(qn) Using a Gaussian Normal Basis of Type II.  |
WISA  |
2004 |
DBLP DOI BibTeX RDF |
NAF (nonadjacent form), balanced ternary number system, finite field, exponentiation, optimal normal basis, Gaussian normal basis, signed digit representation |
62 | Yong Ho Hwang, Sang Gyoo Sim, Pil Joong Lee |
Bit-Serial Multipliers for Exponentiation and Division in GF(2m) Using Irreducible AOP.  |
ICCSA (1)  |
2004 |
DBLP DOI BibTeX RDF |
Irreducible AOP, Finite field, Exponentiation, Bit-serial multiplier |
62 | Soonhak Kwon, Chang Hoon Kim, Chun Pyo Hong |
Gauss Period, Sparse Polynomial, Redundant Basis, and Efficient Exponentiation for a Class of Finite Fields with Small Characteristic.  |
ISAAC  |
2003 |
DBLP DOI BibTeX RDF |
Gauss period, trinomial, redundant basis, Finite field, exponentiation, root of unity |
62 | Soonhak Kwon, Chang Hoon Kim, Chun Pyo Hong |
Efficient Exponentiation for a Class of Finite Fields GF(2 n) Determined by Gauss Periods.  |
CHES  |
2003 |
DBLP DOI BibTeX RDF |
Gauss period, Finite field, exponentiation, optimal normal basis, primitive element |
62 | Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon |
A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack.  |
ICISC  |
2001 |
DBLP DOI BibTeX RDF |
Square-multiply exponentiation, Cryptography, Side channel attack, Exponentiation, Timing attack, Power analysis attack, Physical cryptanalysis, Hardware fault cryptanalysis |
59 | Takafumi Hamano, Naofumi Takagi, Shuzo Yajima, Franco P. Preparata |
O(n)-depth circuit algorithm for modular exponentiation.  |
IEEE Symposium on Computer Arithmetic  |
1995 |
DBLP DOI BibTeX RDF |
O(n)-depth circuit algorithm, polynomial-size combinational circuit algorithm, n-bit modular exponentiation, n-bit binary integers, square-and-multiply method, public key cryptography, combinational circuits, digital arithmetic, modular exponentiation |
55 | Koray Karabina |
Double-Exponentiation in Factor-4 Groups and Its Applications.  |
IMACC  |
2009 |
DBLP DOI BibTeX RDF |
|
55 | Matthieu Rivain |
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation.  |
CT-RSA  |
2009 |
DBLP DOI BibTeX RDF |
|
55 | Nadia Nedjah, Luiza de Macedo Mourelle |
Efficient Hardware for Modular Exponentiation using the Sliding-Window Method with Variable-Length Partitioning.  |
ICYCS  |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Chia-Long Wu, Der-Chyuan Lou, Te-Jen Chang |
An efficient Montgomery exponentiation algorithm for public-key cryptosystems.  |
ISI  |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Nadia Nedjah, Luiza de Macedo Mourelle |
A Hardware/Software Co-design vs. Hardware Implementation of the Modular Exponentiation Using the Sliding-Window Method with Constant-Length Partitioning.  |
DSD  |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Nadia Nedjah, Luiza de Macedo Mourelle |
A System-on-Chip Implementation for Modular Exponentiation Using the Sliding-Window Method with Variable-Length Partitioning.  |
SIES  |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Nadia Nedjah, Luiza de Macedo Mourelle |
Efficient Hardware for Modular Exponentiation Using the Sliding-Window Method with Variable-Length Partitioning.  |
SBAC-PAD  |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Bodo Möller |
Algorithms for Multi-exponentiation.  |
Selected Areas in Cryptography  |
2001 |
DBLP DOI BibTeX RDF |
|
55 | Çetin Kaya Koç, Tolga Acar |
Fast Software Exponentiation in GF(2^k).  |
IEEE Symposium on Computer Arithmetic  |
1997 |
DBLP DOI BibTeX RDF |
polynomial arithmetic, Montgomery multiplication, Galois field, squaring |
55 | Sung-Ming Yen, Lee-Chun Ko, Sang-Jae Moon, JaeCheol Ha |
Relative Doubling Attack Against Montgomery Ladder.  |
ICISC  |
2005 |
DBLP DOI BibTeX RDF |
Doubling attack, Cryptography, Smart card, Side-channel attack, Scalar multiplication, Exponentiation, Simple power analysis (SPA), Chosen-message attack |
52 | Michael Tunstall |
Random Order m-ary Exponentiation.  |
ACISP  |
2009 |
DBLP DOI BibTeX RDF |
random order countermeasure, side channel analysis, Exponentiation algorithms |
52 | Marc Joye, Michael Tunstall |
Exponent Recoding and Regular Exponentiation Algorithms.  |
AFRICACRYPT  |
2009 |
DBLP DOI BibTeX RDF |
Exponent recoding, side-channel analysis, exponentiation algorithms |
52 | Bodo Möller, Andy Rupp |
Faster Multi-exponentiation through Caching: Accelerating (EC)DSA Signature Verification.  |
SCN  |
2008 |
DBLP DOI BibTeX RDF |
embedded cryptography, elliptic curve cryptography, exponentiation, Efficient implementation, DSA, ECDSA |
52 | Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, Adi Shamir |
Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs.  |
CHES  |
2008 |
DBLP DOI BibTeX RDF |
waveform matching, RSA, side-channel attacks, modular exponentiation, power-analysis attacks |
52 | Jean-Luc Beuchat, Nicolas Brisebarre, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto |
A Coprocessor for the Final Exponentiation of the eta T Pairing in Characteristic Three.  |
WAIFI  |
2007 |
DBLP DOI BibTeX RDF |
final exponentiation, FPGA, hardware accelerator, ? T pairing, characteristic three |
52 | Peter Aczel, Laura Crosilla, Hajime Ishihara, Erik Palmgren, Peter Schuster 0001 |
Binary Refinement Implies Discrete Exponentiation.  |
Stud Logica  |
2006 |
DBLP DOI BibTeX RDF |
Constructive set theory, Exponentiation axiom |
52 | David M. Harris |
An Exponentiation Unit for an OpenGL Lighting Engine.  |
IEEE Trans. Computers  |
2004 |
DBLP DOI BibTeX RDF |
OpenGL hardware acceleration, table complexity, bipartite tables, Powering, computer arithmetic, table lookups, exponentiation |
52 | Alan Daly, William P. Marnane |
Efficient architectures for implementing montgomery modular multiplication and RSA modular exponentiation on reconfigurable logic.  |
FPGA  |
2002 |
DBLP DOI BibTeX RDF |
FPGA, encryption, RSA, public key, exponentiation, modular multiplication, montgomery |
52 | B. J. Phillips, N. Burgess |
Implementing 1, 024-Bit RSA Exponentiation on a 32-Bit Processor Core.  |
ASAP  |
2000 |
DBLP DOI BibTeX RDF |
Smart Card, RSA, Public Key Cryptography, Sliding Windows, Modular Exponentiation |
49 | Koji Nakano, Kensuke Kawakami, Koji Shigemoto |
RSA encryption and decryption using the redundant number system on the FPGA.  |
IPDPS  |
2009 |
DBLP DOI BibTeX RDF |
|
49 | Johann Großschädl, Stefan Tillich, Alexander Szekely |
Performance Evaluation of Instruction Set Extensions for Long Integer Modular Arithmetic on a SPARC V8 Processor.  |
DSD  |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Chong Hee Kim, Jong Hoon Shin, Jean-Jacques Quisquater, Pil Joong Lee |
Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier.  |
ICISC  |
2007 |
DBLP DOI BibTeX RDF |
|
49 | S. Rahul, R. C. Hansdah |
An Efficient Distributed Group Key Management Algorithm.  |
ICPADS  |
2004 |
DBLP DOI BibTeX RDF |
|
49 | Kyo-Min Ku, Kyeoung Ju Ha, Kee-Young Yoo |
Fast Exponentiaion over GF(2) Based on Cellular Automata.  |
International Conference on Computational Science  |
2003 |
DBLP DOI BibTeX RDF |
|
46 | Michael Scott, Naomi Benger, Manuel Charlemagne, Luis J. Dominguez Perez, Ezekiel J. Kachisa |
On the Final Exponentiation for Calculating Pairings on Ordinary Elliptic Curves.  |
Pairing  |
2009 |
DBLP DOI BibTeX RDF |
addition sequences, Tate pairing, addition chains |
46 | I-Cheng Wang, Chih-Hao Shen, Kung Chen, Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang 0004 |
An Empirical Study on Privacy and Secure Multi-party Computation Using Exponentiation.  |
CSE (3)  |
2009 |
DBLP DOI BibTeX RDF |
|
46 | Chia-Long Wu |
Fast Parallel Montgomery Binary Exponentiation Algorithm Using Canonical- Signed-Digit Recoding Technique.  |
ICA3PP  |
2009 |
DBLP DOI BibTeX RDF |
Montgomery reduction algorithm, cryptography, complexity analysis, number theory, algorithm design |
46 | Claire Whelan, Michael Scott |
The Importance of the Final Exponentiation in Pairings When Considering Fault Attacks.  |
Pairing  |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Nadia Nedjah, Luiza de Macedo Mourelle, Rodrigo Martins da Silva |
Efficient Hardware for Modular Exponentiation Using the Sliding-Window Method.  |
ITNG  |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Daisuke Suzuki |
How to Maximize the Potential of FPGA Resources for Modular Exponentiation.  |
CHES  |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Nadia Nedjah, Luiza de Macedo Mourelle |
Minimal Addition-Subtraction Sequences for Efficient Pre-processing in Large Window-Based Modular Exponentiation Using Genetic Algorithms.  |
IDEAL  |
2003 |
DBLP DOI BibTeX RDF |
|
46 | Mario Alberto Garcia Martinez, Guillermo Morales-Luna, Francisco Rodríguez-Henríquez |
Hardware Implementation of the Binary Method for Exponentiation in GF(2m).  |
ENC  |
2003 |
DBLP DOI BibTeX RDF |
|
46 | Won-Ho Lee, Young-Jun Heo, Kee-Young Yoo |
Efficient Architecture for Exponentiation and Division in GF(2m) Using Irreducible AOP.  |
ICCSA (1)  |
2003 |
DBLP DOI BibTeX RDF |
|
46 | Nadia Nedjah, Luiza de Macedo Mourelle |
Efficient Parallel Modular Exponentiation Algorithm.  |
ADVIS  |
2002 |
DBLP DOI BibTeX RDF |
|
46 | Huapeng Wu, M. Anwar Hasan |
Efficient exponentiation using weakly dual basis.  |
IEEE Trans. Very Large Scale Integr. Syst.  |
2001 |
DBLP DOI BibTeX RDF |
|
46 | Alexander Tiountchik, Elena Trichina |
Modular Exponentiation on Fine-Grained FPGA.  |
CT-RSA  |
2001 |
DBLP DOI BibTeX RDF |
|
46 | Hyun-Sung Kim 0001, Kee-Young Yoo |
Area Efficient Exponentiation Using Modular Multiplier/Squarer in GF(2m.  |
COCOON  |
2001 |
DBLP DOI BibTeX RDF |
|
46 | Luke O'Connor |
An Analysis of Exponentiation Based on Formal Languages.  |
EUROCRYPT  |
1999 |
DBLP DOI BibTeX RDF |
|
46 | Seong-Min Hong 0001, Sang-Yeop Oh, Hyunsoo Yoon |
New Modular Multiplication Algorithms for Fast Modular Exponentiation.  |
EUROCRYPT  |
1996 |
DBLP DOI BibTeX RDF |
|
46 | Arnaud Boscher, Robert Naciri, Emmanuel Prouff |
CRT RSA Algorithm Protected Against Fault Attacks.  |
WISTP  |
2007 |
DBLP DOI BibTeX RDF |
Smart Card, RSA, Chinese Remainder Theorem, Fault Attacks, Simple Power Analysis, Modular Exponentiation |
46 | Fatih Gelgi, Melih Onus |
Heuristics for Minimum Brauer Chain Problem.  |
ISCIS  |
2006 |
DBLP DOI BibTeX RDF |
Brauer chain, dynamic programming, greedy algorithms, exponentiation, addition chain |
46 | Shay Gueron, Or Zuk |
Applications of The Montgomery Exponent.  |
ITCC (1)  |
2005 |
DBLP DOI BibTeX RDF |
ef£cient implementations, Montgomery multiplication, modular exponentiation |
46 | Peter Groen, Panu Hämäläinen, Ben H. H. Juurlink, Timo Hämäläinen 0001 |
Accelerating the secure remote password protocol using reconfigurable hardware.  |
Conf. Computing Frontiers  |
2004 |
DBLP DOI BibTeX RDF |
secure remote password protocol, authentication, WLAN, hardware acceleration, reconfigurable hardware, modular exponentiation |
46 | Ralph McKenzie |
The Zig-Zag Property and Exponential Cancellation of Ordered Sets.  |
Order  |
2003 |
DBLP DOI BibTeX RDF |
cancellation of exponents, exponentiation, posets |
46 | Lejla Batina, Geeke Muurling |
Montgomery in Practice: How to Do It More Efficiently in Hardware.  |
CT-RSA  |
2002 |
DBLP DOI BibTeX RDF |
scalability, performance model, systolic array, Montgomery multiplication, modular exponentiation |
46 | Colin D. Walter, Susan Thompson |
Distinguishing Exponent Digits by Observing Modular Subtractions.  |
CT-RSA  |
2001 |
DBLP DOI BibTeX RDF |
m-ary method, power analysis, sliding windows, Exponentiation, Montgomery multiplication, modular multiplication, timing attack, RSA cryptosystem |
46 | Colin D. Walter |
Sliding Windows Succumbs to Big Mac Attack.  |
CHES  |
2001 |
DBLP DOI BibTeX RDF |
Cryptography, smart card, RSA, differential power analysis, DPA, blinding, sliding windows, exponentiation |
43 | JeaHoon Park, KiSeok Bae, Sang-Jae Moon, Dooho Choi, You Sung Kang, JaeCheol Ha |
A new fault cryptanalysis on montgomery ladder exponentiation algorithm.  |
ICIS  |
2009 |
DBLP DOI BibTeX RDF |
Montgomery ladder exponentiation algorithm, fault analysis attack, RSA, physical cryptanalysis |
43 | Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani |
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption.  |
ACM Trans. Comput. Log.  |
2008 |
DBLP DOI BibTeX RDF |
Diffie-Hellman exponentiation, Dolev-Yao model, complexity, protocols, Algebraic properties |
43 | Sebastian Fleissner |
GPU-Accelerated Montgomery Exponentiation.  |
International Conference on Computational Science (1)  |
2007 |
DBLP DOI BibTeX RDF |
Montgomery Exponentiation, Encryption, GPGPU |
43 | Roberto Maria Avanzi |
The Complexity of Certain Multi-Exponentiation Techniques in Cryptography.  |
J. Cryptol.  |
2005 |
DBLP DOI BibTeX RDF |
Integer recoding, Elliptic and hyperelliptic curves, Trace zero varieties, Groups with automorphisms, Scalar multiplication, Exponentiation, XTR |
43 | Colin D. Walter |
Issues of Security with the Oswald-Aigner Exponentiation Algorithm.  |
CT-RSA  |
2004 |
DBLP DOI BibTeX RDF |
Addition-subtraction chains, randomized exponentiation, elliptic curve cryptography, ECC, DPA, blinding, power analysis, smartcard, SPA, DEMA, point multiplication, SEMA |
43 | Oded Goldreich 0001, Vered Rosen |
On the Security of Modular Exponentiation with Application to the Construction of Pseudorandom Generators.  |
J. Cryptol.  |
2003 |
DBLP DOI BibTeX RDF |
Hard-core predicates, Simultaneous security, Factoring assumption, Discrete logarithm, Pseudorandom generator, Modular exponentiation |
43 | Thomas Blum, Christof Paar |
High-Radix Montgomery Modular Exponentiation on Reconfigurable Hardware.  |
IEEE Trans. Computers  |
2001 |
DBLP DOI BibTeX RDF |
FPGA, RSA, systolic array, exponentiation, modular arithmetic, Montgomery |
43 | Gaël Hachez, Jean-Jacques Quisquater |
Montgomery Exponentiation with no Final Subtractions: Improved Results.  |
CHES  |
2000 |
DBLP DOI BibTeX RDF |
smart cards, Montgomery multiplication, timing attacks, modular exponentiation, power attacks |
39 | Susan Hohenberger, Anna Lysyanskaya |
How to Securely Outsource Cryptographic Computations.  |
TCC  |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Christopher C. Doss, Robert L. Riley Jr. |
FPGA-based implementation of single-precision exponential unit.  |
FPGA  |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Fu-Chi Chang, Chia-Jiu Wang |
Architectural tradeoff in implementing RSA processors.  |
SIGARCH Comput. Archit. News  |
2002 |
DBLP DOI BibTeX RDF |
|
39 | Jae Wook Chung, Sang Gyoo Sim, Pil Joong Lee |
Fast Implementation of Elliptic Curve Defined over GF(pm) on CalmRISC with MAC2424 Coprocessor.  |
CHES  |
2000 |
DBLP DOI BibTeX RDF |
|
39 | Antoon Bosselaers, René Govaerts, Joos Vandewalle |
Comparison of Three Modular Reduction Functions.  |
CRYPTO  |
1993 |
DBLP DOI BibTeX RDF |
|
39 | Martin Davis, Hilary Putnam |
A Computing Procedure for Quantification Theory.  |
J. ACM  |
1960 |
DBLP DOI BibTeX RDF |
|
36 | Nadia Nedjah, Luiza de Macedo Mourelle |
SoC-based implementation for modular exponentiation using evolutionary addition chains.  |
IEEE Congress on Evolutionary Computation  |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Gökay Saldamli, Çetin Kaya Koç |
Spectral Modular Exponentiation.  |
IEEE Symposium on Computer Arithmetic  |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Soonhak Kwon, Chang Hoon Kim, Chun Pyo Hong |
Sparse polynomials, redundant bases, gauss periods, and efficient exponentiation of primitive elements for small characteristic finite fields.  |
Des. Codes Cryptogr.  |
2006 |
DBLP DOI BibTeX RDF |
AMS Classification Primary 12Y05, Secondary 11T71 |
36 | Zhong Ren 0001, Rui Wang 0004, John M. Snyder, Kun Zhou 0001, Xinguo Liu, Bo Sun, Peter-Pike J. Sloan, Hujun Bao, Qunsheng Peng 0001, Baining Guo |
Real-time soft shadows in dynamic scenes using spherical harmonic exponentiation.  |
ACM Trans. Graph.  |
2006 |
DBLP DOI BibTeX RDF |
Volterra series, lighting environment, ambient occlusion |
36 | Shay Gueron |
Data and Computational Fault Detection Mechanism for Devices That Perform Modular Exponentiation.  |
FDTC  |
2006 |
DBLP DOI BibTeX RDF |
safe errors, RSA, smartcards, Fault attacks, countermeasures, embedded devices |
36 | Nadia Nedjah, Luiza de Macedo Mourelle |
Efficient Pre-processing for Large Window-Based Modular Exponentiation Using Ant Colony.  |
KES (4)  |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Luiza de Macedo Mourelle, Nadia Nedjah |
Reconfigurable Hardware for Addition Chains Based Modular Exponentiation.  |
ITCC (1)  |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Luiza de Macedo Mourelle, Nadia Nedjah |
Fast Reconfigurable Hardware for the M-ary Modular Exponentiation.  |
DSD  |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Luiza de Macedo Mourelle, Nadia Nedjah |
Hardware for Modular Exponentiation Suitable for Smart Cards.  |
ICESS  |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Vitaly Shmatikov |
Decidable Analysis of Cryptographic Protocols with Products and Modular Exponentiation.  |
ESOP  |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Bodo Möller |
Fractional Windows Revisited: Improved Signed-Digit Representations for Efficient Exponentiation.  |
ICISC  |
2004 |
DBLP DOI BibTeX RDF |
elliptic curve cryptography, Efficient implementations |
36 | Nareli Cruz Cortés, Francisco Rodríguez-Henríquez, Carlos A. Coello Coello |
On the Optimal Computaion of Finite Field Exponentiation.  |
IBERAMIA  |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Kyo-Min Ku, Kyeoung Ju Ha, Kee-Young Yoo |
Time-Space Efficient Exponentiation over GF(2m).  |
ICCSA (1)  |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Nadia Nedjah, Luiza de Macedo Mourelle |
Three Hardware Implementations for the Binary Modular Exponentiation: Sequential, Parallel and Systolic.  |
SBAC-PAD  |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Deepak Kapur, Paliath Narendran, Lida Wang |
An E-unification Algorithm for Analyzing Protocols That Use Modular Exponentiation.  |
RTA  |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Nadia Nedjah, Luiza de Macedo Mourelle |
Efficient Pre-processing for Large Window-Based Modular Exponentiation Using Genetic Algorithms.  |
IEA/AIE  |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 875 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ >>] |
|