The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for exponentiation with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1960-1985 (17) 1986-1989 (15) 1990-1991 (18) 1992-1993 (18) 1994-1995 (22) 1996-1997 (22) 1998 (22) 1999 (20) 2000 (27) 2001 (31) 2002 (30) 2003 (53) 2004 (53) 2005 (66) 2006 (54) 2007 (60) 2008 (42) 2009 (44) 2010 (15) 2011 (34) 2012 (21) 2013 (19) 2014 (17) 2015 (25) 2016 (17) 2017-2018 (30) 2019 (19) 2020-2021 (32) 2022 (22) 2023-2024 (10)
Publication types (Num. hits)
article(323) data(1) incollection(26) inproceedings(525)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 645 occurrences of 247 keywords

Results
Found 875 publication records. Showing 875 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
36Nadia Nedjah, Luiza de Macedo Mourelle Reconfigurable Hardware Implementation of Montgomery Modular Multiplication and Parallel Binary Exponentiation. Search on Bibsonomy DSD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
36Bodo Möller Improved Techniques for Fast Exponentiation. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
36Nadia Nedjah, Luiza de Macedo Mourelle Minimal Addition Chain for Efficient Modular Exponentiation Using Genetic Algorithms. Search on Bibsonomy IEA/AIE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
36Nadia Nedjah, Luiza de Macedo Mourelle Efficient Hardware Implementation of Modular Multiplication and Exponentiation for Public-Key Cryptography. Search on Bibsonomy VECPAR The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
36Takehiko Kato, Satoru Ito, Jun Anzai, Natsume Matsuzaki A Design for Modular Exponentiation Coprocessor in Mobile Telecommunication Terminals. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
36Michael Nöcker Some remarks on parallel exponentiation (extended abstract). Search on Bibsonomy ISSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
36Thomas Blum Montgomery Modular Exponentiation on Reconfigurable Hardware. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
36Thomas S. Messerges, Ezzy A. Dabbish, Robert H. Sloan Power Analysis Attacks of Modular Exponentiation in Smartcards. Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
36Henri Cohen, Atsuko Miyaji, Takatoshi Ono Efficient Elliptic Curve Exponentiation Using Mixed Coordinates. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
36Mihir Bellare, Juan A. Garay, Tal Rabin Fast Batch Verification for Modular Exponentiation and Digital Signatures. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
36Colin D. Walter Exponentiation using Division Chains. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
36Peter de Rooij Efficient Exponentiation using Procomputation and Vector Addition Chains. Search on Bibsonomy EUROCRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
36Keiichi Iwamura, Tsutomu Matsumoto, Hideki Imai Systolic-Arrays for Modular Exponentiation Using Montgomery Method (Extended Abstract). Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
36Martin Hlavác Known-Plaintext-Only Attack on RSA-CRT with Montgomery Multiplication. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Montgomery exponentiation, electronic passport, RSA, side channel attack, Chinese Remainder Theorem, Hidden Number Problem
36Billy Bob Brumley, Kimmo U. Järvinen Fast Point Decompression for Standard Elliptic Curves. Search on Bibsonomy EuroPKI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF square roots modulo p, elliptic curve cryptography, exponentiation, addition chains
36Chong Hee Kim, Jean-Jacques Quisquater Method for Detecting Vulnerability to Doubling Attacks. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Doubling attack, relative doubling attack, smart card, simple power analysis (SPA), modular exponentiation
36Nicolas Méloni New Point Addition Formulae for ECC Applications. Search on Bibsonomy WAIFI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Fibonacci, elliptic curve, scalar multiplication, exponentiation, addition chains
36Onur Aciiçmez, Çetin Kaya Koç, Jean-Pierre Seifert Predicting Secret Keys Via Branch Prediction. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Simultaneous Multi-threading, RSA, Branch Prediction, Side Channel Analysis, Montgomery Multiplication, Modular Exponentiation
36Jung Hee Cheon, Dong Hoon Lee 0002 Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF sparse exponent, modular exponentiation, Batch verification, Frobenius map
36Jong Hoon Shin, Dong Jin Park, Pil Joong Lee DPA Attack on the Improved Ha-Moon Algorithm. Search on Bibsonomy WISA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Ha-Moon algorithm, randomized exponentiation algorithm, side-channel attack
36Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim 0003, Howon Kim 0001, Kyoil Chung Collision Attack on XTR and a Countermeasure with a Fixed Pattern. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF XTR public key system, XTR Exponentiation Algorithms, Ubiquitous computer, Side Channel Attacks, Collision Attack
36Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto Efficient Countermeasures against RPA, DPA, and SPA. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Elliptic curve exponentiation, ZPA, RPA, DPA, SPA
36Sang Gyoo Sim, Dong Jin Park, Pil Joong Lee New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Ha-Moon algorithm, MIST algorithm, randomized exponentiation algorithm, power analysis
36Werner Schindler, Colin D. Walter More Detail for a Combined Timing and Power Attack against Implementations of RSA. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF statistical decision problem, power analysis, exponentiation, timing attack, RSA cryptosystem, side channel leakage, Montgomery modular multiplication
36Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka A Practical Countermeasure against Address-Bit Differential Power Analysis. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF address-bit DPA, RSA, ECC, Differential Power Analysis (DPA), exponentiation, countermeasure
36Pierre-Alain Fouque, Frédéric Valette The Doubling Attack - Why Upwards Is Better than Downwards. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF SPA-based analysis, DPA countermeasures, multiple exponent single data attack, scalar multiplication, modular exponentiation
36Marc Joye, Sung-Ming Yen The Montgomery Powering Ladder. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Montgomery powering ladder, constrained environments, cryptographic implementations, side-channel attacks, fault attacks, Exponentiation algorithms
36Lejla Batina, Geeke Muurling Another Way of Doing RSA Cryptography in Hardware. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF MultiPrime, scalability, performance model, systolic array, Chinese Remainder Theorem, Montgomery multiplication, modular exponentiation
33Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, Adi Shamir Comparative Power Analysis of Modular Exponentiation Algorithms. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2010 DBLP  DOI  BibTeX  RDF waveform matching, RSA, Side-channel attacks, modular exponentiation, power-analysis attacks
33Colin D. Walter Exponentiation Using Division Chains. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1998 DBLP  DOI  BibTeX  RDF bit recoding, m-ary method, mixed basis arithmetic, radix representation, Modular exponentiation, RSA cryptosystem, addition chains
33Benjamin Arazi Architectures for Exponentiation Over GF(2^n) Adopted for Smartcard Application. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1993 DBLP  DOI  BibTeX  RDF exponentiation circuits, smartcard-based circuitry, structure regularity, dynamic shift registers, cryptography, smart cards, digital arithmetic, public key, time-space tradeoff, linear operation
33Naofumi Takagi A Radix-4 Modular Multiplication Hardware Algorithm for Modular Exponentiation. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1992 DBLP  DOI  BibTeX  RDF division subtraction, radix-4 modular multiplication hardware algorithm, residue calculation, repeated multiply-add, serial-parallel modular multiplier, cellular array structure, VLSI, cryptography, digital arithmetic, public-key cryptosystems, modular exponentiation, RSA cryptosystem, redundant representation, bit slice
33Joachim von zur Gathen Efficient Exponentiation in Finite Fields (Extended Abstract) Search on Bibsonomy FOCS The full citation details ... 1991 DBLP  DOI  BibTeX  RDF ground field, optimal sequential algorithms, finite field extension, parallel algorithms, finite field, exponentiation, normal basis
29Owen Harrison, John Waldron Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RSA, Public-Key Cryptography, Residue Number System, Graphics Processor
29Nareli Cruz Cortés, Francisco Rodríguez-Henríquez, Carlos A. Coello Coello An Artificial Immune System Heuristic for Generating Short Addition Chains. Search on Bibsonomy IEEE Trans. Evol. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Pierre-Alain Fouque, Denis Réal, Frédéric Valette, M'hamed Drissi The Carry Leakage on the Randomized Exponent Countermeasure. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Jun-Hong Chen, Haw-Shiuan Wu, Ming-Der Shieh, Wen-Ching Lin A New Montgomery Modular Multiplication Algorithm and its VLSI Design for RSA Cryptosystem. Search on Bibsonomy ISCAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Robert S. Lubarsky, Michael Rathjen On the Constructive Dedekind Reals: Extended Abstract. Search on Bibsonomy LFCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Kyo-Min Ku, Kyeoung Ju Ha, Wi Hyun Yoo, Kee-Young Yoo Parallel Montgomery Multiplication and Squaring over GF(2m) Based on Cellular Automata. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Siddika Berna Örs, Lejla Batina, Bart Preneel, Joos Vandewalle Hardware Implementation of a Montgomery Modular Multiplier in a Systolic Array. Search on Bibsonomy IPDPS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Montgomery’s Multiplication Method, FPGA, RSA, ECC, Public Key Cryptography, systolic array
29Su Jung Yu, Joo-Seok Song An Improved Password Authentication Key Exchange Protocol for 802.11 Environment. Search on Bibsonomy ICCSA (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
29Martijn Stam, Arjen K. Lenstra Speeding Up XTR. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF binary Euclidean algorithm, LUC, ECC, addition chains, XTR, Fibonacci sequences
29Detlef Hühnlein Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
29William L. Freking, Keshab K. Parhi Parallel modular multiplication with application to VLSI RSA implementation. Search on Bibsonomy ISCAS (1) The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
29Mihir Bellare, Juan A. Garay, Tal Rabin Batch Verification with Applications to Cryptography and Checking. Search on Bibsonomy LATIN The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
29Sarvar Patel, Ganapathy S. Sundaram An Efficient Discrete Log Pseudo Random Generator. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
29Peter Smith, Christopher Skinner A Public-Key Cryptosystem and a Digital Signature System BAsed on the Lucas Function Analogue to Discrete Logarithms. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
29Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone A Fast Elliptic Curve Cryptosystem. Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
29Faith E. Fich, Martin Tompa The parallel complexity of exponentiating polynomials over finite fields. Search on Bibsonomy J. ACM The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
29Harald Niederreiter A Public-Key Cryptosystem based on Shift Register Sequences. Search on Bibsonomy EUROCRYPT The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
26Steven D. Galbraith, Michael Scott Exponentiation in Pairing-Friendly Groups Using Homomorphisms. Search on Bibsonomy Pairing The full citation details ... 2008 DBLP  DOI  BibTeX  RDF pairings
26Jean-Pierre David, Kassem Kalach, Nicolas Tittley Hardware Complexity of Modular Multiplication and Exponentiation. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cryptography, Multiplication, Modular Arithmetic, Hardware Complexity
26Mihir Bellare, Tadayoshi Kohno, Victor Shoup Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptography, public-key encryption
26Kundan Kumar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury A Programmable Parallel Structure to perform Galois Field Exponentiation. Search on Bibsonomy ICIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Nadia Nedjah, Luiza de Macedo Mourelle Four Hardware Implementations for the M-ary Modular Exponentiation. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Ivan Damgård, Rune Thorbek Linear Integer Secret Sharing and Distributed Exponentiation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Shaoquan Jiang Efficient Primitives from Exponentiation in Zp. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Guillaume Fumaroli, David Vigilant Blinded Fault Resistant Exponentiation. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Michele Boreale Attacking Right-to-Left Modular Exponentiation with Timely Random Faults. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF fault-based cryptanalysis, public-key cryptosystems, smartcards
26Alessandro Cilardo, Antonino Mazzeo, Luigi Romano, Giacinto Paolo Saggese Carry-Save Montgomery Modular Exponentiation on Reconfigurable Hardware. Search on Bibsonomy DATE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Jonathan K. Millen, Vitaly Shmatikov Symbolic Protocol Analysis with Products and Diffie-Hellman Exponentiation. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Michele Boreale, Maria Grazia Buscemi Symbolic Analysis of Crypto-Protocols Based on Modular Exponentiation. Search on Bibsonomy MFCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Sung-Won Lee, Hyeong-Ju Kang, In-Cheol Park A 24-bit floating-point audio DSP controller supporting fast exponentiation. Search on Bibsonomy ISCAS (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Chin-Chen Chang 0001, Ying-Tse Kuo, Chu-Hsing Lin Fast Algorithms for Common-Multiplicand Multiplication and Exponentiation by Performing Complements. Search on Bibsonomy AINA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents. Search on Bibsonomy FSTTCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Biljana Cubaleska, Andreas Rieke, Thomas Hermann 0003 Improving and Extending the Lim/Lee Exponentiation Algorithm. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
26Chris Okasaki From Fast Exponentiation to Square Matrices: An Adventure in Types. Search on Bibsonomy ICFP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
26Gérard D. Cohen, Antoine Lobstein, David Naccache, Gilles Zémor How to Improve an Exponentiation Black-Box. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
26Joachim von zur Gathen, Michael Nöcker Exponentiation in Finite Fields: Theory and Practice. Search on Bibsonomy AAECC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
26Jörg Sauerbrey, Andreas Dietel Resource Requirements for the Application of Addition Chains in Modulo Exponentiation. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
26Paul A. Findlay, Brian A. Johnson Modular Exponentiation Using Recursive Sums of Residues. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
26Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone Fast Exponentiation in GF(2n). Search on Bibsonomy EUROCRYPT The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
26Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone An Interactive Data Exchange Protocol Based on Discrete Exponentiation. Search on Bibsonomy EUROCRYPT The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
26Ahmed Y. Mahmoud, Alexander G. Chefranov Hill cipher modification based on eigenvalues HCM-EE. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dynamic key, eiqenvalue, hill cipher, exponentiation, matrix, image encryption, pseudorandom number
26Marc Joye Highly Regular m-Ary Powering Ladders. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Montgomery ladder, SPA-type attacks, safe-error attacks, Exponentiation algorithms
26Rafael Álvarez, Leandro Tortosa, José-Francisco Vicent, Antonio Zamora 0001 A Non-abelian Group Based on Block Upper Triangular Matrices with Cryptographic Applications. Search on Bibsonomy AAECC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Polynomial matrices, Block matrices, Quick exponentiation, Cryptography, Public Key
26Alexandre Berzati, Cécile Canovas, Jean-Guillaume Dumas, Louis Goubin Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF “Left-To-Right” exponentiation, RSA, fault attacks, number theory
26Frédéric Amiel, Benoit Feix On the BRIP Algorithms Security for RSA. Search on Bibsonomy WISTP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF BRIP, modular multiplication and exponentiation, RSA, Power analysis, collision attacks
26David Vigilant RSA with CRT: A New Cost-Effective Solution to Thwart Fault Attacks. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Software countermeasure, RSA, Chinese Remainder Theorem, Fault attacks, Modular exponentiation, Bellcore attack
26Shinichi Shirakawa, Shintaro Ogino, Tomoharu Nagao Graph structured program evolution. Search on Bibsonomy GECCO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF graph-based genetic programming, reversing a list, genetic algorithm, genetic programming, automatic programming, exponentiation, Fibonacci sequence, factorial
26Christophe Giraud 0001 An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Smart cards, RSA, fault injection, public-key cryptosystems, exponentiation, simple power analysis, side channel
26Xingjun Wu, Hongyi Chen, Yihe Sun, Weixin Gai A Fully-Pipeline Linear Systolic Architecture for Modular Multiplier in Public-Key Crypto-Systems. Search on Bibsonomy J. VLSI Signal Process. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF public-key crypto-system, systolic array, modular-multiplication, pipeline architecture, modular-exponentiation
26Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF address-bit DPA, scalar exponentiation, OK-ECDH, OK-ECDSA, Differential power analysis (DPA), elliptic curve cryptosystems (ECC)
26Hanae Nozaki, Masahiko Motoyama, Atsushi Shimbo, Shin-ichi Kawamura Implementation of RSA Algorithm Based on RNS Montgomery Multiplication. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF RSA cryptography, residue number systems, Montgomery multiplication, modular exponentiation
26Ralph McKenzie Arithmetic of Finite Ordered Sets: Cancellation of Exponents, II. Search on Bibsonomy Order The full citation details ... 2000 DBLP  DOI  BibTeX  RDF cancellation of exponents, exponentiation, posets
26Vassil S. Dimitrov, Graham A. Jullien, William C. Miller Complexity and Fast Algorithms for Multiexponentiations. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2000 DBLP  DOI  BibTeX  RDF cryptography, Modular exponentiation, complex arithmetic
26Colin D. Walter Data Integrity in Hardware for Modular Arithmetic. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF checker circuit, fault tolerance, testing, cryptography, data integrity, RSA, Computer arithmetic, correctness, error correction, soft errors, Montgomery multiplication, modular multiplication, modular exponentiation
26Jerome A. Solinas An Improved Algorithm for Arithmetic on a Family of Elliptic Curves. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF public-key cryptography, elliptic curves, exponentiation
19Dong-Guk Han, Dooho Choi, Howon Kim 0001 Improved Computation of Square Roots in Specific Finite Fields. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Wu-Chuan Yang New Strategy of Efficient SPA-resistant Exponentiations. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Robin Pottathuparambil, Ron Sass A parallel/vectorized double-precision exponential core to accelerate computational science applications. Search on Bibsonomy FPGA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF exponential core, fpga, cordic
19Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals, Eiji Okamoto, Francisco Rodríguez-Henríquez Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Karatsuba-Ofman multiplier, FPGA, elliptic curve, hardware accelerator, Tate pairing, finite field arithmetic, ? T pairing
19Francisco Rodríguez-Henríquez, Guillermo Morales-Luna, Julio César López-Hernández Low-Complexity Bit-Parallel Square Root Computation over GF(2^{m}) for All Trinomials. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Computations in finite fields, Algorithms, Computer arithmetic
19Junfeng Fan, Lejla Batina, Kazuo Sakiyama, Ingrid Verbauwhede FPGA Design for Algebraic Tori-Based Public-Key Cryptography. Search on Bibsonomy DATE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Jun-Hong Chen, Wen-Ching Lin, Hao-Hsuan Wu, Ming-Der Shieh High-speed modular multiplication design for public-key cryptosystems. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Keklik Alptekin Bayam, Siddika Berna Örs Differential Power Analysis resistant hardware implementation of the RSA cryptosystem. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Nathaniel Ross Pinckney, David Money Harris Parallelized radix-4 scalable montgomery multipliers. Search on Bibsonomy SBCCI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptography, RSA, Montgomery Multiplication
19Jacques Duparc, Filip Murlak On the Topological Complexity of Weakly Recognizable Tree Languages. Search on Bibsonomy FCT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Chong Hee Kim, Jean-Jacques Quisquater How can we overcome both side channel analysis and fault attacks on RSA-CRT? Search on Bibsonomy FDTC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Steve Kremer, Laurent Mazaré Adaptive Soundness of Static Equivalence. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 875 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license