|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 645 occurrences of 247 keywords
|
|
|
Results
Found 875 publication records. Showing 875 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
36 | Nadia Nedjah, Luiza de Macedo Mourelle |
Reconfigurable Hardware Implementation of Montgomery Modular Multiplication and Parallel Binary Exponentiation. |
DSD |
2002 |
DBLP DOI BibTeX RDF |
|
36 | Bodo Möller |
Improved Techniques for Fast Exponentiation. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
|
36 | Nadia Nedjah, Luiza de Macedo Mourelle |
Minimal Addition Chain for Efficient Modular Exponentiation Using Genetic Algorithms. |
IEA/AIE |
2002 |
DBLP DOI BibTeX RDF |
|
36 | Nadia Nedjah, Luiza de Macedo Mourelle |
Efficient Hardware Implementation of Modular Multiplication and Exponentiation for Public-Key Cryptography. |
VECPAR |
2002 |
DBLP DOI BibTeX RDF |
|
36 | Takehiko Kato, Satoru Ito, Jun Anzai, Natsume Matsuzaki |
A Design for Modular Exponentiation Coprocessor in Mobile Telecommunication Terminals. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
|
36 | Michael Nöcker |
Some remarks on parallel exponentiation (extended abstract). |
ISSAC |
2000 |
DBLP DOI BibTeX RDF |
|
36 | Thomas Blum |
Montgomery Modular Exponentiation on Reconfigurable Hardware. |
IEEE Symposium on Computer Arithmetic |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Thomas S. Messerges, Ezzy A. Dabbish, Robert H. Sloan |
Power Analysis Attacks of Modular Exponentiation in Smartcards. |
CHES |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Henri Cohen, Atsuko Miyaji, Takatoshi Ono |
Efficient Elliptic Curve Exponentiation Using Mixed Coordinates. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
36 | Mihir Bellare, Juan A. Garay, Tal Rabin |
Fast Batch Verification for Modular Exponentiation and Digital Signatures. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
36 | Colin D. Walter |
Exponentiation using Division Chains. |
IEEE Symposium on Computer Arithmetic |
1997 |
DBLP DOI BibTeX RDF |
|
36 | Peter de Rooij |
Efficient Exponentiation using Procomputation and Vector Addition Chains. |
EUROCRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
36 | Keiichi Iwamura, Tsutomu Matsumoto, Hideki Imai |
Systolic-Arrays for Modular Exponentiation Using Montgomery Method (Extended Abstract). |
EUROCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
36 | Martin Hlavác |
Known-Plaintext-Only Attack on RSA-CRT with Montgomery Multiplication. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
Montgomery exponentiation, electronic passport, RSA, side channel attack, Chinese Remainder Theorem, Hidden Number Problem |
36 | Billy Bob Brumley, Kimmo U. Järvinen |
Fast Point Decompression for Standard Elliptic Curves. |
EuroPKI |
2008 |
DBLP DOI BibTeX RDF |
square roots modulo p, elliptic curve cryptography, exponentiation, addition chains |
36 | Chong Hee Kim, Jean-Jacques Quisquater |
Method for Detecting Vulnerability to Doubling Attacks. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
Doubling attack, relative doubling attack, smart card, simple power analysis (SPA), modular exponentiation |
36 | Nicolas Méloni |
New Point Addition Formulae for ECC Applications. |
WAIFI |
2007 |
DBLP DOI BibTeX RDF |
Fibonacci, elliptic curve, scalar multiplication, exponentiation, addition chains |
36 | Onur Aciiçmez, Çetin Kaya Koç, Jean-Pierre Seifert |
Predicting Secret Keys Via Branch Prediction. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
Simultaneous Multi-threading, RSA, Branch Prediction, Side Channel Analysis, Montgomery Multiplication, Modular Exponentiation |
36 | Jung Hee Cheon, Dong Hoon Lee 0002 |
Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
sparse exponent, modular exponentiation, Batch verification, Frobenius map |
36 | Jong Hoon Shin, Dong Jin Park, Pil Joong Lee |
DPA Attack on the Improved Ha-Moon Algorithm. |
WISA |
2005 |
DBLP DOI BibTeX RDF |
Ha-Moon algorithm, randomized exponentiation algorithm, side-channel attack |
36 | Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim 0003, Howon Kim 0001, Kyoil Chung |
Collision Attack on XTR and a Countermeasure with a Fixed Pattern. |
EUC Workshops |
2005 |
DBLP DOI BibTeX RDF |
XTR public key system, XTR Exponentiation Algorithms, Ubiquitous computer, Side Channel Attacks, Collision Attack |
36 | Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto |
Efficient Countermeasures against RPA, DPA, and SPA. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
Elliptic curve exponentiation, ZPA, RPA, DPA, SPA |
36 | Sang Gyoo Sim, Dong Jin Park, Pil Joong Lee |
New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
Ha-Moon algorithm, MIST algorithm, randomized exponentiation algorithm, power analysis |
36 | Werner Schindler, Colin D. Walter |
More Detail for a Combined Timing and Power Attack against Implementations of RSA. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
statistical decision problem, power analysis, exponentiation, timing attack, RSA cryptosystem, side channel leakage, Montgomery modular multiplication |
36 | Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka |
A Practical Countermeasure against Address-Bit Differential Power Analysis. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
address-bit DPA, RSA, ECC, Differential Power Analysis (DPA), exponentiation, countermeasure |
36 | Pierre-Alain Fouque, Frédéric Valette |
The Doubling Attack - Why Upwards Is Better than Downwards. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
SPA-based analysis, DPA countermeasures, multiple exponent single data attack, scalar multiplication, modular exponentiation |
36 | Marc Joye, Sung-Ming Yen |
The Montgomery Powering Ladder. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
Montgomery powering ladder, constrained environments, cryptographic implementations, side-channel attacks, fault attacks, Exponentiation algorithms |
36 | Lejla Batina, Geeke Muurling |
Another Way of Doing RSA Cryptography in Hardware. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
MultiPrime, scalability, performance model, systolic array, Chinese Remainder Theorem, Montgomery multiplication, modular exponentiation |
33 | Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, Adi Shamir |
Comparative Power Analysis of Modular Exponentiation Algorithms. |
IEEE Trans. Computers |
2010 |
DBLP DOI BibTeX RDF |
waveform matching, RSA, Side-channel attacks, modular exponentiation, power-analysis attacks |
33 | Colin D. Walter |
Exponentiation Using Division Chains. |
IEEE Trans. Computers |
1998 |
DBLP DOI BibTeX RDF |
bit recoding, m-ary method, mixed basis arithmetic, radix representation, Modular exponentiation, RSA cryptosystem, addition chains |
33 | Benjamin Arazi |
Architectures for Exponentiation Over GF(2^n) Adopted for Smartcard Application. |
IEEE Trans. Computers |
1993 |
DBLP DOI BibTeX RDF |
exponentiation circuits, smartcard-based circuitry, structure regularity, dynamic shift registers, cryptography, smart cards, digital arithmetic, public key, time-space tradeoff, linear operation |
33 | Naofumi Takagi |
A Radix-4 Modular Multiplication Hardware Algorithm for Modular Exponentiation. |
IEEE Trans. Computers |
1992 |
DBLP DOI BibTeX RDF |
division subtraction, radix-4 modular multiplication hardware algorithm, residue calculation, repeated multiply-add, serial-parallel modular multiplier, cellular array structure, VLSI, cryptography, digital arithmetic, public-key cryptosystems, modular exponentiation, RSA cryptosystem, redundant representation, bit slice |
33 | Joachim von zur Gathen |
Efficient Exponentiation in Finite Fields (Extended Abstract) |
FOCS |
1991 |
DBLP DOI BibTeX RDF |
ground field, optimal sequential algorithms, finite field extension, parallel algorithms, finite field, exponentiation, normal basis |
29 | Owen Harrison, John Waldron |
Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
RSA, Public-Key Cryptography, Residue Number System, Graphics Processor |
29 | Nareli Cruz Cortés, Francisco Rodríguez-Henríquez, Carlos A. Coello Coello |
An Artificial Immune System Heuristic for Generating Short Addition Chains. |
IEEE Trans. Evol. Comput. |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Pierre-Alain Fouque, Denis Réal, Frédéric Valette, M'hamed Drissi |
The Carry Leakage on the Randomized Exponent Countermeasure. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Jun-Hong Chen, Haw-Shiuan Wu, Ming-Der Shieh, Wen-Ching Lin |
A New Montgomery Modular Multiplication Algorithm and its VLSI Design for RSA Cryptosystem. |
ISCAS |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Robert S. Lubarsky, Michael Rathjen |
On the Constructive Dedekind Reals: Extended Abstract. |
LFCS |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Kyo-Min Ku, Kyeoung Ju Ha, Wi Hyun Yoo, Kee-Young Yoo |
Parallel Montgomery Multiplication and Squaring over GF(2m) Based on Cellular Automata. |
ICCSA (4) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Siddika Berna Örs, Lejla Batina, Bart Preneel, Joos Vandewalle |
Hardware Implementation of a Montgomery Modular Multiplier in a Systolic Array. |
IPDPS |
2003 |
DBLP DOI BibTeX RDF |
Montgomery’s Multiplication Method, FPGA, RSA, ECC, Public Key Cryptography, systolic array |
29 | Su Jung Yu, Joo-Seok Song |
An Improved Password Authentication Key Exchange Protocol for 802.11 Environment. |
ICCSA (2) |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Martijn Stam, Arjen K. Lenstra |
Speeding Up XTR. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
binary Euclidean algorithm, LUC, ECC, addition chains, XTR, Fibonacci sequences |
29 | Detlef Hühnlein |
Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders. |
Selected Areas in Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
29 | William L. Freking, Keshab K. Parhi |
Parallel modular multiplication with application to VLSI RSA implementation. |
ISCAS (1) |
1999 |
DBLP DOI BibTeX RDF |
|
29 | Mihir Bellare, Juan A. Garay, Tal Rabin |
Batch Verification with Applications to Cryptography and Checking. |
LATIN |
1998 |
DBLP DOI BibTeX RDF |
|
29 | Sarvar Patel, Ganapathy S. Sundaram |
An Efficient Discrete Log Pseudo Random Generator. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
29 | Peter Smith, Christopher Skinner |
A Public-Key Cryptosystem and a Digital Signature System BAsed on the Lucas Function Analogue to Discrete Logarithms. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
29 | Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone |
A Fast Elliptic Curve Cryptosystem. |
EUROCRYPT |
1989 |
DBLP DOI BibTeX RDF |
|
29 | Faith E. Fich, Martin Tompa |
The parallel complexity of exponentiating polynomials over finite fields. |
J. ACM |
1988 |
DBLP DOI BibTeX RDF |
|
29 | Harald Niederreiter |
A Public-Key Cryptosystem based on Shift Register Sequences. |
EUROCRYPT |
1985 |
DBLP DOI BibTeX RDF |
|
26 | Steven D. Galbraith, Michael Scott |
Exponentiation in Pairing-Friendly Groups Using Homomorphisms. |
Pairing |
2008 |
DBLP DOI BibTeX RDF |
pairings |
26 | Jean-Pierre David, Kassem Kalach, Nicolas Tittley |
Hardware Complexity of Modular Multiplication and Exponentiation. |
IEEE Trans. Computers |
2007 |
DBLP DOI BibTeX RDF |
Cryptography, Multiplication, Modular Arithmetic, Hardware Complexity |
26 | Mihir Bellare, Tadayoshi Kohno, Victor Shoup |
Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
cryptography, public-key encryption |
26 | Kundan Kumar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury |
A Programmable Parallel Structure to perform Galois Field Exponentiation. |
ICIT |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Nadia Nedjah, Luiza de Macedo Mourelle |
Four Hardware Implementations for the M-ary Modular Exponentiation. |
ITNG |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Ivan Damgård, Rune Thorbek |
Linear Integer Secret Sharing and Distributed Exponentiation. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Shaoquan Jiang |
Efficient Primitives from Exponentiation in Zp. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Guillaume Fumaroli, David Vigilant |
Blinded Fault Resistant Exponentiation. |
FDTC |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Michele Boreale |
Attacking Right-to-Left Modular Exponentiation with Timely Random Faults. |
FDTC |
2006 |
DBLP DOI BibTeX RDF |
fault-based cryptanalysis, public-key cryptosystems, smartcards |
26 | Alessandro Cilardo, Antonino Mazzeo, Luigi Romano, Giacinto Paolo Saggese |
Carry-Save Montgomery Modular Exponentiation on Reconfigurable Hardware. |
DATE |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Jonathan K. Millen, Vitaly Shmatikov |
Symbolic Protocol Analysis with Products and Diffie-Hellman Exponentiation. |
CSFW |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Michele Boreale, Maria Grazia Buscemi |
Symbolic Analysis of Crypto-Protocols Based on Modular Exponentiation. |
MFCS |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Sung-Won Lee, Hyeong-Ju Kang, In-Cheol Park |
A 24-bit floating-point audio DSP controller supporting fast exponentiation. |
ISCAS (2) |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Chin-Chen Chang 0001, Ying-Tse Kuo, Chu-Hsing Lin |
Fast Algorithms for Common-Multiplicand Multiplication and Exponentiation by Performing Complements. |
AINA |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani |
Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents. |
FSTTCS |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Biljana Cubaleska, Andreas Rieke, Thomas Hermann 0003 |
Improving and Extending the Lim/Lee Exponentiation Algorithm. |
Selected Areas in Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
26 | Chris Okasaki |
From Fast Exponentiation to Square Matrices: An Adventure in Types. |
ICFP |
1999 |
DBLP DOI BibTeX RDF |
|
26 | Gérard D. Cohen, Antoine Lobstein, David Naccache, Gilles Zémor |
How to Improve an Exponentiation Black-Box. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Joachim von zur Gathen, Michael Nöcker |
Exponentiation in Finite Fields: Theory and Practice. |
AAECC |
1997 |
DBLP DOI BibTeX RDF |
|
26 | Jörg Sauerbrey, Andreas Dietel |
Resource Requirements for the Application of Addition Chains in Modulo Exponentiation. |
EUROCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
26 | Paul A. Findlay, Brian A. Johnson |
Modular Exponentiation Using Recursive Sums of Residues. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
26 | Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone |
Fast Exponentiation in GF(2n). |
EUROCRYPT |
1988 |
DBLP DOI BibTeX RDF |
|
26 | Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone |
An Interactive Data Exchange Protocol Based on Discrete Exponentiation. |
EUROCRYPT |
1988 |
DBLP DOI BibTeX RDF |
|
26 | Ahmed Y. Mahmoud, Alexander G. Chefranov |
Hill cipher modification based on eigenvalues HCM-EE. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
dynamic key, eiqenvalue, hill cipher, exponentiation, matrix, image encryption, pseudorandom number |
26 | Marc Joye |
Highly Regular m-Ary Powering Ladders. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Montgomery ladder, SPA-type attacks, safe-error attacks, Exponentiation algorithms |
26 | Rafael Álvarez, Leandro Tortosa, José-Francisco Vicent, Antonio Zamora 0001 |
A Non-abelian Group Based on Block Upper Triangular Matrices with Cryptographic Applications. |
AAECC |
2009 |
DBLP DOI BibTeX RDF |
Polynomial matrices, Block matrices, Quick exponentiation, Cryptography, Public Key |
26 | Alexandre Berzati, Cécile Canovas, Jean-Guillaume Dumas, Louis Goubin |
Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
“Left-To-Right” exponentiation, RSA, fault attacks, number theory |
26 | Frédéric Amiel, Benoit Feix |
On the BRIP Algorithms Security for RSA. |
WISTP |
2008 |
DBLP DOI BibTeX RDF |
BRIP, modular multiplication and exponentiation, RSA, Power analysis, collision attacks |
26 | David Vigilant |
RSA with CRT: A New Cost-Effective Solution to Thwart Fault Attacks. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
Software countermeasure, RSA, Chinese Remainder Theorem, Fault attacks, Modular exponentiation, Bellcore attack |
26 | Shinichi Shirakawa, Shintaro Ogino, Tomoharu Nagao |
Graph structured program evolution. |
GECCO |
2007 |
DBLP DOI BibTeX RDF |
graph-based genetic programming, reversing a list, genetic algorithm, genetic programming, automatic programming, exponentiation, Fibonacci sequence, factorial |
26 | Christophe Giraud 0001 |
An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
Smart cards, RSA, fault injection, public-key cryptosystems, exponentiation, simple power analysis, side channel |
26 | Xingjun Wu, Hongyi Chen, Yihe Sun, Weixin Gai |
A Fully-Pipeline Linear Systolic Architecture for Modular Multiplier in Public-Key Crypto-Systems. |
J. VLSI Signal Process. |
2003 |
DBLP DOI BibTeX RDF |
public-key crypto-system, systolic array, modular-multiplication, pipeline architecture, modular-exponentiation |
26 | Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka |
Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
address-bit DPA, scalar exponentiation, OK-ECDH, OK-ECDSA, Differential power analysis (DPA), elliptic curve cryptosystems (ECC) |
26 | Hanae Nozaki, Masahiko Motoyama, Atsushi Shimbo, Shin-ichi Kawamura |
Implementation of RSA Algorithm Based on RNS Montgomery Multiplication. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
RSA cryptography, residue number systems, Montgomery multiplication, modular exponentiation |
26 | Ralph McKenzie |
Arithmetic of Finite Ordered Sets: Cancellation of Exponents, II. |
Order |
2000 |
DBLP DOI BibTeX RDF |
cancellation of exponents, exponentiation, posets |
26 | Vassil S. Dimitrov, Graham A. Jullien, William C. Miller |
Complexity and Fast Algorithms for Multiexponentiations. |
IEEE Trans. Computers |
2000 |
DBLP DOI BibTeX RDF |
cryptography, Modular exponentiation, complex arithmetic |
26 | Colin D. Walter |
Data Integrity in Hardware for Modular Arithmetic. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
checker circuit, fault tolerance, testing, cryptography, data integrity, RSA, Computer arithmetic, correctness, error correction, soft errors, Montgomery multiplication, modular multiplication, modular exponentiation |
26 | Jerome A. Solinas |
An Improved Algorithm for Arithmetic on a Family of Elliptic Curves. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
public-key cryptography, elliptic curves, exponentiation |
19 | Dong-Guk Han, Dooho Choi, Howon Kim 0001 |
Improved Computation of Square Roots in Specific Finite Fields. |
IEEE Trans. Computers |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Wu-Chuan Yang |
New Strategy of Efficient SPA-resistant Exponentiations. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Robin Pottathuparambil, Ron Sass |
A parallel/vectorized double-precision exponential core to accelerate computational science applications. |
FPGA |
2009 |
DBLP DOI BibTeX RDF |
exponential core, fpga, cordic |
19 | Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals, Eiji Okamoto, Francisco Rodríguez-Henríquez |
Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
Karatsuba-Ofman multiplier, FPGA, elliptic curve, hardware accelerator, Tate pairing, finite field arithmetic, ? T pairing |
19 | Francisco Rodríguez-Henríquez, Guillermo Morales-Luna, Julio César López-Hernández |
Low-Complexity Bit-Parallel Square Root Computation over GF(2^{m}) for All Trinomials. |
IEEE Trans. Computers |
2008 |
DBLP DOI BibTeX RDF |
Computations in finite fields, Algorithms, Computer arithmetic |
19 | Junfeng Fan, Lejla Batina, Kazuo Sakiyama, Ingrid Verbauwhede |
FPGA Design for Algebraic Tori-Based Public-Key Cryptography. |
DATE |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Jun-Hong Chen, Wen-Ching Lin, Hao-Hsuan Wu, Ming-Der Shieh |
High-speed modular multiplication design for public-key cryptosystems. |
ISCAS |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Keklik Alptekin Bayam, Siddika Berna Örs |
Differential Power Analysis resistant hardware implementation of the RSA cryptosystem. |
ISCAS |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Nathaniel Ross Pinckney, David Money Harris |
Parallelized radix-4 scalable montgomery multipliers. |
SBCCI |
2007 |
DBLP DOI BibTeX RDF |
cryptography, RSA, Montgomery Multiplication |
19 | Jacques Duparc, Filip Murlak |
On the Topological Complexity of Weakly Recognizable Tree Languages. |
FCT |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Chong Hee Kim, Jean-Jacques Quisquater |
How can we overcome both side channel analysis and fault attacks on RSA-CRT? |
FDTC |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Steve Kremer, Laurent Mazaré |
Adaptive Soundness of Static Equivalence. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 875 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ >>] |
|