Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
19 | Debdeep Mukhopadhyay, Pallavi Joshi, Dipanwita Roy Chowdhury |
An Efficient Design of Cellular Automata Based Cryptographically Robust One-Way Function. |
VLSI Design |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Yi Wang 0016, Jussipekka Leiwo, Thambipillai Srikanthan, Yu Yu |
FPGA based DPA-resistant Unified Architecture for Signcryption. |
ITNG |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Bonseok Koo, Dongwook Lee, Gwonho Ryu, Taejoo Chang, Sangjin Lee 0002 |
High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem. |
ICISC |
2006 |
DBLP DOI BibTeX RDF |
Booth’s algorithm, RSA, Chinese Remainder Theorem, Montgomery multiplication, Carry Save Adder |
19 | Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim 0001 |
Further Security Analysis of XTR. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
XTR public key system, XTR-ISE, differential power analysis |
19 | Neil Smyth, Máire McLoone, John V. McCanny |
An Adaptable And Scalable Asymmetric Cryptographic Processor. |
ASAP |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Yannick Chevalier, Michaël Rusinowitch |
Hierarchical Combination of Intruder Theories. |
RTA |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Arjen K. Lenstra, Dan Page, Martijn Stam |
Discrete Logarithm Variants of VSH. |
VIETCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Cyclotomic Subgroup, Hash Functions, Collision Resistance |
19 | Endre Bangerter, Jan Camenisch, Ueli M. Maurer |
Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Alden H. Wright, Sandeep Pulavarty |
On the convergence of an estimation of distribution algorithm based on linkage discovery and factorization. |
GECCO |
2005 |
DBLP DOI BibTeX RDF |
Boltzmann distribution, genetic algorithms, evolutionary computation, estimation of distribution algorithms, factorization |
19 | Régis Bevan |
Improved Zero Value Attack on XTR. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
MRPA, smart cards, Power Analysis, DFA, XTR |
19 | Ren-Junn Hwang, Feng-Fu Su, Yi-Shiung Yeh, Chia-Yao Chen |
An Efficient Decryption Method for RSA Cryptosystem. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Nareli Cruz Cortés, Francisco Rodríguez-Henríquez, Raúl Juárez-Morales, Carlos A. Coello Coello |
Finding Optimal Addition Chains Using a Genetic Algorithm Approach. |
CIS (1) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Nadia Nedjah, Luiza de Macedo Mourelle |
Finding Minimal Addition Chains Using Ant Colony. |
IDEAL |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Christopher C. Doss, Robert L. Riley Jr. |
FPGA-Based Implementation of a Robust IEEE-754 Exponential Unit. |
FCCM |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Dong-Guk Han, Jongin Lim 0001, Kouichi Sakurai |
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
XTR Public Key Cryptosystem, Data-bit DPA, Address-bit DPA, doubling attack, Side Channel Attacks, SPA |
19 | Nadia Nedjah, Luiza de Macedo Mourelle |
Evolutionary RSA-Based Cryptographic Hardware Using the Co-Design Methodology. |
IEA/AIE |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Yasuyuki Sakai, Kouichi Sakurai |
A New Attack with Side Channel Leakage During Exponent Recoding Computations. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
exponent recoding, Side channel attack, elliptic curve cryptosystems, RSA cryptosystems |
19 | Christopher Lynch, Catherine Meadows 0001 |
Sound Approximations to Diffie-Hellman Using Rewrite Rules. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Jin-Hua Hong, Cheng-Wen Wu |
Cellular-array modular multiplier for fast RSA public-key cryptosystem based on modified Booth's algorithm. |
IEEE Trans. Very Large Scale Integr. Syst. |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Martijn Stam |
On Montgomery-Like Representationsfor Elliptic Curves over GF(2k). |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Lucas chains, ECC, point multiplication, Montgomery |
19 | Ciaran McIvor, Máire McLoone, John V. McCanny |
A high-speed, low latency RSA decryption silicon core. |
ISCAS (4) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Jun-Cheol Jeon, Kee-Young Yoo |
Computational Algorithm and Architecture for AB2 Multiplication in Finite Fields. |
ICCSA (1) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Marcelo P. Fiore, Roberto Di Cosmo, Vincent Balat |
Remarks on Isomorphisms in Typed Lambda Calculi with Empty and Sum Types. |
LICS |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Yaron Sella |
Speeding Up Secure Sessions Establishment on the Internet. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Bert den Boer, Kerstin Lemke, Guntram Wicke |
A DPA Attack against the Modular Reduction within a CRT Implementation of RSA. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
RSA, DPA, power analysis, smartcard, CRT, side channel analysis, modular reduction |
19 | Chung-Hsien Wu, Jin-Hua Hong, Cheng-Wen Wu |
RSA cryptosystem design based on the Chinese remainder theorem. |
ASP-DAC |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Markus Jakobsson, Susanne Wetzel |
Secure Server-Aided Signature Generation. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
DSS, error-detection, delegation, Batch, duplication |
19 | Adam L. Young, Moti Yung |
A PVSS as Hard as Discrete Log and Shareholder Separability. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Detlef Hühnlein, Sachar Paulus |
On the Implementation of Cryptosystems Based on Real Quadratic Number Fields. |
Selected Areas in Cryptography |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Shin-ichi Kawamura, Masanobu Koike, Fumihiko Sano, Atsushi Shimbo |
Cox-Rower Architecture for Fast Parallel Montgomery Multiplication. |
EUROCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Werner Schindler |
A Timing Attack against RSA with the Chinese Remainder Theorem. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
RSA, Chinese Remainder Theorem, Montgomery multiplication, Timing attack |
19 | Chih-Yuang Su, Shih-Am Hwang, Po-Song Chen, Cheng-Wen Wu |
An improved Montgomery's algorithm for high-speed RSA public-key cryptosystem. |
IEEE Trans. Very Large Scale Integr. Syst. |
1999 |
DBLP DOI BibTeX RDF |
|
19 | Alexander Tiountchik, Elena Trichina |
RSA Acceleration with Field Programmable Gate Arrays. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
19 | S. K. Jain, Leilei Song, Keshab K. Parhi |
Efficient semisystolic architectures for finite-field arithmetic. |
IEEE Trans. Very Large Scale Integr. Syst. |
1998 |
DBLP DOI BibTeX RDF |
|
19 | Victor Boyko, Marcus Peinado, Ramarathnam Venkatesan |
Speeding up Discrete Log and Factoring Based Schemes via Precomputations. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
19 | Christof Paar, Pedro Soria-Rodriguez |
Fast Arithmetic Architectures for Public-Key Algorithms over Galois Fields GF((2n)m). |
EUROCRYPT |
1997 |
DBLP DOI BibTeX RDF |
|
19 | Martin Kochanski |
Developing an RSA Chip. |
CRYPTO |
1985 |
DBLP DOI BibTeX RDF |
|
17 | Steven T. Dougherty, Joseph Klobusicky, Serap Sahinkaya, Deniz Ustun |
An S-Box construction from exponentiation in finite fields and its application in RGB color image encryption. |
Multim. Tools Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Saeed Aghapour, Kasra Ahmadi, Mehran Mozaffari Kermani, Reza Azarderakhsh |
Efficient Fault Detection Architectures for Modular Exponentiation Targeting Cryptographic Applications Benchmarked on FPGAs. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Charlotte Hoffmann, Krzysztof Pietrzak |
Watermarkable and Zero-Knowledge Verifiable Delay Functions from any Proof of Exponentiation. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
17 | Charlotte Hoffmann, Pavel Hubácek, Svetlana Ivanova |
Practical Batch Proofs of Exponentiation. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
17 | Vidal Attias, Luigi Vigneri, Vassil S. Dimitrov |
Rethinking modular multi-exponentiation in real-world applications. |
J. Cryptogr. Eng. |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Bart Mennink |
Secure Distributed Modular Exponentiation: Systematic Analysis and New Results. |
IEEE Trans. Inf. Forensics Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Rei Ueno, Naofumi Homma |
How Secure is Exponent-blinded RSA-CRT with Sliding Window Exponentiation? |
IACR Trans. Cryptogr. Hardw. Embed. Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Michele Fabbrini |
Circular Multiplicative Modular Exponentiation: A New Public Key Exchange Algorithm. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
17 | Ihor Prots'ko, Aleksandr Gryshchuk, Volodymyr Riznyk |
Efficient Multithreading Computation of Modular Exponentiation with Pre-computation of Residues for Fixed-base. |
CMIS |
2023 |
DBLP BibTeX RDF |
|
17 | Victor Krasnobayev, Alina Yanko, Anatolii Martynenko, Dmytro Kovalchuk |
Method for Computing Exponentiation Modulo the Positive and Negative Integers. |
ICST |
2023 |
DBLP BibTeX RDF |
|
17 | Adrian Tatulian, Ronald F. DeMara |
Generalized Exponentiation Using STT Magnetic Tunnel Junctions: Circuit Design, Performance, and Application to Neural Network Gradient Decay. |
SN Comput. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Jonathan David Farley |
Poset Exponentiation and a Counterexample Birkhoff Said in 1942 He Did Not Have. |
Order |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Hridoy Jyoti Mahanta, Keshab Nath, Amit Kumar Roy, Ketan Kotecha, Varadarajan Vijayakumar 0001 |
Using Genetic Algorithm in Inner Product to Resist Modular Exponentiation From Higher Order DPA Attacks. |
IEEE Access |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Wei He, Yu Zhang, Yin Li |
An Efficient Exponentiation Algorithm in GF(2m) Using Euclidean Inversion. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Shiping Cai, Zhi Hu, Changan Zhao |
Faster Final Exponentiation on the KSS18 Curve. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Dmitrii I. Koshelev |
Indifferentiable hashing to ordinary elliptic ${\mathbb {F}}_{\!q}$-curves of j=0 with the cost of one exponentiation in ${\mathbb {F}}_{\!q}$. |
Des. Codes Cryptogr. |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Amin Monfared, Mostafa M. I. Taha, Arash Reyhani-Masoleh |
Secure and Efficient Exponentiation Architectures Using Gaussian Normal Basis. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Yuki Nanjo, Masaaki Shirase, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami |
Efficient Final Exponentiation for Cyclotomic Families of Pairing-Friendly Elliptic Curves with Any Prime Embedding Degrees. |
Int. J. Netw. Comput. |
2022 |
DBLP BibTeX RDF |
|
17 | Darren Li, Yves Gallot |
An Efficient Modular Exponentiation Proof Scheme. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Ming Ng, Steven Vickers |
Point-free Construction of Real Exponentiation. |
Log. Methods Comput. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Stepan L. Kuznetsov, Stanislav O. Speranski |
Infinitary action logic with exponentiation. |
Ann. Pure Appl. Log. |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Kotaro Saito, Akira Ito, Rei Ueno, Naofumi Homma |
One Truth Prevails: A Deep-learning Based Single-Trace Power Analysis on RSA-CRT with Windowed Exponentiation. |
IACR Trans. Cryptogr. Hardw. Embed. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Charlotte Hoffmann, Pavel Hubácek, Chethan Kamath, Karen Klein, Krzysztof Pietrzak |
Practical Statistically-Sound Proofs of Exponentiation in any Group. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
17 | Vidal Attias, Luigi Vigneri, Vassil S. Dimitrov |
Rethinking Modular Multi-Exponentiation in Real-World Applications. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
17 | Charles Bouillaguet, Florette Martinez, Damien Vergnaud |
Cryptanalysis of Modular Exponentiation Outsourcing Protocols. |
Comput. J. |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Giovanni Di Crescenzo, Matluba Khodjaeva, Rajesh Krishnan, David Shur |
Single-Server Delegation of Small-Exponent Exponentiation from Quasilinear-Time Clients and Applications. |
CPSIOTSEC@CCS |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Cong Zhang, Shuaishuai Li, Dongdai Lin |
Amortizing Division and Exponentiation. |
Inscrypt |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Khalid El Makkaoui, Youssef Lamriji, Ibrahim Ouahbi, Omayma Nabil, Anas Bouzahra, Abderrahim Beni Hssane |
Fast Modular Exponentiation Methods for Public-Key Cryptography. |
CommNet |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Yi Lu, Keisuke Hara, Kazuma Ohara, Jacob C. N. Schuldt, Keisuke Tanaka |
Efficient Two-Party Exponentiation from Quotient Transfer. |
ACNS |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Martin Langhammer, Sergey Gribok, Bogdan Pasca 0001 |
Low-Latency Modular Exponentiation for FPGAs. |
FCCM |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Seiya Shimada, Kunihiro Kuroda, Yuta Fukuda, Kota Yoshida, Takeshi Fujino |
Deep Learning-Based Side-Channel Attacks against Software-Implemented RSA using Binary Exponentiation with Dummy Multiplication. |
ATAIT |
2022 |
DBLP BibTeX RDF |
|
17 | Charlotte Hoffmann, Pavel Hubácek, Chethan Kamath, Karen Klein, Krzysztof Pietrzak |
Practical Statistically-Sound Proofs of Exponentiation in Any Group. |
CRYPTO (2) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Richard H. Hammack |
Graph exponentiation and neighborhood reconstruction. |
Discuss. Math. Graph Theory |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Yanli Ren, Min Dong 0007, Zhenxing Qian, Xinpeng Zhang 0001, Guorui Feng |
Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server. |
IEEE Trans. Cloud Comput. |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Qilin Hu, Mingxing Duan, ZhiBang Yang, Siyang Yu, Bin Xiao 0001 |
Efficient Parallel Secure Outsourcing of Modular Exponentiation to Cloud for IoT Applications. |
IEEE Internet Things J. |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Yuki Nanjo, Masaaki Shirase, Takuya Kusaka, Yasuyuki Nogami |
Improvement of Final Exponentiation for Pairings on BLS Curves with Embedding Degree 15. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Kritsanapong Somsuk |
The alternative Method to Finish Modular Exponentiation and Point Multiplication Processes. |
KSII Trans. Internet Inf. Syst. |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Céline Chevalier, Fabien Laguillaumie, Damien Vergnaud |
Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions. |
Algorithmica |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Bhavesh Lakhotia |
Exponentiation Using Laplace Expansion. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
17 | Vidal Attias, Luigi Vigneri, Vassil S. Dimitrov |
Rethinking Modular Multi-Exponentiation in Real-World Applications. |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
17 | Danilo Gligoroski |
Rebuttal to claims in Section 2.1 of the ePrint report 2021/583 "Entropoid-based cryptography is group exponentiation in disguise". |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
17 | Shiping Cai, Zhi Hu, Chang-An Zhao |
Faster Final Exponentiation on the KSS18 Curve. |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
17 | Lorenz Panny |
Entropoid-based cryptography is group exponentiation in disguise. |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
17 | Dmitrii I. Koshelev |
Indifferentiable hashing to ordinary elliptic $\mathbb{F}_{\!q}$-curves of j=0 with the cost of one exponentiation in $\mathbb{F}_{\!q}$. |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
17 | Hridoy Jyoti Mahanta, Ajoy Kumar Khan, Somnath Mukhopadhyay |
Resisting HODPA attacks in modular exponentiation using inner product with differential evolution. |
Innov. Syst. Softw. Eng. |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Margaux Dugardin, Werner Schindler, Sylvain Guilley |
Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods. |
J. Math. Cryptol. |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Tao Wu |
High-Performance RNS Modular Exponentiation by Sum-Residue Reduction. |
|
2021 |
DOI RDF |
|
17 | Ivan A. Smirnov, Larissa V. Cherckesova, Olga A. Safaryan, Denis A. Korochentsev, Vladislav E. Chumakov, Alexandr I. Gavlicky |
Development of Fast Exponentiation Algorithm «To Center and Back». |
EWDTS |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Yuki Nanjo, Masaaki Shirase, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami |
A Construction Method of Final Exponentiation for a Specific Cyclotomic Family of Pairing-Friendly Elliptic Curves with Prime Embedding Degrees. |
CANDAR |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Yuki Nanjo, Masaaki Shirase, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami |
Efficient Final Exponentiation for Pairings on Several Curves Resistant to Special TNFS. |
CANDAR |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Venkata Reddy Kolagatla, J. Mervin, Shabbir Darbar, David Selvakumar, Sankha Saha |
A Randomized Montgomery Powering Ladder Exponentiation for Side-Channel Attack Resilient RSA and Leakage Assessment. |
VDAT |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Duc-Phong Le, Ali A. Ghorbani 0001 |
Memory-Efficient Random Order Exponentiation Algorithm. |
IEEE Access |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Hongjun Li, Jia Yu 0005, Hanlin Zhang, Ming Yang 0023, Huaqun Wang |
Privacy-Preserving and Distributed Algorithms for Modular Exponentiation in IoT With Edge Computing Assistance. |
IEEE Internet Things J. |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Anton Freund |
A note on ordinal exponentiation and derivatives of normal functions. |
Math. Log. Q. |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Thomas Fischbacher, Iulia M. Comsa, Krzysztof Potempa, Moritz Firsching, Luca Versari, Jyrki Alakuijala |
Intelligent Matrix Exponentiation. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
17 | Stepan L. Kuznetsov, Stanislav O. Speranski |
Infinitary Action Logic with Exponentiation. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
17 | Giovanni Di Crescenzo, Matluba Khodjaeva, Delaram Kahrobaei, Vladimir Shpilrain |
Efficient and Secure Delegation of Exponentiation in General Groups to a Single Malicious Server. |
Math. Comput. Sci. |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Yi Liu 0053, Qi Wang 0012, Siu-Ming Yiu |
An Improvement of Multi-Exponentiation with Encrypted Bases Argument: Smaller and Faster. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
17 | Daiki Hayashida, Kenichiro Hayasaka, Tadanori Teruya |
Efficient Final Exponentiation via Cyclotomic Structure for Pairings over Families of Elliptic Curves. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
17 | Hridoy Jyoti Mahanta, Ajoy Kumar Khan, Somnath Mukhopadhyay |
Modular exponentiation with inner product to resist higher-order DPA attacks. |
Innov. Syst. Softw. Eng. |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Hridoy Jyoti Mahanta, Ajoy Kumar Khan |
A secured modular exponentiation for RSA and CRT-RSA with dual blinding to resist power analysis attacks. |
Int. J. Inf. Comput. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Muhua Liu, Ying Wu 0008, Rui Xue 0001, Rui Zhang 0016 |
Verifiable outsourcing computation for modular exponentiation from shareable functions. |
Clust. Comput. |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Qianqian Su, Rui Zhang 0016, Rui Xue 0001 |
Secure Outsourcing Algorithms for Composite Modular Exponentiation Based on Single Untrusted Cloud. |
Comput. J. |
2020 |
DBLP DOI BibTeX RDF |
|