The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for exponentiation with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1960-1985 (17) 1986-1989 (15) 1990-1991 (18) 1992-1993 (18) 1994-1995 (22) 1996-1997 (22) 1998 (22) 1999 (20) 2000 (27) 2001 (31) 2002 (30) 2003 (53) 2004 (53) 2005 (66) 2006 (54) 2007 (60) 2008 (42) 2009 (44) 2010 (15) 2011 (34) 2012 (21) 2013 (19) 2014 (17) 2015 (25) 2016 (17) 2017-2018 (30) 2019 (19) 2020-2021 (32) 2022 (22) 2023-2024 (10)
Publication types (Num. hits)
article(323) data(1) incollection(26) inproceedings(525)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 645 occurrences of 247 keywords

Results
Found 875 publication records. Showing 875 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
19Debdeep Mukhopadhyay, Pallavi Joshi, Dipanwita Roy Chowdhury An Efficient Design of Cellular Automata Based Cryptographically Robust One-Way Function. Search on Bibsonomy VLSI Design The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Yi Wang 0016, Jussipekka Leiwo, Thambipillai Srikanthan, Yu Yu FPGA based DPA-resistant Unified Architecture for Signcryption. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Bonseok Koo, Dongwook Lee, Gwonho Ryu, Taejoo Chang, Sangjin Lee 0002 High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Booth’s algorithm, RSA, Chinese Remainder Theorem, Montgomery multiplication, Carry Save Adder
19Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim 0001 Further Security Analysis of XTR. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF XTR public key system, XTR-ISE, differential power analysis
19Neil Smyth, Máire McLoone, John V. McCanny An Adaptable And Scalable Asymmetric Cryptographic Processor. Search on Bibsonomy ASAP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Yannick Chevalier, Michaël Rusinowitch Hierarchical Combination of Intruder Theories. Search on Bibsonomy RTA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Arjen K. Lenstra, Dan Page, Martijn Stam Discrete Logarithm Variants of VSH. Search on Bibsonomy VIETCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cyclotomic Subgroup, Hash Functions, Collision Resistance
19Endre Bangerter, Jan Camenisch, Ueli M. Maurer Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Alden H. Wright, Sandeep Pulavarty On the convergence of an estimation of distribution algorithm based on linkage discovery and factorization. Search on Bibsonomy GECCO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Boltzmann distribution, genetic algorithms, evolutionary computation, estimation of distribution algorithms, factorization
19Régis Bevan Improved Zero Value Attack on XTR. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF MRPA, smart cards, Power Analysis, DFA, XTR
19Ren-Junn Hwang, Feng-Fu Su, Yi-Shiung Yeh, Chia-Yao Chen An Efficient Decryption Method for RSA Cryptosystem. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Nareli Cruz Cortés, Francisco Rodríguez-Henríquez, Raúl Juárez-Morales, Carlos A. Coello Coello Finding Optimal Addition Chains Using a Genetic Algorithm Approach. Search on Bibsonomy CIS (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Nadia Nedjah, Luiza de Macedo Mourelle Finding Minimal Addition Chains Using Ant Colony. Search on Bibsonomy IDEAL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Christopher C. Doss, Robert L. Riley Jr. FPGA-Based Implementation of a Robust IEEE-754 Exponential Unit. Search on Bibsonomy FCCM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Dong-Guk Han, Jongin Lim 0001, Kouichi Sakurai On Security of XTR Public Key Cryptosystems Against Side Channel Attacks. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF XTR Public Key Cryptosystem, Data-bit DPA, Address-bit DPA, doubling attack, Side Channel Attacks, SPA
19Nadia Nedjah, Luiza de Macedo Mourelle Evolutionary RSA-Based Cryptographic Hardware Using the Co-Design Methodology. Search on Bibsonomy IEA/AIE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Yasuyuki Sakai, Kouichi Sakurai A New Attack with Side Channel Leakage During Exponent Recoding Computations. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF exponent recoding, Side channel attack, elliptic curve cryptosystems, RSA cryptosystems
19Christopher Lynch, Catherine Meadows 0001 Sound Approximations to Diffie-Hellman Using Rewrite Rules. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Jin-Hua Hong, Cheng-Wen Wu Cellular-array modular multiplier for fast RSA public-key cryptosystem based on modified Booth's algorithm. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Martijn Stam On Montgomery-Like Representationsfor Elliptic Curves over GF(2k). Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Lucas chains, ECC, point multiplication, Montgomery
19Ciaran McIvor, Máire McLoone, John V. McCanny A high-speed, low latency RSA decryption silicon core. Search on Bibsonomy ISCAS (4) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Jun-Cheol Jeon, Kee-Young Yoo Computational Algorithm and Architecture for AB2 Multiplication in Finite Fields. Search on Bibsonomy ICCSA (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Marcelo P. Fiore, Roberto Di Cosmo, Vincent Balat Remarks on Isomorphisms in Typed Lambda Calculi with Empty and Sum Types. Search on Bibsonomy LICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Yaron Sella Speeding Up Secure Sessions Establishment on the Internet. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Bert den Boer, Kerstin Lemke, Guntram Wicke A DPA Attack against the Modular Reduction within a CRT Implementation of RSA. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF RSA, DPA, power analysis, smartcard, CRT, side channel analysis, modular reduction
19Chung-Hsien Wu, Jin-Hua Hong, Cheng-Wen Wu RSA cryptosystem design based on the Chinese remainder theorem. Search on Bibsonomy ASP-DAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Markus Jakobsson, Susanne Wetzel Secure Server-Aided Signature Generation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF DSS, error-detection, delegation, Batch, duplication
19Adam L. Young, Moti Yung A PVSS as Hard as Discrete Log and Shareholder Separability. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Detlef Hühnlein, Sachar Paulus On the Implementation of Cryptosystems Based on Real Quadratic Number Fields. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
19Shin-ichi Kawamura, Masanobu Koike, Fumihiko Sano, Atsushi Shimbo Cox-Rower Architecture for Fast Parallel Montgomery Multiplication. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
19Werner Schindler A Timing Attack against RSA with the Chinese Remainder Theorem. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF RSA, Chinese Remainder Theorem, Montgomery multiplication, Timing attack
19Chih-Yuang Su, Shih-Am Hwang, Po-Song Chen, Cheng-Wen Wu An improved Montgomery's algorithm for high-speed RSA public-key cryptosystem. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
19Alexander Tiountchik, Elena Trichina RSA Acceleration with Field Programmable Gate Arrays. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
19S. K. Jain, Leilei Song, Keshab K. Parhi Efficient semisystolic architectures for finite-field arithmetic. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
19Victor Boyko, Marcus Peinado, Ramarathnam Venkatesan Speeding up Discrete Log and Factoring Based Schemes via Precomputations. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
19Christof Paar, Pedro Soria-Rodriguez Fast Arithmetic Architectures for Public-Key Algorithms over Galois Fields GF((2n)m). Search on Bibsonomy EUROCRYPT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
19Martin Kochanski Developing an RSA Chip. Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
17Steven T. Dougherty, Joseph Klobusicky, Serap Sahinkaya, Deniz Ustun An S-Box construction from exponentiation in finite fields and its application in RGB color image encryption. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Saeed Aghapour, Kasra Ahmadi, Mehran Mozaffari Kermani, Reza Azarderakhsh Efficient Fault Detection Architectures for Modular Exponentiation Targeting Cryptographic Applications Benchmarked on FPGAs. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Charlotte Hoffmann, Krzysztof Pietrzak Watermarkable and Zero-Knowledge Verifiable Delay Functions from any Proof of Exponentiation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
17Charlotte Hoffmann, Pavel Hubácek, Svetlana Ivanova Practical Batch Proofs of Exponentiation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
17Vidal Attias, Luigi Vigneri, Vassil S. Dimitrov Rethinking modular multi-exponentiation in real-world applications. Search on Bibsonomy J. Cryptogr. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Bart Mennink Secure Distributed Modular Exponentiation: Systematic Analysis and New Results. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Rei Ueno, Naofumi Homma How Secure is Exponent-blinded RSA-CRT with Sliding Window Exponentiation? Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Michele Fabbrini Circular Multiplicative Modular Exponentiation: A New Public Key Exchange Algorithm. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
17Ihor Prots'ko, Aleksandr Gryshchuk, Volodymyr Riznyk Efficient Multithreading Computation of Modular Exponentiation with Pre-computation of Residues for Fixed-base. Search on Bibsonomy CMIS The full citation details ... 2023 DBLP  BibTeX  RDF
17Victor Krasnobayev, Alina Yanko, Anatolii Martynenko, Dmytro Kovalchuk Method for Computing Exponentiation Modulo the Positive and Negative Integers. Search on Bibsonomy ICST The full citation details ... 2023 DBLP  BibTeX  RDF
17Adrian Tatulian, Ronald F. DeMara Generalized Exponentiation Using STT Magnetic Tunnel Junctions: Circuit Design, Performance, and Application to Neural Network Gradient Decay. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Jonathan David Farley Poset Exponentiation and a Counterexample Birkhoff Said in 1942 He Did Not Have. Search on Bibsonomy Order The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Hridoy Jyoti Mahanta, Keshab Nath, Amit Kumar Roy, Ketan Kotecha, Varadarajan Vijayakumar 0001 Using Genetic Algorithm in Inner Product to Resist Modular Exponentiation From Higher Order DPA Attacks. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Wei He, Yu Zhang, Yin Li An Efficient Exponentiation Algorithm in GF(2m) Using Euclidean Inversion. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Shiping Cai, Zhi Hu, Changan Zhao Faster Final Exponentiation on the KSS18 Curve. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Dmitrii I. Koshelev Indifferentiable hashing to ordinary elliptic ${\mathbb {F}}_{\!q}$-curves of j=0 with the cost of one exponentiation in ${\mathbb {F}}_{\!q}$. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Amin Monfared, Mostafa M. I. Taha, Arash Reyhani-Masoleh Secure and Efficient Exponentiation Architectures Using Gaussian Normal Basis. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Yuki Nanjo, Masaaki Shirase, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami Efficient Final Exponentiation for Cyclotomic Families of Pairing-Friendly Elliptic Curves with Any Prime Embedding Degrees. Search on Bibsonomy Int. J. Netw. Comput. The full citation details ... 2022 DBLP  BibTeX  RDF
17Darren Li, Yves Gallot An Efficient Modular Exponentiation Proof Scheme. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Ming Ng, Steven Vickers Point-free Construction of Real Exponentiation. Search on Bibsonomy Log. Methods Comput. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Stepan L. Kuznetsov, Stanislav O. Speranski Infinitary action logic with exponentiation. Search on Bibsonomy Ann. Pure Appl. Log. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Kotaro Saito, Akira Ito, Rei Ueno, Naofumi Homma One Truth Prevails: A Deep-learning Based Single-Trace Power Analysis on RSA-CRT with Windowed Exponentiation. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Charlotte Hoffmann, Pavel Hubácek, Chethan Kamath, Karen Klein, Krzysztof Pietrzak Practical Statistically-Sound Proofs of Exponentiation in any Group. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
17Vidal Attias, Luigi Vigneri, Vassil S. Dimitrov Rethinking Modular Multi-Exponentiation in Real-World Applications. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
17Charles Bouillaguet, Florette Martinez, Damien Vergnaud Cryptanalysis of Modular Exponentiation Outsourcing Protocols. Search on Bibsonomy Comput. J. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Giovanni Di Crescenzo, Matluba Khodjaeva, Rajesh Krishnan, David Shur Single-Server Delegation of Small-Exponent Exponentiation from Quasilinear-Time Clients and Applications. Search on Bibsonomy CPSIOTSEC@CCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Cong Zhang, Shuaishuai Li, Dongdai Lin Amortizing Division and Exponentiation. Search on Bibsonomy Inscrypt The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Khalid El Makkaoui, Youssef Lamriji, Ibrahim Ouahbi, Omayma Nabil, Anas Bouzahra, Abderrahim Beni Hssane Fast Modular Exponentiation Methods for Public-Key Cryptography. Search on Bibsonomy CommNet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Yi Lu, Keisuke Hara, Kazuma Ohara, Jacob C. N. Schuldt, Keisuke Tanaka Efficient Two-Party Exponentiation from Quotient Transfer. Search on Bibsonomy ACNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Martin Langhammer, Sergey Gribok, Bogdan Pasca 0001 Low-Latency Modular Exponentiation for FPGAs. Search on Bibsonomy FCCM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Seiya Shimada, Kunihiro Kuroda, Yuta Fukuda, Kota Yoshida, Takeshi Fujino Deep Learning-Based Side-Channel Attacks against Software-Implemented RSA using Binary Exponentiation with Dummy Multiplication. Search on Bibsonomy ATAIT The full citation details ... 2022 DBLP  BibTeX  RDF
17Charlotte Hoffmann, Pavel Hubácek, Chethan Kamath, Karen Klein, Krzysztof Pietrzak Practical Statistically-Sound Proofs of Exponentiation in Any Group. Search on Bibsonomy CRYPTO (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Richard H. Hammack Graph exponentiation and neighborhood reconstruction. Search on Bibsonomy Discuss. Math. Graph Theory The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
17Yanli Ren, Min Dong 0007, Zhenxing Qian, Xinpeng Zhang 0001, Guorui Feng Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server. Search on Bibsonomy IEEE Trans. Cloud Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
17Qilin Hu, Mingxing Duan, ZhiBang Yang, Siyang Yu, Bin Xiao 0001 Efficient Parallel Secure Outsourcing of Modular Exponentiation to Cloud for IoT Applications. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
17Yuki Nanjo, Masaaki Shirase, Takuya Kusaka, Yasuyuki Nogami Improvement of Final Exponentiation for Pairings on BLS Curves with Embedding Degree 15. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
17Kritsanapong Somsuk The alternative Method to Finish Modular Exponentiation and Point Multiplication Processes. Search on Bibsonomy KSII Trans. Internet Inf. Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
17Céline Chevalier, Fabien Laguillaumie, Damien Vergnaud Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions. Search on Bibsonomy Algorithmica The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
17Bhavesh Lakhotia Exponentiation Using Laplace Expansion. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
17Vidal Attias, Luigi Vigneri, Vassil S. Dimitrov Rethinking Modular Multi-Exponentiation in Real-World Applications. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
17Danilo Gligoroski Rebuttal to claims in Section 2.1 of the ePrint report 2021/583 "Entropoid-based cryptography is group exponentiation in disguise". Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
17Shiping Cai, Zhi Hu, Chang-An Zhao Faster Final Exponentiation on the KSS18 Curve. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
17Lorenz Panny Entropoid-based cryptography is group exponentiation in disguise. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
17Dmitrii I. Koshelev Indifferentiable hashing to ordinary elliptic $\mathbb{F}_{\!q}$-curves of j=0 with the cost of one exponentiation in $\mathbb{F}_{\!q}$. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
17Hridoy Jyoti Mahanta, Ajoy Kumar Khan, Somnath Mukhopadhyay Resisting HODPA attacks in modular exponentiation using inner product with differential evolution. Search on Bibsonomy Innov. Syst. Softw. Eng. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
17Margaux Dugardin, Werner Schindler, Sylvain Guilley Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods. Search on Bibsonomy J. Math. Cryptol. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
17Tao Wu High-Performance RNS Modular Exponentiation by Sum-Residue Reduction. Search on Bibsonomy 2021   DOI  RDF
17Ivan A. Smirnov, Larissa V. Cherckesova, Olga A. Safaryan, Denis A. Korochentsev, Vladislav E. Chumakov, Alexandr I. Gavlicky Development of Fast Exponentiation Algorithm «To Center and Back». Search on Bibsonomy EWDTS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
17Yuki Nanjo, Masaaki Shirase, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami A Construction Method of Final Exponentiation for a Specific Cyclotomic Family of Pairing-Friendly Elliptic Curves with Prime Embedding Degrees. Search on Bibsonomy CANDAR The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
17Yuki Nanjo, Masaaki Shirase, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami Efficient Final Exponentiation for Pairings on Several Curves Resistant to Special TNFS. Search on Bibsonomy CANDAR The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
17Venkata Reddy Kolagatla, J. Mervin, Shabbir Darbar, David Selvakumar, Sankha Saha A Randomized Montgomery Powering Ladder Exponentiation for Side-Channel Attack Resilient RSA and Leakage Assessment. Search on Bibsonomy VDAT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
17Duc-Phong Le, Ali A. Ghorbani 0001 Memory-Efficient Random Order Exponentiation Algorithm. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
17Hongjun Li, Jia Yu 0005, Hanlin Zhang, Ming Yang 0023, Huaqun Wang Privacy-Preserving and Distributed Algorithms for Modular Exponentiation in IoT With Edge Computing Assistance. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
17Anton Freund A note on ordinal exponentiation and derivatives of normal functions. Search on Bibsonomy Math. Log. Q. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
17Thomas Fischbacher, Iulia M. Comsa, Krzysztof Potempa, Moritz Firsching, Luca Versari, Jyrki Alakuijala Intelligent Matrix Exponentiation. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
17Stepan L. Kuznetsov, Stanislav O. Speranski Infinitary Action Logic with Exponentiation. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
17Giovanni Di Crescenzo, Matluba Khodjaeva, Delaram Kahrobaei, Vladimir Shpilrain Efficient and Secure Delegation of Exponentiation in General Groups to a Single Malicious Server. Search on Bibsonomy Math. Comput. Sci. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
17Yi Liu 0053, Qi Wang 0012, Siu-Ming Yiu An Improvement of Multi-Exponentiation with Encrypted Bases Argument: Smaller and Faster. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
17Daiki Hayashida, Kenichiro Hayasaka, Tadanori Teruya Efficient Final Exponentiation via Cyclotomic Structure for Pairings over Families of Elliptic Curves. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
17Hridoy Jyoti Mahanta, Ajoy Kumar Khan, Somnath Mukhopadhyay Modular exponentiation with inner product to resist higher-order DPA attacks. Search on Bibsonomy Innov. Syst. Softw. Eng. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
17Hridoy Jyoti Mahanta, Ajoy Kumar Khan A secured modular exponentiation for RSA and CRT-RSA with dual blinding to resist power analysis attacks. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
17Muhua Liu, Ying Wu 0008, Rui Xue 0001, Rui Zhang 0016 Verifiable outsourcing computation for modular exponentiation from shareable functions. Search on Bibsonomy Clust. Comput. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
17Qianqian Su, Rui Zhang 0016, Rui Xue 0001 Secure Outsourcing Algorithms for Composite Modular Exponentiation Based on Single Untrusted Cloud. Search on Bibsonomy Comput. J. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 875 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license