Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Nadia Nedjah, Luiza de Macedo Mourelle |
A Hardware/Software Co-Design versus Hardware-only Implementation of Modular Exponentiation Using the Sliding-Window Method. |
J. Circuits Syst. Comput. |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Alexandre Goldsztejn |
On the Exponentiation of Interval Matrices |
CoRR |
2009 |
DBLP BibTeX RDF |
|
17 | Mohammad Farrokhi Derakhshandeh Ghouchan, Tuomas Hytönen |
The Prime Exponentiation of an Integer: 11315 [2007, 744]. |
Am. Math. Mon. |
2009 |
DBLP BibTeX RDF |
|
17 | Clemens Heuberger, Helmut Prodinger |
Analysis of complements in Multi-Exponentiation Algorithms Using Signed Digit Representations. |
Int. J. Found. Comput. Sci. |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Matthieu Rivain |
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation. |
IACR Cryptol. ePrint Arch. |
2009 |
DBLP BibTeX RDF |
|
17 | Koray Karabina |
Double-Exponentiation in Factor-4 Groups and its Applications. |
IACR Cryptol. ePrint Arch. |
2009 |
DBLP BibTeX RDF |
|
17 | Colin D. Walter |
Randomized Exponentiation Algorithms. |
Cryptographic Engineering |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Ralf Küsters, Tomasz Truderung |
Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation. |
CSF |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Arnaud Boscher, Helena Handschuh, Elena Trichina |
Blinded Fault Resistant Exponentiation Revisited. |
FDTC |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Qiong Pu, Xiuying Zhao |
Montgomery Exponentiation with No Final Comparisons: Improved Results. |
PACCS |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Ali Kooshesh, B. Ravikumar |
Efficient implementation of algorithms for approximate exponentiation. |
Inf. Process. Lett. |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Shmuel T. Klein |
Should one always use repeated squaring for modular exponentiation? |
Inf. Process. Lett. |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Rodrigo Martins da Silva, Nadia Nedjah, Luiza de Macedo Mourelle |
Efficient hardware for modular exponentiation using the sliding-window method. |
Int. J. High Perform. Syst. Archit. |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto |
Some Efficient Algorithms for the Final Exponentiation of etaT Pairing. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Jen-Ho Yang, Chin-Chen Chang 0001 |
Efficient residue number system iterative modular multiplication algorithm for fast modular exponentiation. |
IET Comput. Digit. Tech. |
2008 |
DBLP DOI BibTeX RDF |
|
17 | A. T. Gavrilin |
On the Statistical Exponentiation Method in Cumulant Analysis of Quasideterministic Signals. |
Int. J. Bifurc. Chaos |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Gurgen Asatryan |
On models of exponentiation. Identities in the HSI-algebra of posets. |
Math. Log. Q. |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Steven D. Galbraith, Michael Scott |
Exponentiation in pairing-friendly groups using homomorphisms. |
IACR Cryptol. ePrint Arch. |
2008 |
DBLP BibTeX RDF |
|
17 | Michael Scott, Naomi Benger, Manuel Charlemagne, Luis J. Dominguez Perez, Ezekiel J. Kachisa |
On the final exponentiation for calculating pairings on ordinary elliptic curves. |
IACR Cryptol. ePrint Arch. |
2008 |
DBLP BibTeX RDF |
|
17 | Sedki Boughattas, Jean-Pierre Ressayre |
Arithmetization of the field of reals with exponentiation extended abstract. |
RAIRO Theor. Informatics Appl. |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Christoph Herbst, Marcel Medwed |
Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation. |
WISA |
2008 |
DBLP DOI BibTeX RDF |
Montgomery Ladder, Base Point Blinding, Smart Cards, RSA, Side- Channel Attacks, Power Analysis, Microcontroller, Template Attacks |
17 | Chia-Long Wu |
Fast exponentiation based on common-multiplicand-multiplication and minimal-signed-digit techniques. |
Int. J. Comput. Math. |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Nadia Nedjah, Luiza de Macedo Mourelle |
Parallel computation of modular exponentiation for fast cryptography. |
Int. J. High Perform. Syst. Archit. |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Der-Chyuan Lou, Jui-Chang Lai, Chia-Long Wu, Te-Jen Chang |
An efficient Montgomery exponentiation algorithm by using signed-digit-recoding and folding techniques. |
Appl. Math. Comput. |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Da-Zhi Sun, Jin-Peng Huai, Jizhou Sun, Jiawan Zhang |
Computational efficiency analysis of Wu et al.'s fast modular multi-exponentiation algorithm. |
Appl. Math. Comput. |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Chia-Long Wu, Der-Chyuan Lou, Jui-Chang Lai, Te-Jen Chang |
Fast modular multi-exponentiation using modified complex arithmetic. |
Appl. Math. Comput. |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Sung-Ming Yen, Wei-Chih Lien, Sang-Jae Moon |
Inefficiency of common-multiplicand multiplication and exponentiation algorithms by performing binary complements. |
Appl. Math. Comput. |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Timo Alho, Panu Hämäläinen, Marko Hännikäinen, Timo D. Hämäläinen |
Compact modular exponentiation accelerator for modern FPGA devices. |
Comput. Electr. Eng. |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Da-Zhi Sun, Jin-Peng Huai, Jizhou Sun, Zhen-Fu Cao |
An Efficient Modular Exponentiation Algorithm against Simple Power Analysis Attacks. |
IEEE Trans. Consumer Electron. |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Daniel J. Bernstein, Jonathan P. Sorenson |
Modular exponentiation via the explicit Chinese remainder theorem. |
Math. Comput. |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Andrew Moss, Dan Page, Nigel P. Smart |
Executing Modular Exponentiation on a Graphics Accelerator. |
IACR Cryptol. ePrint Arch. |
2007 |
DBLP BibTeX RDF |
|
17 | Jean-Luc Beuchat, Nicolas Brisebarre, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto |
A Coprocessor for the Final Exponentiation of the etaT Pairing in Characteristic Three. |
IACR Cryptol. ePrint Arch. |
2007 |
DBLP BibTeX RDF |
|
17 | Bodo Möller, Andy Rupp |
Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification. |
IACR Cryptol. ePrint Arch. |
2007 |
DBLP BibTeX RDF |
|
17 | Nadia Nedjah, Luiza de Macedo Mourelle |
Fast hardware for modular exponentiation with efficient exponent pre-processing. |
J. Syst. Archit. |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Bangju Wang, Huanguo Zhang, Yuhua Wang |
Efficient Modular Exponentiation with Three-Moduli (2n 1, 2n+3). |
SNPD (3) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Nabil Abu-Khader, Pepe Siy |
Systolic Galois field exponentiation in a multiple-valued logic technique. |
Integr. |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Rafael Álvarez, Francisco Ferrández, José-Francisco Vicent, Antonio Zamora 0001 |
Applying quick exponentiation for block upper triangular matrices. |
Appl. Math. Comput. |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Da-Zhi Sun, Zhen-Fu Cao, Yu Sun 0023 |
How to compute modular exponentiation with large operators based on the right-to-left binary algorithm. |
Appl. Math. Comput. |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto |
Secure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPA. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Ivan Damgård, Rune Thorbek |
Linear Integer Secret Sharing and Distributed Exponentiation. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
17 | Mihir Bellare, Tadayoshi Kohno, Victor Shoup |
Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
17 | Alexander Rostovtsev |
Fast exponentiation via prime finite field isomorphism. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
17 | Shaoquan Jiang |
Efficient Primitives from Exponentiation in Zp. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
17 | Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto |
Some Efficient Algorithms for the Final Exponentiation of ηT Pairing. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
17 | Guillaume Fumaroli, David Vigilant |
Blinded Fault Resistant Exponentiation. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
17 | Nadia Nedjah, Luiza de Macedo Mourelle |
Three hardware architectures for the binary modular exponentiation: sequential, parallel, and systolic. |
IEEE Trans. Circuits Syst. I Regul. Pap. |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Chia-Long Wu, Der-Chyuan Lou, Jui-Chang Lai, Te-Jen Chang |
Fast Parallel Exponentiation Algorithm for RSA Public-Key Cryptosystem. |
Informatica |
2006 |
DBLP BibTeX RDF |
|
17 | Nadia Nedjah, Luiza de Macedo Mourelle |
Ant Colony Optimisation for Fast Modular Exponentiation using the Sliding Window Method. |
Swarm Intelligent Systems |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Mykola Karpinskyy, Lesya Vasylkiv, Marcin Gizycki |
Secret Key Leakage Caused by Hamming-weight Timing Analysis on Modular Exponentiation. |
Security and Management |
2006 |
DBLP BibTeX RDF |
|
17 | Ivan Damgård, Matthias Fitzi, Eike Kiltz, Jesper Buus Nielsen, Tomas Toft |
Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Camille Vuillaume, Katsuyuki Okeya |
Flexible Exponentiation with Resistance to Side Channel Attacks. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
fractional width, RSA, side channel attacks, simple power analysis |
17 | Bodo Möller |
Signed Digit Exponentiation. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Bodo Möller |
2k-Ary Exponentiation. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Bodo Möller |
Binary exponentiation. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Bodo Möller |
Simultaneous Exponentiation. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
17 | André Weimerskirch |
Fixed-Exponent Exponentiation. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Bodo Möller |
Right-to-Left Exponentiation. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
17 | André Weimerskirch |
Fixed-Base Exponentiation. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Christof Paar |
Exponentiation Algorithms. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Bodo Möller |
Sliding Window Exponentiation. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Christophe Doche |
Exponentiation. |
Handbook of Elliptic and Hyperelliptic Curve Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
17 | W. Charles Holland, Salma Kuhlmann, Stephen H. McCleary |
Lexicographic exponentiation of chains. |
J. Symb. Log. |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Bernard Lang |
Matching with multiplication and exponentiation (extended abstract). |
Math. Struct. Comput. Sci. |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Yasuyuki Sakai, Kouichi Sakurai |
On the Vulnerability of Exponent Recodings for the Exponentiation against Side Channel Attacks. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2005 |
DBLP BibTeX RDF |
|
17 | Nadia Nedjah, Luiza de Macedo Mourelle |
Efficient Pre-Processing for Large Window-Based Modular Exponentiation Using Ant Colony. |
Informatica (Slovenia) |
2005 |
DBLP BibTeX RDF |
|
17 | Boris Zilber |
Pseudo-exponentiation on algebraically closed fields of characteristic zero. |
Ann. Pure Appl. Log. |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Yassine Lakhnech, Laurent Mazaré |
Computationally Sound Verification of Security Protocols Using Diffie-Hellman Exponentiation. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
17 | Eike Kiltz |
Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
17 | Che Wun Chiou, Chiou-Yng Lee |
Multiplexer-based double-exponentiation for normal basis of GF(2m). |
Comput. Secur. |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Jonathan K. Millen, Vitaly Shmatikov |
Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation. |
J. Comput. Secur. |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Jonathan K. Millen, Vitaly Shmatikov |
Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation. |
J. Comput. Secur. |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Chia-Long Wu, Der-Chyuan Lou, Te-Jen Chang |
An Efficient Montgomery Exponentiation Algorithm for Cryptographic Applications. |
Informatica |
2005 |
DBLP BibTeX RDF |
|
17 | Mun-Kyu Lee, Yoonjeong Kim, Kunsoo Park, Yookun Cho |
Efficient parallel exponentiation in GF(qn) using normal basis representations. |
J. Algorithms |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Maria Emilia Maietti |
Predicative exponentiation of locally compact formal topologies over inductively generated ones. |
From sets and types to topology and analysis |
2005 |
DBLP BibTeX RDF |
|
17 | Viktor Bunimov, Manfred Schimmler |
Completely Redundant Modular Exponentiation by Operand Changing. |
CDES |
2005 |
DBLP BibTeX RDF |
|
17 | Panu Hämäläinen, Ning Liu, Marko Hännikäinen, Timo D. Hämäläinen |
Acceleration of Modular Exponentiation on System-on-a-Programmable-Chip. |
SoC |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Der-Chyuan Lou, Chia-Long Wu |
Parallel exponentiation using common-multiplicand-multiplication and signed-digit-folding techniques. |
Int. J. Comput. Math. |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Der-Chyuan Lou, Chia-Long Wu |
Parallel Modular Exponentiation Using Signed-Digit-Folding Technique. |
Informatica (Slovenia) |
2004 |
DBLP BibTeX RDF |
|
17 | Ronald Cramer, Ivan Damgård |
Secret-Key Zero-Knowlegde and Non-interactive Verifiable Exponentiation. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Der-Chyuan Lou, Chia-Long Wu, Ching-Yin Chen |
Fast exponentiation by folding the signed-digit exponent in half. |
Int. J. Comput. Math. |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Hamza Ali, Hamed Fawareh |
Tabulated Modular Exponentiation (TME) Algorithm for Enhancing RSA Public Key Encryption Speed. |
Int. Arab J. Inf. Technol. |
2003 |
DBLP BibTeX RDF |
|
17 | Nick Howgrave-Graham, Phong Q. Nguyen, Igor E. Shparlinski |
Hidden number problem with hidden multipliers, timed-release crypto, and noisy exponentiation. |
Math. Comput. |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Colin D. Walter |
Security Constraints on the Oswald-Aigner Exponentiation Algorithm. |
IACR Cryptol. ePrint Arch. |
2003 |
DBLP BibTeX RDF |
|
17 | Keon-Jik Lee, Kee-Won Kim, Won-Ho Lee, Young-Jun Heo, Kee-Young Yoo |
Design of a Linear Systolic Modular Multiplier/Squarer for the Fast Modular Exponentiation. |
Int. J. Comput. Their Appl. |
2003 |
DBLP BibTeX RDF |
|
17 | Nadia Nedjah, Luiza de Macedo Mourelle |
Fast reconfigurable systolic hardware for modular multiplication and exponentiation. |
J. Syst. Archit. |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Willy Susilo, Jianyong Huang, Jennifer Seberry |
On Using Fast Exponentiation Algorithm in PDAs (or: How Secure is the Discrete Logarithm Problem Assumption in PDAs?). |
Security and Management |
2003 |
DBLP BibTeX RDF |
|
17 | S. H. Tang, K. S. Tsui, Philip Heng Wai Leong |
Modular exponentiation using parallel multipliers. |
FPT |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Maria Emilia Maietti, Silvio Valentini |
Exponentiation of Scott Formal Topologies. |
Workshop on Domains |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Arnold Beckmann |
Notations for exponentiation. |
Theor. Comput. Sci. |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Oded Goldreich 0001, Vered Rosen |
On the Security of Modular Exponentiation with Application to the Construction of Pseudorandom Generators |
Electron. Colloquium Comput. Complex. |
2002 |
DBLP BibTeX RDF |
|
17 | Roberto Maria Avanzi |
On multi-exponentiation in cryptography. |
IACR Cryptol. ePrint Arch. |
2002 |
DBLP BibTeX RDF |
|
17 | Giuseppe Alia, Enrico Martinelli |
Fast modular exponentiation of large numbers with large exponents. |
J. Syst. Archit. |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Colin D. Walter |
Breaking the Liardet-Smart Randomized Exponentiation Algorithm. |
CARDIS |
2002 |
DBLP BibTeX RDF |
|
17 | Hyun-Sung Kim 0001, Kee-Young Yoo |
Basic Architecture for Modular Exponentiation over GF(2m). |
CATA |
2002 |
DBLP BibTeX RDF |
|
17 | Martijn Stam, Arjen K. Lenstra |
Efficient Subgroup Exponentiation in Quadratic and Sixth Degree Extensions. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
LUC, finite field, XTR, cyclotomic polynomial |
17 | Luke O'Connor |
On String Replacement Exponentiation. |
Des. Codes Cryptogr. |
2001 |
DBLP BibTeX RDF |
|
17 | Vered Rosen |
On the Security of Modular Exponentiation |
Electron. Colloquium Comput. Complex. |
2001 |
DBLP BibTeX RDF |
|
17 | Marco Gribaudo, Reinhard German |
Numerical Analysis of Bounded Fluid Models using Matrix Exponentiation. |
MMB |
2001 |
DBLP BibTeX RDF |
|
17 | Joel C. Miller, Gregory Rae, Fred Schaefer |
Modifications of Kleinberg's HITS Algorithm Using Matrix Exponentiation and WebLog Records. |
SIGIR |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Mun-Kyu Lee, Yoonjeong Kim, Kunsoo Park, Yookun Cho |
Efficient parallel exponentiation in GF(2n) using normal basis representations. |
SPAA |
2001 |
DBLP DOI BibTeX RDF |
|