The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for exponentiation with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1960-1985 (17) 1986-1989 (15) 1990-1991 (18) 1992-1993 (18) 1994-1995 (22) 1996-1997 (22) 1998 (22) 1999 (20) 2000 (27) 2001 (31) 2002 (30) 2003 (53) 2004 (53) 2005 (66) 2006 (54) 2007 (60) 2008 (42) 2009 (44) 2010 (15) 2011 (34) 2012 (21) 2013 (19) 2014 (17) 2015 (25) 2016 (17) 2017-2018 (30) 2019 (19) 2020-2021 (32) 2022 (22) 2023-2024 (10)
Publication types (Num. hits)
article(323) data(1) incollection(26) inproceedings(525)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 645 occurrences of 247 keywords

Results
Found 875 publication records. Showing 875 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
10Yvo Desmedt, Duong Hieu Phan A CCA Secure Hybrid Damgård's ElGamal Encryption. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Onur Aciiçmez, Werner Schindler A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Instruction-Cache Attack, MicroArchitectural Analysis, RSA, Stochastic Process, Side Channel Analysis, Montgomery Multiplication
10Nadia Nedjah, Luiza de Macedo Mourelle Evolutionary Public-Key Cryptographic Circuits. Search on Bibsonomy IEA/AIE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Yumi Sakemi, Yasuyuki Nogami, Katsuyuki Okeya, Hidehiro Katou, Yoshitaka Morikawa Skew Frobenius Map and Efficient Scalar Multiplication for Pairing-Based Cryptography. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10M. Sudhakar, Ramachandruni Venkata Kamala, M. B. Srinivas New and Improved Architectures for Montgomery Modular Multiplication. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF reconfigurable multiplier, scalable multiplier, RSA, ECC, carry save adders, Montgomery modular multiplication
10Hamid Sarbazi-Azad The performance of synchronous parallel polynomial root extraction on a ring multicomputer. Search on Bibsonomy Clust. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Polynomial root extraction, Ring architecture, Durand-Kerner method, Parallel algorithms, Iterative techniques
10Zehra Cataltepe, Eser Aygün An Improvement of Centroid-Based Classification Algorithm for Text Classification. Search on Bibsonomy ICDE Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Nan Jiang 0009, David Money Harris Parallelized radix-2 scalable Montgomery multiplier. Search on Bibsonomy VLSI-SoC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Marcello M. Bonsangue, Alexander Kurz 0001 Pi-Calculus in Logical Form. Search on Bibsonomy LICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Sergiu Bursuc, Hubert Comon-Lundh, Stéphanie Delaune Deducibility Constraints, Equational Theory and Electronic Money. Search on Bibsonomy Rewriting, Computation and Proof The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Xiangxue Li, Dong Zheng 0001, Kefei Chen Efficient Blind Signatures from Linear Feedback Shift Register. Search on Bibsonomy CDVE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Linear Feedback Shift Register, Blind Signature
10Augusto Jun Devegili, Michael Scott, Ricardo Dahab Implementing Cryptographic Pairings over Barreto-Naehrig Curves. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Tamer Güdü A New Scalable Hardware Architecture for RSA Algorithm. Search on Bibsonomy FPL The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Ping Tak Peter Tang Modular Multiplication using Redundant Digit Division. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Chong Hee Kim, Jean-Jacques Quisquater Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Sung-Kyoung Kim, Dong-Guk Han, Howon Kim 0001, Kyoil Chung, Jongin Lim 0001 SPA Countermeasure Based on Unsigned Left-to-Right Recodings. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Eun-Jun Yoon, Kee-Young Yoo A Secret-Key Exponential Key Agreement Protocol with Smart Cards. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Robert Granger, Florian Hess, Roger Oyono, Nicolas Thériault, Frederik Vercauteren Ate Pairing on Hyperelliptic Curves. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF finite fields, Tate pairing, hyperelliptic curves, Ate pairing
10Colin D. Walter Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter Ones. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RSA, DPA, power analysis, SPA, Side channel leakage
10Andrew Moss, Dan Page, Nigel P. Smart Toward Acceleration of RSA Using 3D Graphics Hardware. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Emmanuel Bresson, Yassine Lakhnech, Laurent Mazaré, Bogdan Warinschi A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Protocol Security, Provable Scurity, Computational Soundness, Diffie-Hellman Assumptions
10Wael Adi, Rolf Ernst, Bassel Soudan, Abdulrahman Hanoun VLSI Design Exchange with Intellectual Property Protection in FPGA Environment Using both Secret and Public-Key Cryptography. Search on Bibsonomy ISVLSI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Xue-mi Zhao, Zhiying Wang 0003, Hongyi Lu, Kui Dai A 6.35Mbps 1024-bit RSA crypto coprocessor in a 0.18um CMOS technology. Search on Bibsonomy VLSI-SoC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Chingwei Yeh, En-Feng Hsu, Kai-Wen Cheng, Jinn-Shyan Wang, Nai-Jen Chang An 830mW, 586kbps 1024-bit RSA chip design. Search on Bibsonomy DATE Designers' Forum The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Robert Granger, Dan Page, Nigel P. Smart High Security Pairing-Based Cryptography Revisited. Search on Bibsonomy ANTS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Darshan D. Thaker, Tzvetan S. Metodi, Frederic T. Chong A Realizable Distributed Ion-Trap Quantum Computer. Search on Bibsonomy HiPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Roberto Zunino, Pierpaolo Degano Handling exp, × (and Timestamps) in Protocol Analysis. Search on Bibsonomy FoSSaCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Frédéric Muller, Frédéric Valette High-Order Attacks Against the Exponent Splitting Protection. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Isamu Teranishi, Kazue Sako k-Times Anonymous Authentication with a Constant Proving Cost. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF k-times anonymous authentication, efficiency, public verifiability
10Abusaleh M. Jabir, Dhiraj K. Pradhan, Jimson Mathew An efficient technique for synthesis and optimization of polynomials in GF(2m). Search on Bibsonomy ICCAD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Hyun-Sung Kim 0001, Sung-Woon Lee Low Complexity Systolic Architecture for Modular Multiplication over GF(2m). Search on Bibsonomy International Conference on Computational Science (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Seungwon Lee, Yookun Cho Efficient Batch Verification for RSA-Type Digital Signatures in a Ubiquitous Environment. Search on Bibsonomy EUC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Mathieu Turuani The CL-Atse Protocol Analyser. Search on Bibsonomy RTA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Ambrose Chu, Mihai Sima Reconfigurable RSA Cryptography for Embedded Devices. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Lih-Chung Wang, Bo-Yin Yang, Yuh-Hua Hu, Feipei Lai A "Medium-Field" Multivariate Public-Key Encryption Scheme. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Alexandros Agapitos, Simon M. Lucas Learning Recursive Functions with Object Oriented Genetic Programming. Search on Bibsonomy EuroGP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Jin-Hua Hong, Bin-Yan Tsai A Fast Bit-Interleaving RSA Cryptosystem Based on Radix-4 Cellular-Array Modular Multiplier. Search on Bibsonomy APCCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Rosario Gennaro An Improved Pseudo-Random Generator Based on the Discrete Logarithm Problem. Search on Bibsonomy J. Cryptol. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Discrete logarithm, Pseudorandomness
10Joachim von zur Gathen, Michael Nöcker Polynomial and Normal Bases for Finite Fields. Search on Bibsonomy J. Cryptol. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Panagiotis Manolios, Daron Vroon 0001 Ordinal Arithmetic: Algorithms and Mechanization. Search on Bibsonomy J. Autom. Reason. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF automated reasoning, arithmetic, ACL2, ordinal
10Prateek Gupta, Vitaly Shmatikov Towards computationally sound symbolic analysis of key exchange protocols. Search on Bibsonomy FMSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF protocol logic, cryptographic protocols, symbolic analysis, computational soundness
10Alessandro Cilardo, Antonino Mazzeo, Nicola Mazzocca, Luigi Romano A Novel Unified Architecture for Public-Key Cryptography. Search on Bibsonomy DATE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Yannick Chevalier, Michaël Rusinowitch Combining Intruder Theories. Search on Bibsonomy ICALP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Deepak Kapur, Paliath Narendran, Lida Wang A Unification Algorithm for Analysis of Protocols with Blinded Signatures. Search on Bibsonomy Mechanizing Mathematical Reasoning The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee A Traitor Tracing Scheme Based on RSA for Fast Decryption. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10SeongHan Shin, Kazukuni Kobara, Hideki Imai Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10David Money Harris, Ram Krishnamurthy 0001, Mark A. Anders 0001, Sanu Mathew, Steven Hsu An Improved Unified Scalable Radix-2 Montgomery Multiplier. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Dhananjay S. Phatak, Tom Goff Fast Modular Reduction for Large Wordlengths via One Linear and One Cyclic Convolution. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 2005 DBLP  DOI  BibTeX  RDF fast modular reduction, large wordlength, FFT multiply, linear convolution, principle of separation, cryptography, elliptic-curve, number theoretic transforms, cyclic convolution
10Hamid Sarbazi-Azad Parallel Polynomial Root Extraction on A Ring of Processors. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Michael Haselman, Michael J. Beauchamp, Aaron Wood, Scott Hauck, Keith D. Underwood, K. Scott Hemmert A Comparison of Floating Point and Logarithmic Number Systems for FPGAs. Search on Bibsonomy FCCM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Lih-Chung Wang, Yuh-Hua Hu, Feipei Lai, Chun-yen Chou, Bo-Yin Yang Tractable Rational Map Signature. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF tractable rational maps, digital signature, finite field, public key, multivariate
10Christophe Doche Redundant Trinomials for Finite Fields of Characteristic 2. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Katsuyuki Takashima Practical Modifications of Leadbitter et al.'s Repeated-Bits Side-Channel Analysis on (EC)DSA. Search on Bibsonomy WISA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF (EC)DSA, Side-channel analysis (attack), Lattice basis reduction algorithm, Window method
10David Molnar, Matt Piotrowski, David Schultz, David A. Wagner 0001 The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Qiang Liu, Dong Tong 0001, Xu Cheng 0001 Non-interleaving architecture for hardware implementation of modular multiplication. Search on Bibsonomy ISCAS (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Apostolos P. Fournaris, Odysseas G. Koufopavlou A new RSA encryption architecture and hardware implementation based on optimized Montgomery multiplication. Search on Bibsonomy ISCAS (5) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Jong-wan Seo, Myong-Chul Shin A study on an ASIC design technique for digital protective relays. Search on Bibsonomy ISCAS (4) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Hubert Comon-Lundh, Stéphanie Delaune The Finite Variant Property: How to Get Rid of Some Algebraic Properties. Search on Bibsonomy RTA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang 0001 An Improved Low Computation Cost User Authentication Scheme for Mobile Communication. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Chih-Chung Lu, Shau-Yin Tseng, Szu-Kai Huang A Secure Modular Exponential Algorithm Resists to Power, Timing, C Safe Error and M Safe Error Attacks. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Kyle Kelley, David Money Harris Very High Radix Scalable Montgomery Multipliers. Search on Bibsonomy IWSOC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Siguna Müller On the Computation of Square Roots in Finite Fields. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF complexity, finite fields, square roots, efficient computation
10Benoît Chevallier-Mames, Mathieu Ciet, Marc Joye Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Johan Håstad, Mats Näslund The security of all RSA and discrete log bits. Search on Bibsonomy J. ACM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF RSA-encryption, bit-security, complexity, Cryptography, discrete logarithms
10Bi-Hui Chen Improvement of authenaticated multiple-key agreement protocol. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF multiple-key, authenticated, key agreement
10Roberto Di Cosmo, Thomas Dufour The Equational Theory of < N, 0, 1, +, ×, uparrow > Is Decidable, but Not Finitely Axiomatisable. Search on Bibsonomy LPAR The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Dan Page, Martijn Stam On XTR and Side-Channel Analysis. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF LUC, finite field, side channel attack, power analysis, XTR
10Michael Gordon Abbott, Thorsten Altenkirch, Neil Ghani Representing Nested Inductive Types Using W-Types. Search on Bibsonomy ICALP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Ross J. Anderson The Dancing Bear: A New Way of Composing Ciphers. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Permandla Pratibha, Siva Nageswara Rao Borra, Annamalai Muthukaruppan, Sivaprakasam Suresh, V. Kamakoti 0001 An Evolutionary Algorithm for Automatic Spatial Partitioning in Reconfigurable Environments. Search on Bibsonomy MICAI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Song Han 0004, Jie Wang 0038, Wanquan Liu An Efficient Identity-Based Group Signature Scheme over Elliptic Curves. Search on Bibsonomy ECUMN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Network Security, Anonymity, Security Protocol, Group Signatures, Weil Pairings
10BaiJie Kuang, Yuefei Zhu, YaJuan Zhang An Improved Algorithm for uP + vQ Using JSF13. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Nadia Nedjah, Luiza de Macedo Mourelle Towards Very Fast Modular Exponentiations Using Ant Colony. Search on Bibsonomy WSC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10M. R. K. Krishna Rao Learnability of Simply-Moded Logic Programs from Entailment. Search on Bibsonomy ASIAN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Rokia Missaoui, Madenda Sarifuddin, Jean Vaillancourt An Effective Approach Towards Content-Based Image Retrieval. Search on Bibsonomy CIVR The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Shaoquan Jiang, Guang Gong Multi-service Oriented Broadcast Encryption. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Hee-Kwan Son, Sang-Geun Oh Design and Implementation of Scalable Low-Power Montgomery Multiplier. Search on Bibsonomy ICCD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Alex Fit-Florea, David W. Matula A Digit-Serial Algorithm for the Discrete Logarithm Modulo 2k. Search on Bibsonomy ASAP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Manfred Schimmler, Viktor Bunimov Fast Modular Multiplication by Operand Changing. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Nadia Nedjah, Luiza de Macedo Mourelle Multi-Objective Evolutionary Hardware for RSA-Based Cryptosystems. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Luiza de Macedo Mourelle, Nadia Nedjah Efficient Cryptographic Hardware Using the Co-Design Methodology. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Andrés Cordón-Franco, Alejandro Fernández-Margarit, Francisco Félix Lara Martín Provably Total Primitive Recursive Functions: Theories with Induction. Search on Bibsonomy CSL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi Signed Binary Representations Revisited. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Pierre-Alain Fouque, Frédéric Muller, Guillaume Poupard, Frédéric Valette Defeating Countermeasures Based on Randomized BSD Representations. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle, Sheueling Chang Shantz Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Colin D. Walter Simple Power Analysis of Unified Code for ECC Double and Add. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF unified code, elliptic curve cryptography, ECC, simple power analysis, SPA, Side channel leakage, Montgomery modular multiplication
10Mathieu Ciet, Christophe Giraud 0001 Transient Fault Induction Attacks on XTR. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF public-key system XTR, smart cards, countermeasures, Differential fault analysis
10Colin D. Walter Longer Keys May Facilitate Side Channel Attacks. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Key Length, Side Channel Attacks, DPA, Power Analysis, Timing Attack, RSA Cryptosystem
10Adi Akavia, Shafi Goldwasser, Shmuel Safra Proving Hard-Core Predicates Using List Decoding. Search on Bibsonomy FOCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
10Gene Tsudik, Shouhuai Xu Accumulating Composites and Improved Group Signing. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
10Shardul Gokhale, Partha Dasgupta Distributed Authentication for Peer-to-Peer Networks. Search on Bibsonomy SAINT Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
10Panagiotis Manolios, Daron Vroon 0001 Algorithms for Ordinal Arithmetic. Search on Bibsonomy CADE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
10Takeshi Okamoto, Hirofumi Katsuno, Eiji Okamoto A Fast Signature Scheme Based on New On-line Computation. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
10Nicoletta Del Buono, Luciano Lopez A Survey on Methods for Computing Matrix Exponentials in Numerical Schemes for ODEs. Search on Bibsonomy International Conference on Computational Science The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
10Shahrokh Saeednia, Steve Kremer, Olivier Markowitch An Efficient Strong Designated Verifier Signature Scheme. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Designated verifier, Signature, Discrete logarithm, Signcryption
10Zewen Chen, Jilin Wang, Yumin Wang, Jiwu Huang, Daren Huang An Efficient Revocation Algorithm in Group Signatures. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
10Nam-Yeun Kim, Kee-Young Yoo Montgomery Multiplication and Squaring Algorithms in GF(2k). Search on Bibsonomy ICCSA (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
10Yuji Watanabe, Masayuki Numao Multi-round Secure-Light Broadcast Exclusion Protocol with Pre-processing. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
10Karl Rubin, Alice Silverberg Torus-Based Cryptography. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
10Pierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard Attacking Unbalanced RSA-CRT Using SPA. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #800 of 875 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license