The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for exponentiation with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1960-1985 (17) 1986-1989 (15) 1990-1991 (18) 1992-1993 (18) 1994-1995 (22) 1996-1997 (22) 1998 (22) 1999 (20) 2000 (27) 2001 (31) 2002 (30) 2003 (53) 2004 (53) 2005 (66) 2006 (54) 2007 (60) 2008 (42) 2009 (44) 2010 (15) 2011 (34) 2012 (21) 2013 (19) 2014 (17) 2015 (25) 2016 (17) 2017-2018 (30) 2019 (19) 2020-2021 (32) 2022 (22) 2023-2024 (10)
Publication types (Num. hits)
article(323) data(1) incollection(26) inproceedings(525)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 645 occurrences of 247 keywords

Results
Found 875 publication records. Showing 875 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
10Chris Karlof, David A. Wagner 0001 Hidden Markov Model Cryptanalysis. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
10Julien Cathalo, François Koeune, Jean-Jacques Quisquater A New Type of Timing Attack: Application to GPS. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF GPS, Side-Channel Attacks, Timing Attacks, Identification Schemes
10Kiamal Z. Pekmestzi, Nikos K. Moshopoulos A Systolic, High Speed Architecture for an RSA Cryptosystem. Search on Bibsonomy J. VLSI Signal Process. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Montgomery algorithm, modular squaring, RSA, public key cryptography, modular multiplication
10Kyo-Min Ku, Kyeoung Ju Ha, Hyun-Sung Kim 0001, Kee-Young Yoo New Parallel Architecture for Modular Multiplication and Squaring Based on Cellular Automata. Search on Bibsonomy PARA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Dario Catalano, Phong Q. Nguyen, Jacques Stern The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Paillier, Hensel, One-wayness, RSA, Lattice, Discrete logarithm, Public-key
10Emmanuel Bresson, Jacques Stern Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Panu Hämäläinen, Marko Hännikäinen, Markku Niemi, Timo Hämäläinen 0001 Performance evaluation of Secure Remote Password protocol. Search on Bibsonomy ISCAS (3) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Johann Großschädl Instruction Set Extension for Long Integer Modulo Arithmetic on RISC-Based Smart Cards. Search on Bibsonomy SBAC-PAD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Elena Trichina, Antonio Bellezza Implementation of Elliptic Curve Cryptography with Built-In Counter Measures against Side Channel Attacks. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Hyunchul Shin, Jin-Aeon Lee, Lee-Sup Kim A hardware cost minimized fast Phong shader. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
10Bradley D. Brown, Howard C. Card Stochastic Neural Computation I: Computational Elements. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2001 DBLP  DOI  BibTeX  RDF stochastic arithmetic, computational elements, Pulsed neural networks
10Akihiro Yamamura, Kaoru Kurosawa Generic Algorithms and Key Agreement Protocols Based on Group Actions. Search on Bibsonomy ISAAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
10Klaus Reinhardt The Complexity of Translating Logic to Finite Automata. Search on Bibsonomy Automata, Logics, and Infinite Games The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
10William Hesse Division Is in Uniform TC0. Search on Bibsonomy ICALP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
10Jorge Guajardo, Rainer Blümel, Uwe Krieger, Christof Paar Efficient Implementation of Elliptic Curve Cryptosystems on the TI MSP 430x33x Family of Microcontrollers. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
10Marc Joye, Christophe Tymen Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF smart-cards, Public-key cryptography, elliptic curves, non-adjacent forms
10Willi Geiselmann, Harald Lukhaub Redundant Representation of Finite Fields. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
10Fumitaka Hoshino, Masayuki Abe, Tetsutaro Kobayashi Lenient/Strict Batch Verification in Several Groups. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
10Nick Howgrave-Graham, Joan G. Dyer, Rosario Gennaro Pseudo-random Number Generation on the IBM 4758 Secure Crypto Coprocessor. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
10Adam L. Young, Moti Yung Bandwidth-Optimal Kleptographic Attacks. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Leakage attacks, the Newton channel, design methodologies for asymmetric ciphers, kleptographic attacks, attack bandwidth, discrete logarithm based systems, tamper-proof hardware designs, public scrutiny, hardware technologies: EEPROM, ferroelectric, trust, DSA, ElGamal, subliminal channels, non-volatile memory
10Wei-Chang Tsai, C. Bernard Shung, Sheng-Jyh Wang Two systolic architectures for modular multiplication. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
10Colin Boyd, Chris Pavlovski Attacking and Repairing Batch Verification Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
10Adam L. Young, Moti Yung Towards Signature-Only Signature Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Public Key Cryptosystems (PKCS), nested trapdoor, abuse freeness, (subliminal) leakage, design validation proofs, FIPS, digital signature, decryption, Public Key Infrastructure (PKI), NIST
10Muxiang Zhang, Christopher Carroll, Agnes Hui Chan The Software-Oriented Stream Cipher SSC2. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
10Hagen Ploog, Dirk Timmermann On Multiple Precision Based Montgomery Multiplication without Precomputation of N0´ = -N0-1 mod W. Search on Bibsonomy ICCD The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
10Alain Colmerauer, Thi-Bich-Hanh Dao Expressiveness of Full First Order Constraints in the Algebra of Finite or Infinite Trees. Search on Bibsonomy CP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
10Rosario Gennaro An Improved Pseudo-random Generator Based on Discrete Log. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
10Johann Großschädl High-Speed RSA Hardware Based on Barret's Modular Reduction Method. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF RSA algorithm, partial parallel multiplier, full-custom VLSI design, pipelining, Public-key cryptography, modular arithmetic
10Johann Großschädl The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF RSA/spl gamma/ crypto-chip, RSA encryption scheme, hardware performance, long-integer modular arithmetic, private key operations, multiplier architecture, high-speed hardware accelerator, reconfigurable multiplier datapath, word-serial multiplier, modular reduction method, multiplier core, decryption rate, 200 MHz, 560 kbit/s, 2 Mbit/s, parallelism, pipelining, public key cryptography, reconfigurable architectures, clocks, Chinese Remainder Theorem, microprocessor chips, multiplying circuits, modular multiplications, modular exponentiations, pipeline arithmetic, clock frequency
10Colin D. Walter Moduli for Testing Implementations of the RSA Cryptosystem. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 1999 DBLP  DOI  BibTeX  RDF RSA modulus, implementation validation benchmark, verification, testing, cryptography, Computer arithmetic, correctness
10Jan Camenisch, Markus Michels Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
10Jyh-Huei Guo, Chin-Liang Wang, Hung-Chih Hu Design and implementation of an RSA public-key cryptosystem. Search on Bibsonomy ISCAS (1) The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
10Jen-Shiun Chiang, Jian-Kao Chen An efficient VLSI architecture for RSA public-key cryptosystem. Search on Bibsonomy ISCAS (1) The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
10Siguna Müller On the Combined Fermat/Lucas Probable Prime Test. Search on Bibsonomy IMACC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
10Vincent D. Blondel Structured Numbers: Properties of a Hierarchy of Operations on Binary Trees. Search on Bibsonomy Acta Informatica The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
10Erik De Win, Serge Mister, Bart Preneel, Michael J. Wiener On the Performance of Signature Schemes Based on Elliptic Curves. Search on Bibsonomy ANTS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
10M. R. K. Krishna Rao, Abdul Sattar 0001 Learning from Entailment of Logic Programs with Local Variables. Search on Bibsonomy ALT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
10Tatsuaki Okamoto, Moti Yung Lower Bounds on Term-Based Divisible Cash Systems. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
10Markus Jakobsson A Practical Mix. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF privacy, robustness, error detection, Mix-network, decryption
10Woei-Jiunn Tsaur, Shi-Jinn Horng, Shung-Shing Lee, Ruey-Chang Tsai An Efficient and Authenticated Group-Oriented Cryptoscheme Based on a Geometric Method in Internet Environments. Search on Bibsonomy ICPADS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Internet, distributed systems, computer networks, Data security, data communications
10Johannes Buchmann 0001, Sachar Paulus A One Way Function Based on Ideal Arithmetic in Number Fields. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF number fields, shortest vectors in lattices, One way function
10Yair Frankel, Yiannis Tsiounis, Moti Yung "Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
10Paul C. van Oorschot, Michael J. Wiener On Diffie-Hellman Key Agreement with Short Exponents. Search on Bibsonomy EUROCRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
10Irina E. Bocharova, Boris D. Kudryashov Fast Exponentation in Cryptography. Search on Bibsonomy AAECC The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
10Matthew K. Franklin, Michael K. Reiter Verifiable Signature Sharing. Search on Bibsonomy EUROCRYPT The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
10Daniel Bleichenbacher, Wieb Bosma, Arjen K. Lenstra Some Remarks on Lucas-Based Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
10Chris Charnes, Josef Pieprzyk, Reihaneh Safavi-Naini Conditionally Secure Secret Sharing Schemes with Disenrollment Capability. Search on Bibsonomy CCS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF cryptography, computer security, secret sharing, threshold schemes, group oriented cryptography
10Masayuki Abe, Hikaru Morita Higher Radix Nonrestoring Modular Multiplication Algorithm and Public-key LSI Architecture with Limited Hardware Resources. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
10Ingrid Biehl, Johannes A. Buchmann, Christoph Thiel Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
10Thomas Beth, Hans-Joachim Knobloch, Marcus Otten Verifiable Secret Sharing for Monotone Access Structures. Search on Bibsonomy CCS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
10Abraham Lempel, Gadiel Seroussi Application of Finte Fields to Memory Interleaving. Search on Bibsonomy AAECC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
10Peter Kornerup High-radix modular multiplication for cryptosystems. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
10Anindya Banerjee 0001, David A. Schmidt A Categorical Interpretation of Landin's Correspondence Principle. Search on Bibsonomy MFPS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
10Peter de Rooij On Schnorr's Preprocessing for Digital Signature Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
10Pierre Lescanne Termination of Rewrite Systems by Elementary Interpretations. Search on Bibsonomy ALP The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
10Eugène van Heijst, Torben P. Pedersen, Birgit Pfitzmann New Constructions of Fail-Stop Signatures and Lower Bounds (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
10Srecko Brlek, Pierre Castéran, Robert Strandh On Addition Schemes. Search on Bibsonomy TAPSOFT, Vol.2 The full citation details ... 1991 DBLP  DOI  BibTeX  RDF compilation of functional languages, Scheme programming language, semi-numerical algorithms, continuations, addition chains, programming languages semantics
10Thomas Beth, F. Schaefer Non Supersingular Elliptic Curves for Public Key Cryptosystems. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
10Masakatu Morii, Yuzo Takamatsu Exponetiation in Finite Fields Using Dual Basis Multiplier. Search on Bibsonomy AAECC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
10Hikaru Morita A Fast Modular-multiplication Module for Smart Cards. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
10Mikael Rittri Retrieving Library Identifiers via Equational Matching of Types. Search on Bibsonomy CADE The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
10Gisela Meister On an Implementation of the Mohan-Adiga Algorithm. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
10Yacov Yacobi Exponentiating Faster with Addition Chains. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
10Dominique de Waleffe, Jean-Jacques Quisquater CORSAIR: A SMART Card for Public Key Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1990 DBLP  DOI  BibTeX  RDF public key algorithms, digital signature, Smart card, RSA, zero-knowledge protocols
10Brian A. LaMacchia, Andrew M. Odlyzko Computation of Discrete Logarithms in Prime Fields (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
10Colin Boyd A New Multiple Key Cipher and an Improved Voting Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
10Claus-Peter Schnorr Efficient Identification and Signatures for Smart Cards (Abstract). Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
10Amos Fiat Batch RSA. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
10Claus-Peter Schnorr Efficient Identification and Signatures for Smart Cards. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
10António L. Furtado 0001, Paulo A. S. Veloso Iteration for applicative languages. Search on Bibsonomy ACM SIGPLAN Notices The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
10Frank Hoornaert, Marc Decroos, Joos Vandewalle, René Govaerts Fast RSA-Hardware: Dream or Reality? Search on Bibsonomy EUROCRYPT The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
10René Peralta 0001 Simultaneous Security of Bits in the Discrete Log. Search on Bibsonomy EUROCRYPT The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
10Yvo Desmedt, Andrew M. Odlyzko A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
10Karl J. Lieberherr Uniform Complexity and Digital Signatures. Search on Bibsonomy ICALP The full citation details ... 1981 DBLP  DOI  BibTeX  RDF
10John Cocke, Marvin Minsky Universality of Tag Systems with P=2. Search on Bibsonomy J. ACM The full citation details ... 1964 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #875 of 875 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license