The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for ECC with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1988-1995 (16) 1997-1999 (867) 2000-2001 (699) 2002 (17) 2003 (652) 2004 (49) 2005 (1469) 2006 (78) 2007 (64) 2008 (81) 2009 (900) 2010 (35) 2011 (1400) 2012 (41) 2013 (815) 2014 (572) 2015 (704) 2016 (532) 2017 (106) 2018 (603) 2019 (768) 2020 (441) 2021 (454) 2022 (394) 2023 (379) 2024 (12)
Publication types (Num. hits)
article(519) incollection(6) inproceedings(11594) phdthesis(8) proceedings(21)
Venues (Conferences, Journals, ...)
ECC(7895) CDC/ECC(2764) ECC (2)(60) ECC (1)(55) IACR Cryptol. ePrint Arch.(46) CHES(34) CoRR(25) ISCAS(25) DATE(23) IEEE Trans. Computers(23) Wirel. Pers. Commun.(22) IEEE Trans. Very Large Scale I...(21) IEEE Access(19) Sensors(16) DFT(13) DSN(12) More (+10 of total 577)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 684 occurrences of 307 keywords

Results
Found 12148 publication records. Showing 12148 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
104Tim Güneysu, Christof Paar Ultra High Performance ECC over NIST Primes on Commercial FPGAs. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF FPGA, High-Performance, Elliptic Curve Cryptosystems
80Zhi Li, John Higgins, Mark J. Clement Performance of Finite Field Arithmetic in an Elliptic Curve Cryptosystem. Search on Bibsonomy MASCOTS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF ElGamel, Encryption, Elliptic Curve, normal basis, polynomial basis
77Dong-Ho Lee, Jong-Soo Oh Multi-segment GF(2m) multiplication and its application to elliptic curve cryptography. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF elliptic curve scalar multiplication, FPGA, elliptic curve cryptography (ECC), coprocessor, finite field multiplication
75Chris Wilkerson, Alaa R. Alameldeen, Zeshan Chishti, Wei Wu 0024, Dinesh Somasekhar, Shih-Lien Lu Reducing cache power with low-cost, multi-bit error-correcting codes. Search on Bibsonomy ISCA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF ecc, edram, idle power, idle states, multi-bit ecc, refresh power, vccmin, dram
74Shantanu Dutt, Li Li Trust-Based Design and Check of FPGA Circuits Using Two-Level Randomized ECC Structures. Search on Bibsonomy ACM Trans. Reconfigurable Technol. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF masking probability, parity groups, parity randomization, trust checking, trust-based design, FPGAs, Error-correcting codes
74Guanghui Liu ECC-Cache: A Novel Low Power Scheme to Protect Large-Capacity L2 Caches from Transiant Faults. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
74Doe Hyun Yoon, Mattan Erez Memory mapped ECC: low-cost error protection for last level caches. Search on Bibsonomy ISCA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF reliability, error correction, soft error, last-level caches
70Zeshan Chishti, Alaa R. Alameldeen, Chris Wilkerson, Wei Wu 0024, Shih-Lien Lu Improving cache lifetime reliability at ultra-low voltages. Search on Bibsonomy MICRO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
70Jyu-Yuan Lai, Chih-Tsun Huang Elixir: High-Throughput Cost-Effective Dual-Field Processors and the Design Framework for Elliptic Curve Cryptography. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
70Mun-Kyu Lee, Keon Tae Kim, Howon Kim 0001, Dong Kyue Kim Efficient Hardware Implementation of Elliptic Curve Cryptography over GF(pm). Search on Bibsonomy WISA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
70Hans L. Bodlaender Dynamic Programming on Graphs with Bounded Treewidth. Search on Bibsonomy ICALP The full citation details ... 1988 DBLP  DOI  BibTeX  RDF graph decision problems, restrictions of NP-complete problems, local condition compositions, dynamic programming, polynomial time algorithms, Treewidth, partial k-trees
67Jan Pelzl, Thomas J. Wollinger, Jorge Guajardo, Christof Paar Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF comparison HECC vs. ECC, efficient implementation, Hyperelliptic curves, explicit formulae
64Hongbin Sun 0001, Nanning Zheng 0001, Tong Zhang 0002 Realization of L2 Cache Defect Tolerance Using Multi-bit ECC. Search on Bibsonomy DFT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
64Yi Wang 0016, Douglas L. Maskell, Jussipekka Leiwo, Thambipillai Srikanthan Unified Signed-Digit Number Adder for RSA and ECC Public-key Cryptosystems. Search on Bibsonomy APCCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
64Jin-Hee Han, Young-Jin Kim, Sung-Ik Jun, Kyo-Il Chung, Chang-Ho Seo Implementation of ECC/ECDSA Cryptography Algorithms Based on Java Card. Search on Bibsonomy ICDCS Workshops The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
61Murat Aydos, Tugrul Yanik, Çetin Kaya Koç An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF high-speed ECC-based wireless authentication, ARM microprocessor, elliptic curve digital signature algorithm, ARM7TDMI processor, core processor, 80 MHz, 160 bit, mobile computing, elliptic curve cryptography, public key cryptography, software libraries, software library, authorisation, microprocessor chips, message authentication, portable computers, ECDSA, 32 bit, wireless applications
60Tim Güneysu, Christof Paar, Jan Pelzl Special-Purpose Hardware for Solving the Elliptic Curve Discrete Logarithm Problem. Search on Bibsonomy ACM Trans. Reconfigurable Technol. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Pollard's rho, cryptanalysis, elliptic curve cryptosystem, Discrete logarithm
60Tim Güneysu, Christof Paar, Jan Pelzl Attacking elliptic curve cryptosystems with special-purpose hardware. Search on Bibsonomy FPGA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Pollard's Rho, cryptanalysis, elliptic curve cryptosystem, discrete logarithm
60María-Dolores Cano, Ruben Toledo-Valera, Fernando Cerdán A Certification Authority for Elliptic Curve X.509v3 Certificates. Search on Bibsonomy ICNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, wireless communications, elliptic curve cryptography, digital certificates
60Limin Gu, Yanmei Fang, Jiwu Huang Revaluation of Error Correcting Coding in Watermarking Channel. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
60Yijun Sun, Sinisa Todorovic, Jian Li, Dapeng Wu 0001 Unifying the error-correcting and output-code AdaBoost within the margin framework. Search on Bibsonomy ICML The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
60Boris Polianskikh, Zeljko Zilic Design and Implementation of Error Detection and Correction Circuitry for Multilevel Memory Protection. Search on Bibsonomy ISMVL The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
57Selçuk Baktir, Sandeep S. Kumar, Christof Paar, Berk Sunar A State-of-the-art Elliptic Curve Cryptographic Processor Operating in the Frequency Domain. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF discrete Fourier domain, finite fields, elliptic curve cryptography (ECC), modular multiplication
54Doe Hyun Yoon, Mattan Erez Virtualized and flexible ECC for main memory. Search on Bibsonomy ASPLOS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF fault tolerance, reliability, error correction, memory systems
54Jin Park, Jeong-Tae Hwang, Young-Chul Kim 0001 FPGA and ASIC Implementation of ECC Processor for Security on Medical Embedded System. Search on Bibsonomy ICITA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
54Chin-Lung Su, Yi-Ting Yeh, Cheng-Wen Wu An Integrated ECC and Redundancy Repair Scheme for Memory Reliability Enhancement. Search on Bibsonomy DFT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
54Michael Spica, T. M. Mak Do We Need Anything More Than Single Bit Error Correction (ECC)? Search on Bibsonomy MTDT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
54Hans Eberle, Nils Gura, Sheueling Chang Shantz, Vipul Gupta, Leonard Rarick, Shreyas Sundaram A Public-Key Cryptographic Processor for RSA and ECC. Search on Bibsonomy ASAP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
53Shahriar Mohammadi, Sanaz Abedi ECC-Based Biometric Signature: A New Approach in Electronic Banking Security. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF biometeric signature, electronic banking, ECC
53Colin D. Walter Simple Power Analysis of Unified Code for ECC Double and Add. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF unified code, elliptic curve cryptography, ECC, simple power analysis, SPA, Side channel leakage, Montgomery modular multiplication
50Yuanling Hao, Shiwei Ma, Guanghua Chen, Xiaoli Zhang, Hui Chen, Weimin Zeng Optimization Algorithm for Scalar Multiplication in the Elliptic Curve Cryptography over Prime Field. Search on Bibsonomy ICIC (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF calar multiplication, Elliptic curve cryptography, Sliding-window, Non-adjacent form
50Hai Yan, Zhijie Jerry Shi Studying Software Implementations of Elliptic Curve Cryptography. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
50Francis M. Crowe, Alan Daly, William P. Marnane A Scalable Dual Mode Arithmetic Unit for Public Key Cryptosystems. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
50Limin Gu, Jiwu Huang, Yun Q. Shi 0001 Analysis of the role played by error correcting coding in robust watermarking. Search on Bibsonomy ISCAS (3) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
50Nils Gura, Hans Eberle, Sheueling Chang Shantz Generic implementations of elliptic curve cryptography using partial reduction. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF elliptic curve cryptography, modular reduction
50Chin-Chih Chang, Jason Cong An efficient approach to multilayer layer assignment with anapplication to via minimization. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
48An Liu, Peng Ning TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. Search on Bibsonomy IPSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF TinyECC, ECC, public key cryptography, Wireless sensor network security
48M. Sudhakar, Ramachandruni Venkata Kamala, M. B. Srinivas New and Improved Architectures for Montgomery Modular Multiplication. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF reconfigurable multiplier, scalable multiplier, RSA, ECC, carry save adders, Montgomery modular multiplication
48Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede Superscalar Coprocessor for High-Speed Curve-Based Cryptography. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF curve-based cryptography, HECC, ECC, instruction-level parallelism, scalar multiplication, Superscalar, coprocessor
48Lejla Batina, Geeke Bruin-Muurling, Siddika Berna Örs Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF RSA, ECC, Side-channel attacks, Systolic array, Hardware implementation, Montgomery multiplication, FPGA design
48Chang Hoon Kim, Soonhak Kwon, Jong Jin Kim, Chun Pyo Hong A New Arithmetic Unit in GF(2m) for Reconfigurable Hardware Implementation. Search on Bibsonomy FPL The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Finite Field Division, VL, ECC, Finite Field Multiplication
47Kazuo Sakiyama, Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede Reconfigurable Modular Arithmetic Logic Unit for High-Performance Public-Key Cryptosystems. Search on Bibsonomy ARC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RSA, Elliptic Curve Cryptography (ECC), Public-Key Cryptography (PKC), Reconfigurable architecture, FPGA implementation
47Tetsuya Izu, Tsuyoshi Takagi Exceptional Procedure Attack on Elliptic Curve Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF exceptional procedure attack, exceptional point, side channel attack, Elliptic curve cryptosystem (ECC), scalar multiplication
47Vipul Gupta, Sumit Gupta, Sheueling Chang Shantz, Douglas Stebila Performance analysis of elliptic curve cryptography for SSL. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2002 DBLP  DOI  BibTeX  RDF secure socket layer (SSL), wireless, elliptic curve cryptography (ECC), internet security
47Souichi Okada, Naoya Torii, Kouichi Itoh, Masahiko Takenaka Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2m) on an FPGA. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF elliptic scalar multiplication over tex2html_wrap_inline100, IEEE P1363, Elliptic curve cryptography (ECC), multiplier, coprocessor, Koblitz curve
44Xu Guo 0001, Patrick Schaumont Optimizing the Control Hierarchy of an ECC Coprocessor Design on an FPGA Based SoC Platform. Search on Bibsonomy ARC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
44Doe Hyun Yoon, Mattan Erez Flexible cache error protection using an ECC FIFO. Search on Bibsonomy SC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF reliability, error correction, soft error, last-level caches
44Hou Huifang, Kaizhi Huang, Liu Guangqiang CPK and ECC-Based Authentication and Key Agreement Scheme for Heterogeneous Wireless Network. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
44Hamad Alrimeih, Daler N. Rakhmatov Security-Performance Trade-offs in Embedded Systems Using Flexible ECC Hardware. Search on Bibsonomy IEEE Des. Test Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF programmable hardware, elliptic-curve cryptography, scalar multiplication, modular arithmetic
44M. Sudhakar, Ramachandruni Venkata Kamala, M. B. Srinivas A bit-sliced, scalable and unified montgomery multiplier architecture for RSA and ECC. Search on Bibsonomy VLSI-SoC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Yi Ouyang 0005, Yun Ling, Anding Zhu ECC-Based Fuzzy Clustering Algorithm. Search on Bibsonomy ICFIE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Unsupervised Clustering Methods, Ecommerce Concept, Kmeans, Fuzzy C-means
44Yoo-Jin Baek, Ihor Vasyltsov How to Prevent DPA and Fault Attack in a Unified Way for ECC Scalar Multiplication - Ring Extension Method. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Toru Akishita, Tsuyoshi Takagi Power Analysis to ECC Using Differential Power Between Multiplication and Squaring. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Smart cards, DPA, elliptic curve cryptosystems, power analysis, modular multiplication
44Guido Bertoni, Luca Breveglieri, Matteo Venturi ECC Hardware Coprocessors for 8-bit Systems and Power Consumption Considerations. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
44Levent Ertaul, Weimin Lu ECC Based Threshold Cryptography for Secure Data Forwarding and Secure Key Exchange in MANET (I). Search on Bibsonomy NETWORKING The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Byung kwan Lee, Tai-Chi Lee, Seung Hae Yang An ASEP (Advanced Secure Electronic Payment) Protocol Design Using 3BC and ECC (F^2) Algorithm. Search on Bibsonomy EEE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
44André Weimerskirch, Douglas Stebila, Sheueling Chang Shantz Generic GF(2) Arithmetic in Software and Its Application to ECC. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Dense Field Polynomials, Field Multiplication, Field Reduction, Elliptic Curves, Koblitz Curves, Binary Fields
43JaeCheol Ha, JeaHoon Park, Sang-Jae Moon, Sung-Ming Yen Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Smart card, ECC, Side channel attack, Power analysis attack
43Loren D. Olson Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF weighted projective curves, uniform addition formula, cryptography, ECC, side-channel attacks, Elliptic curves
42Harald Aigner, Holger Bock, Markus Hütter, Johannes Wolkerstorfer A Low-Cost ECC Coprocessor for Smartcards. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF multiplicative inverse, digital signature, Elliptic Curve Cryptography (ECC), hardware implementation
40Ruirui C. Huang, G. Edward Suh IVEC: off-chip memory integrity protection for both security and reliability. Search on Bibsonomy ISCA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security, fault tolerance, reliability, error detection, error correction, memory systems
40Qiaoyan Yu, Paul Ampadu Adaptive Error Control for NoC Switch-to-Switch Links in a Variable Noise Environment. Search on Bibsonomy DFT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
40Mehdi Kamal, Somayyeh Koohi, Shaahin Hessabi Empirical Analysis of the Dependence of Test Power, Delay, Energy and Fault Coverage on the Architecture of LFSR-Based TPGs. Search on Bibsonomy DFT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
40Avijit Dutta, Nur A. Touba Multiple Bit Upset Tolerant Memory Using a Selective Cycle Avoidance Based SEC-DED-DAEC Code. Search on Bibsonomy VTS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
40Haodong Wang, Qun Li 0001 Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper). Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40Hans Eberle, Arvinderpal Wander, Nils Gura, Sheueling Chang Shantz, Vipul Gupta Architectural Extensions for Elliptic Curve Cryptography over GF(2m) on 8-bit Microprocessors. Search on Bibsonomy ASAP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
40Haeng-Kon Kim, Tai-Hoon Kim Design on Mobile Secure Electronic Transaction Protocol with Component Based Development. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF MSET, F2m, Digital envelope, 3BC algorithm, object component
40Limin Gu, Jiwu Huang, Zewen Chen Analysis of the Bounds for Linear Block Codes in Watermark Channel. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
40Meng Yuan Huang Investigation of the efficiency of the elliptic curve cryptosystem for multi-applications smart card. Search on Bibsonomy KES (1) The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
38Meng Ao, Stan Z. Li Near Infrared Face Based Biometric Key Binding. Search on Bibsonomy ICB The full citation details ... 2009 DBLP  DOI  BibTeX  RDF BioHash, Key Binding, NIR Face, Biometric Encryption, ECC
38Robert Szerwinski, Tim Güneysu Exploiting the Power of GPUs for Asymmetric Cryptography. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Asymmetric Cryptosystems, Graphics Processing Unit, RSA, ECC, DSA
38Pradeep Kumar Mishra Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems (Extended Version). Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF EC-operations, comb methods, Jacobian coordinates, sidechannel attacks, sidechannel atomicity, pipelining, ECC, Elliptic Curve Cryptosystems, scalar multiplication, binary methods
38Qibin Sun, Shih-Fu Chang A Robust and Secure Media Signature Scheme for JPEG Images. Search on Bibsonomy J. VLSI Signal Process. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF content hash, watermarking, digital signature, ECC, image authentication
38Chang Han Kim, Yongtae Kim, Nam Su Chang, IlHwan Park Modified Serial Multipliers for Type-IV Gaussian Normal Bases. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF serial multiplier, Finite fields, ECC, Massey-Omura multiplier, Gaussian Normal Basis
38Dong Jin Yang, Chang Han Kim, Young-Ho Park 0001, Yongtae Kim, Jongin Lim 0001 Modified Sequential Normal Basis Multipliers for Type II Optimal Normal Bases. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Finite fields, ECC, Massey-Omura multiplier, Gaussian Normal Basis
38Colin D. Walter Issues of Security with the Oswald-Aigner Exponentiation Algorithm. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Addition-subtraction chains, randomized exponentiation, elliptic curve cryptography, ECC, DPA, blinding, power analysis, smartcard, SPA, DEMA, point multiplication, SEMA
38Siddika Berna Örs, Lejla Batina, Bart Preneel, Joos Vandewalle Hardware Implementation of a Montgomery Modular Multiplier in a Systolic Array. Search on Bibsonomy IPDPS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Montgomery’s Multiplication Method, FPGA, RSA, ECC, Public Key Cryptography, systolic array
38Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka A Practical Countermeasure against Address-Bit Differential Power Analysis. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF address-bit DPA, RSA, ECC, Differential Power Analysis (DPA), exponentiation, countermeasure
38Akhil Shetty, Sen Li, Kameshwar Poolla, Pravin Varaiya 2018 European Control Conference (ECC) June 12-15, 2018. Limassol, Cyprus Optimal Energy Reserve Procurement. Search on Bibsonomy ECC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
37Manuel Barbosa, Andrew Moss, Dan Page Constructive and Destructive Use of Compilers in Elliptic Curve Cryptography. Search on Bibsonomy J. Cryptol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Compilers, Optimisation, Implementation, Elliptic curve cryptography (ECC), Specialisation
37Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede High-performance Public-key Cryptoprocessor for Wireless Mobile Applications. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF parallel processing, elliptic curve cryptography(ECC), public-key cryptosystem, binary fields
37Manuel Barbosa, Andrew Moss, Dan Page Compiler Assisted Elliptic Curve Cryptography. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Compilers, Optimisation, Implementation, Elliptic Curve Cryptography (ECC), Specialisation
37Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka Improving the Randomized Initial Point Countermeasure Against DPA. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RPA, ZVA, Smart card, DPA, Elliptic Curve Cryptosystems (ECC), countermeasure, RIP
37Lejla Batina, Nele Mentens, Bart Preneel, Ingrid Verbauwhede Side-channel aware design: Algorithms and Architectures for Elliptic Curve Cryptography over GF(2n). Search on Bibsonomy ASAP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Multiplication in GF(2^n), Systolic array architecture, Montgomery method for point multiplication, Elliptic Curve Cryptography (ECC), Hardware implementation
37Byung kwan Lee, Tai-Chi Lee, Seung Hae Yang HESSL (Highly Enhanced Security Socket Layer) Protocol. Search on Bibsonomy CEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF HESSL, F_{2^m } ECC, F_{2^m } HECC, BSB, SSL
37Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF address-bit DPA, scalar exponentiation, OK-ECDH, OK-ECDSA, Differential power analysis (DPA), elliptic curve cryptosystems (ECC)
37Jan M. Maciejowski, Mark W. Spong Welcome from the presidents of IEEE CSS and EUCA CDC-ECC'05. Search on Bibsonomy CDC/ECC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Alfredo Germani, Costanzo Manes, Pasquale Palumbo Filtering of Differential Nonlinear Systems via a Carleman Approximation Approach; 44th IEEE Conf. on Decision and Control & European Control Conference (CDC-ECC 2005). Search on Bibsonomy CDC/ECC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Stuart E. Schechter, Gabriel H. Loh, Karin Strauss, Doug Burger Use ECP, not ECC, for hard failures in resistive memories. Search on Bibsonomy ISCA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF hard failures, resistive memories, memory, error correction, phase change memory
34Eun-Jun Yoon, Kee-Young Yoo Robust ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Xu Guo 0001, Junfeng Fan, Patrick Schaumont, Ingrid Verbauwhede Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Fan Zhang 0010, Zhijie Jerry Shi An Efficient Window-Based Countermeasure to Power Analysis of ECC Algorithms. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Jin-Fu Li 0001 Transparent-Test Methodologies for Random Access Memories Without/With ECC. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Fan Zhang Power Analysis Attacks on ECC Randomized Automata. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Vladimir Stojanovic, R. Iris Bahar, Jennifer Dworak, Richard Weiss 0001 A cost-effective implementation of an ECC-protected instruction queue for out-of-order microprocessors. Search on Bibsonomy DAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF instruction queue, reliability, error correcting codes
34Feng Qin, Shan Lu 0001, Yuanyuan Zhou 0001 SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs. Search on Bibsonomy HPCA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Hung-Min Sun, Bin-Tsan Hsieh, Shin-Mu Tseng Cryptanalysis of Aydos et al.'s ECC-Based Wireless Authentication Protocol. Search on Bibsonomy EEE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
34Bing Du, Anthony J. Maeder, Miles Moody A New Approach for Error Resilience in video Transmission Using ECC. Search on Bibsonomy VLBV The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
33Swapnil Pathare, Sukumar Nandi Sahnet: a secure system for ad-hoc networking using ecc. Search on Bibsonomy Q2SWinet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ad-hoc networks, protocol, ECC
32Jaydeb Bhaumik, Dipanwita Roy Chowdhury An Integrated ECC-MAC Based on RS Code. Search on Bibsonomy Trans. Comput. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Nonlinear mixing, ECC-MAC, Error correcting code, Reed-Solomon code, Message authentication code
Displaying result #1 - #100 of 12148 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license