|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 645 occurrences of 247 keywords
|
|
|
Results
Found 875 publication records. Showing 875 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
98 | Colin D. Walter |
Some Security Aspects of the M IST Randomized Exponentiation Algorithm. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
Randomary exponentiation, Mist exponentiation algorithm, division chains, DPA, blinding, power analysis, smartcard, addition chains, DEMA |
91 | Sung-Ming Yen, Chien-Ning Chen, Sang-Jae Moon, JaeCheol Ha |
Improvement on Ha-Moon Randomized Exponentiation Algorithm. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
Randomized recoding, Signed-digit recoding, Side-channel attack, Differential power analysis (DPA), Simple power analysis (SPA), Modular exponentiation, Physical cryptanalysis |
91 | Colin D. Walter |
MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis. |
CT-RSA |
2002 |
DBLP DOI BibTeX RDF |
Mist exponentiation algorithm, division chains, smart card, DPA, blinding, power analysis, addition chains |
91 | Christophe Clavier, Marc Joye |
Universal Exponentiation Algorithm. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
Implementation, smart-cards, provable security, side-channel attacks, discrete logarithm, exponentiation, simple power analysis (SPA), RSA cryptosystem, addition chains |
82 | Mun-Kyu Lee, Howon Kim 0001, Dowon Hong, Kyoil Chung |
Efficient Exponentiation in GF(pm) Using the Frobenius Map. |
ICCSA (4) |
2006 |
DBLP DOI BibTeX RDF |
Cryptography, Finite Field, Elliptic Curve, Exponentiation, Optimal Extension Field |
82 | Chin-Chen Chang 0001, Yeu-Pong Lai |
A Parallel Modular Exponentiation Scheme for Transformed Exponents. |
APPT |
2005 |
DBLP DOI BibTeX RDF |
Mixed radix conversion, parallel computation, residue number system, modular exponentiation |
82 | Yasuyuki Sakai, Kouichi Sakurai |
Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
Parallel modular exponentiation, Side channel attack, Montgomery multiplication, Timing attack, RSA cryptosystems |
75 | Marten van Dijk, Dwaine E. Clarke, Blaise Gassend, G. Edward Suh, Srinivas Devadas |
Speeding up Exponentiation using an Untrusted Computational Resource. |
Des. Codes Cryptogr. |
2006 |
DBLP DOI BibTeX RDF |
AMS Classification 94A60 |
75 | Chi Seong Park, Mun-Kyu Lee, Dong Kyue Kim |
New Computation Paradigm for Modular Exponentiation Using a Graph Model. |
SAGA |
2005 |
DBLP DOI BibTeX RDF |
|
75 | Werner Kuich, Klaus W. Wagner |
On the Exponentiation of Languages. |
FCT |
2003 |
DBLP DOI BibTeX RDF |
|
72 | Colin D. Walter |
Seeing through MIST Given a Small Fraction of an RSA Private Key. |
CT-RSA |
2003 |
DBLP DOI BibTeX RDF |
division chains, randomized exponentiation, Mist, randomary exponentiation, RSA, DPA, blinding, power analysis, smartcard, SPA, Addition chains, DEMA, side channel leakage, SEMA |
69 | Vassil S. Dimitrov, Graham A. Jullien, William C. Miller |
Algorithms for Multi-Exponentiation Based on Complex Arithmetic. |
IEEE Symposium on Computer Arithmetic |
1997 |
DBLP DOI BibTeX RDF |
multi-exponentiation algorithms, binary-like complex arithmetic, multiple modular exponentiation operations, performance, cryptographic protocols, digital arithmetic |
65 | Ming-Der Shieh, Jun-Hong Chen, Hao-Hsuan Wu, Wen-Ching Lin |
A New Modular Exponentiation Architecture for Efficient Design of RSA Cryptosystem. |
IEEE Trans. Very Large Scale Integr. Syst. |
2008 |
DBLP DOI BibTeX RDF |
|
65 | Benoît Chevallier-Mames |
Self-Randomized Exponentiation Algorithms. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
|
65 | Daoud Bshouty, Nader H. Bshouty |
On Learning Arithmetic Read-Once Formulas with Exponentiation (Extended Abstract). |
COLT |
1994 |
DBLP DOI BibTeX RDF |
|
65 | Fritz Bauspieß, Hans-Joachim Knobloch, Peer Wichmann |
Inverting the Pseudo Exponentiation. |
EUROCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
62 | Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto |
Some Efficient Algorithms for the Final Exponentiation of eta T Pairing. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
?T pairing, final exponentiation, torus, Tate pairing |
62 | Soonhak Kwon |
Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(qn) Using a Gaussian Normal Basis of Type II. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
NAF (nonadjacent form), balanced ternary number system, finite field, exponentiation, optimal normal basis, Gaussian normal basis, signed digit representation |
62 | Yong Ho Hwang, Sang Gyoo Sim, Pil Joong Lee |
Bit-Serial Multipliers for Exponentiation and Division in GF(2m) Using Irreducible AOP. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
Irreducible AOP, Finite field, Exponentiation, Bit-serial multiplier |
62 | Soonhak Kwon, Chang Hoon Kim, Chun Pyo Hong |
Gauss Period, Sparse Polynomial, Redundant Basis, and Efficient Exponentiation for a Class of Finite Fields with Small Characteristic. |
ISAAC |
2003 |
DBLP DOI BibTeX RDF |
Gauss period, trinomial, redundant basis, Finite field, exponentiation, root of unity |
62 | Soonhak Kwon, Chang Hoon Kim, Chun Pyo Hong |
Efficient Exponentiation for a Class of Finite Fields GF(2 n) Determined by Gauss Periods. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
Gauss period, Finite field, exponentiation, optimal normal basis, primitive element |
62 | Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon |
A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
Square-multiply exponentiation, Cryptography, Side channel attack, Exponentiation, Timing attack, Power analysis attack, Physical cryptanalysis, Hardware fault cryptanalysis |
59 | Takafumi Hamano, Naofumi Takagi, Shuzo Yajima, Franco P. Preparata |
O(n)-depth circuit algorithm for modular exponentiation. |
IEEE Symposium on Computer Arithmetic |
1995 |
DBLP DOI BibTeX RDF |
O(n)-depth circuit algorithm, polynomial-size combinational circuit algorithm, n-bit modular exponentiation, n-bit binary integers, square-and-multiply method, public key cryptography, combinational circuits, digital arithmetic, modular exponentiation |
55 | Koray Karabina |
Double-Exponentiation in Factor-4 Groups and Its Applications. |
IMACC |
2009 |
DBLP DOI BibTeX RDF |
|
55 | Matthieu Rivain |
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
|
55 | Nadia Nedjah, Luiza de Macedo Mourelle |
Efficient Hardware for Modular Exponentiation using the Sliding-Window Method with Variable-Length Partitioning. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Chia-Long Wu, Der-Chyuan Lou, Te-Jen Chang |
An efficient Montgomery exponentiation algorithm for public-key cryptosystems. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Nadia Nedjah, Luiza de Macedo Mourelle |
A Hardware/Software Co-design vs. Hardware Implementation of the Modular Exponentiation Using the Sliding-Window Method with Constant-Length Partitioning. |
DSD |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Nadia Nedjah, Luiza de Macedo Mourelle |
A System-on-Chip Implementation for Modular Exponentiation Using the Sliding-Window Method with Variable-Length Partitioning. |
SIES |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Nadia Nedjah, Luiza de Macedo Mourelle |
Efficient Hardware for Modular Exponentiation Using the Sliding-Window Method with Variable-Length Partitioning. |
SBAC-PAD |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Bodo Möller |
Algorithms for Multi-exponentiation. |
Selected Areas in Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
55 | Çetin Kaya Koç, Tolga Acar |
Fast Software Exponentiation in GF(2^k). |
IEEE Symposium on Computer Arithmetic |
1997 |
DBLP DOI BibTeX RDF |
polynomial arithmetic, Montgomery multiplication, Galois field, squaring |
55 | Sung-Ming Yen, Lee-Chun Ko, Sang-Jae Moon, JaeCheol Ha |
Relative Doubling Attack Against Montgomery Ladder. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
Doubling attack, Cryptography, Smart card, Side-channel attack, Scalar multiplication, Exponentiation, Simple power analysis (SPA), Chosen-message attack |
52 | Michael Tunstall |
Random Order m-ary Exponentiation. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
random order countermeasure, side channel analysis, Exponentiation algorithms |
52 | Marc Joye, Michael Tunstall |
Exponent Recoding and Regular Exponentiation Algorithms. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Exponent recoding, side-channel analysis, exponentiation algorithms |
52 | Bodo Möller, Andy Rupp |
Faster Multi-exponentiation through Caching: Accelerating (EC)DSA Signature Verification. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
embedded cryptography, elliptic curve cryptography, exponentiation, Efficient implementation, DSA, ECDSA |
52 | Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, Adi Shamir |
Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
waveform matching, RSA, side-channel attacks, modular exponentiation, power-analysis attacks |
52 | Jean-Luc Beuchat, Nicolas Brisebarre, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto |
A Coprocessor for the Final Exponentiation of the eta T Pairing in Characteristic Three. |
WAIFI |
2007 |
DBLP DOI BibTeX RDF |
final exponentiation, FPGA, hardware accelerator, ? T pairing, characteristic three |
52 | Peter Aczel, Laura Crosilla, Hajime Ishihara, Erik Palmgren, Peter Schuster 0001 |
Binary Refinement Implies Discrete Exponentiation. |
Stud Logica |
2006 |
DBLP DOI BibTeX RDF |
Constructive set theory, Exponentiation axiom |
52 | David M. Harris |
An Exponentiation Unit for an OpenGL Lighting Engine. |
IEEE Trans. Computers |
2004 |
DBLP DOI BibTeX RDF |
OpenGL hardware acceleration, table complexity, bipartite tables, Powering, computer arithmetic, table lookups, exponentiation |
52 | Alan Daly, William P. Marnane |
Efficient architectures for implementing montgomery modular multiplication and RSA modular exponentiation on reconfigurable logic. |
FPGA |
2002 |
DBLP DOI BibTeX RDF |
FPGA, encryption, RSA, public key, exponentiation, modular multiplication, montgomery |
52 | B. J. Phillips, N. Burgess |
Implementing 1, 024-Bit RSA Exponentiation on a 32-Bit Processor Core. |
ASAP |
2000 |
DBLP DOI BibTeX RDF |
Smart Card, RSA, Public Key Cryptography, Sliding Windows, Modular Exponentiation |
49 | Koji Nakano, Kensuke Kawakami, Koji Shigemoto |
RSA encryption and decryption using the redundant number system on the FPGA. |
IPDPS |
2009 |
DBLP DOI BibTeX RDF |
|
49 | Johann Großschädl, Stefan Tillich, Alexander Szekely |
Performance Evaluation of Instruction Set Extensions for Long Integer Modular Arithmetic on a SPARC V8 Processor. |
DSD |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Chong Hee Kim, Jong Hoon Shin, Jean-Jacques Quisquater, Pil Joong Lee |
Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
|
49 | S. Rahul, R. C. Hansdah |
An Efficient Distributed Group Key Management Algorithm. |
ICPADS |
2004 |
DBLP DOI BibTeX RDF |
|
49 | Kyo-Min Ku, Kyeoung Ju Ha, Kee-Young Yoo |
Fast Exponentiaion over GF(2) Based on Cellular Automata. |
International Conference on Computational Science |
2003 |
DBLP DOI BibTeX RDF |
|
46 | Michael Scott, Naomi Benger, Manuel Charlemagne, Luis J. Dominguez Perez, Ezekiel J. Kachisa |
On the Final Exponentiation for Calculating Pairings on Ordinary Elliptic Curves. |
Pairing |
2009 |
DBLP DOI BibTeX RDF |
addition sequences, Tate pairing, addition chains |
46 | I-Cheng Wang, Chih-Hao Shen, Kung Chen, Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang 0004 |
An Empirical Study on Privacy and Secure Multi-party Computation Using Exponentiation. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
46 | Chia-Long Wu |
Fast Parallel Montgomery Binary Exponentiation Algorithm Using Canonical- Signed-Digit Recoding Technique. |
ICA3PP |
2009 |
DBLP DOI BibTeX RDF |
Montgomery reduction algorithm, cryptography, complexity analysis, number theory, algorithm design |
46 | Claire Whelan, Michael Scott |
The Importance of the Final Exponentiation in Pairings When Considering Fault Attacks. |
Pairing |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Nadia Nedjah, Luiza de Macedo Mourelle, Rodrigo Martins da Silva |
Efficient Hardware for Modular Exponentiation Using the Sliding-Window Method. |
ITNG |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Daisuke Suzuki |
How to Maximize the Potential of FPGA Resources for Modular Exponentiation. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Nadia Nedjah, Luiza de Macedo Mourelle |
Minimal Addition-Subtraction Sequences for Efficient Pre-processing in Large Window-Based Modular Exponentiation Using Genetic Algorithms. |
IDEAL |
2003 |
DBLP DOI BibTeX RDF |
|
46 | Mario Alberto Garcia Martinez, Guillermo Morales-Luna, Francisco Rodríguez-Henríquez |
Hardware Implementation of the Binary Method for Exponentiation in GF(2m). |
ENC |
2003 |
DBLP DOI BibTeX RDF |
|
46 | Won-Ho Lee, Young-Jun Heo, Kee-Young Yoo |
Efficient Architecture for Exponentiation and Division in GF(2m) Using Irreducible AOP. |
ICCSA (1) |
2003 |
DBLP DOI BibTeX RDF |
|
46 | Nadia Nedjah, Luiza de Macedo Mourelle |
Efficient Parallel Modular Exponentiation Algorithm. |
ADVIS |
2002 |
DBLP DOI BibTeX RDF |
|
46 | Huapeng Wu, M. Anwar Hasan |
Efficient exponentiation using weakly dual basis. |
IEEE Trans. Very Large Scale Integr. Syst. |
2001 |
DBLP DOI BibTeX RDF |
|
46 | Alexander Tiountchik, Elena Trichina |
Modular Exponentiation on Fine-Grained FPGA. |
CT-RSA |
2001 |
DBLP DOI BibTeX RDF |
|
46 | Hyun-Sung Kim 0001, Kee-Young Yoo |
Area Efficient Exponentiation Using Modular Multiplier/Squarer in GF(2m. |
COCOON |
2001 |
DBLP DOI BibTeX RDF |
|
46 | Luke O'Connor |
An Analysis of Exponentiation Based on Formal Languages. |
EUROCRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
46 | Seong-Min Hong 0001, Sang-Yeop Oh, Hyunsoo Yoon |
New Modular Multiplication Algorithms for Fast Modular Exponentiation. |
EUROCRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
46 | Arnaud Boscher, Robert Naciri, Emmanuel Prouff |
CRT RSA Algorithm Protected Against Fault Attacks. |
WISTP |
2007 |
DBLP DOI BibTeX RDF |
Smart Card, RSA, Chinese Remainder Theorem, Fault Attacks, Simple Power Analysis, Modular Exponentiation |
46 | Fatih Gelgi, Melih Onus |
Heuristics for Minimum Brauer Chain Problem. |
ISCIS |
2006 |
DBLP DOI BibTeX RDF |
Brauer chain, dynamic programming, greedy algorithms, exponentiation, addition chain |
46 | Shay Gueron, Or Zuk |
Applications of The Montgomery Exponent. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
ef£cient implementations, Montgomery multiplication, modular exponentiation |
46 | Peter Groen, Panu Hämäläinen, Ben H. H. Juurlink, Timo Hämäläinen 0001 |
Accelerating the secure remote password protocol using reconfigurable hardware. |
Conf. Computing Frontiers |
2004 |
DBLP DOI BibTeX RDF |
secure remote password protocol, authentication, WLAN, hardware acceleration, reconfigurable hardware, modular exponentiation |
46 | Ralph McKenzie |
The Zig-Zag Property and Exponential Cancellation of Ordered Sets. |
Order |
2003 |
DBLP DOI BibTeX RDF |
cancellation of exponents, exponentiation, posets |
46 | Lejla Batina, Geeke Muurling |
Montgomery in Practice: How to Do It More Efficiently in Hardware. |
CT-RSA |
2002 |
DBLP DOI BibTeX RDF |
scalability, performance model, systolic array, Montgomery multiplication, modular exponentiation |
46 | Colin D. Walter, Susan Thompson |
Distinguishing Exponent Digits by Observing Modular Subtractions. |
CT-RSA |
2001 |
DBLP DOI BibTeX RDF |
m-ary method, power analysis, sliding windows, Exponentiation, Montgomery multiplication, modular multiplication, timing attack, RSA cryptosystem |
46 | Colin D. Walter |
Sliding Windows Succumbs to Big Mac Attack. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
Cryptography, smart card, RSA, differential power analysis, DPA, blinding, sliding windows, exponentiation |
43 | JeaHoon Park, KiSeok Bae, Sang-Jae Moon, Dooho Choi, You Sung Kang, JaeCheol Ha |
A new fault cryptanalysis on montgomery ladder exponentiation algorithm. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
Montgomery ladder exponentiation algorithm, fault analysis attack, RSA, physical cryptanalysis |
43 | Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani |
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption. |
ACM Trans. Comput. Log. |
2008 |
DBLP DOI BibTeX RDF |
Diffie-Hellman exponentiation, Dolev-Yao model, complexity, protocols, Algebraic properties |
43 | Sebastian Fleissner |
GPU-Accelerated Montgomery Exponentiation. |
International Conference on Computational Science (1) |
2007 |
DBLP DOI BibTeX RDF |
Montgomery Exponentiation, Encryption, GPGPU |
43 | Roberto Maria Avanzi |
The Complexity of Certain Multi-Exponentiation Techniques in Cryptography. |
J. Cryptol. |
2005 |
DBLP DOI BibTeX RDF |
Integer recoding, Elliptic and hyperelliptic curves, Trace zero varieties, Groups with automorphisms, Scalar multiplication, Exponentiation, XTR |
43 | Colin D. Walter |
Issues of Security with the Oswald-Aigner Exponentiation Algorithm. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
Addition-subtraction chains, randomized exponentiation, elliptic curve cryptography, ECC, DPA, blinding, power analysis, smartcard, SPA, DEMA, point multiplication, SEMA |
43 | Oded Goldreich 0001, Vered Rosen |
On the Security of Modular Exponentiation with Application to the Construction of Pseudorandom Generators. |
J. Cryptol. |
2003 |
DBLP DOI BibTeX RDF |
Hard-core predicates, Simultaneous security, Factoring assumption, Discrete logarithm, Pseudorandom generator, Modular exponentiation |
43 | Thomas Blum, Christof Paar |
High-Radix Montgomery Modular Exponentiation on Reconfigurable Hardware. |
IEEE Trans. Computers |
2001 |
DBLP DOI BibTeX RDF |
FPGA, RSA, systolic array, exponentiation, modular arithmetic, Montgomery |
43 | Gaël Hachez, Jean-Jacques Quisquater |
Montgomery Exponentiation with no Final Subtractions: Improved Results. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
smart cards, Montgomery multiplication, timing attacks, modular exponentiation, power attacks |
39 | Susan Hohenberger, Anna Lysyanskaya |
How to Securely Outsource Cryptographic Computations. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Christopher C. Doss, Robert L. Riley Jr. |
FPGA-based implementation of single-precision exponential unit. |
FPGA |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Fu-Chi Chang, Chia-Jiu Wang |
Architectural tradeoff in implementing RSA processors. |
SIGARCH Comput. Archit. News |
2002 |
DBLP DOI BibTeX RDF |
|
39 | Jae Wook Chung, Sang Gyoo Sim, Pil Joong Lee |
Fast Implementation of Elliptic Curve Defined over GF(pm) on CalmRISC with MAC2424 Coprocessor. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
|
39 | Antoon Bosselaers, René Govaerts, Joos Vandewalle |
Comparison of Three Modular Reduction Functions. |
CRYPTO |
1993 |
DBLP DOI BibTeX RDF |
|
39 | Martin Davis, Hilary Putnam |
A Computing Procedure for Quantification Theory. |
J. ACM |
1960 |
DBLP DOI BibTeX RDF |
|
36 | Nadia Nedjah, Luiza de Macedo Mourelle |
SoC-based implementation for modular exponentiation using evolutionary addition chains. |
IEEE Congress on Evolutionary Computation |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Gökay Saldamli, Çetin Kaya Koç |
Spectral Modular Exponentiation. |
IEEE Symposium on Computer Arithmetic |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Soonhak Kwon, Chang Hoon Kim, Chun Pyo Hong |
Sparse polynomials, redundant bases, gauss periods, and efficient exponentiation of primitive elements for small characteristic finite fields. |
Des. Codes Cryptogr. |
2006 |
DBLP DOI BibTeX RDF |
AMS Classification Primary 12Y05, Secondary 11T71 |
36 | Zhong Ren 0001, Rui Wang 0004, John M. Snyder, Kun Zhou 0001, Xinguo Liu, Bo Sun, Peter-Pike J. Sloan, Hujun Bao, Qunsheng Peng 0001, Baining Guo |
Real-time soft shadows in dynamic scenes using spherical harmonic exponentiation. |
ACM Trans. Graph. |
2006 |
DBLP DOI BibTeX RDF |
Volterra series, lighting environment, ambient occlusion |
36 | Shay Gueron |
Data and Computational Fault Detection Mechanism for Devices That Perform Modular Exponentiation. |
FDTC |
2006 |
DBLP DOI BibTeX RDF |
safe errors, RSA, smartcards, Fault attacks, countermeasures, embedded devices |
36 | Nadia Nedjah, Luiza de Macedo Mourelle |
Efficient Pre-processing for Large Window-Based Modular Exponentiation Using Ant Colony. |
KES (4) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Luiza de Macedo Mourelle, Nadia Nedjah |
Reconfigurable Hardware for Addition Chains Based Modular Exponentiation. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Luiza de Macedo Mourelle, Nadia Nedjah |
Fast Reconfigurable Hardware for the M-ary Modular Exponentiation. |
DSD |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Luiza de Macedo Mourelle, Nadia Nedjah |
Hardware for Modular Exponentiation Suitable for Smart Cards. |
ICESS |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Vitaly Shmatikov |
Decidable Analysis of Cryptographic Protocols with Products and Modular Exponentiation. |
ESOP |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Bodo Möller |
Fractional Windows Revisited: Improved Signed-Digit Representations for Efficient Exponentiation. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
elliptic curve cryptography, Efficient implementations |
36 | Nareli Cruz Cortés, Francisco Rodríguez-Henríquez, Carlos A. Coello Coello |
On the Optimal Computaion of Finite Field Exponentiation. |
IBERAMIA |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Kyo-Min Ku, Kyeoung Ju Ha, Kee-Young Yoo |
Time-Space Efficient Exponentiation over GF(2m). |
ICCSA (1) |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Nadia Nedjah, Luiza de Macedo Mourelle |
Three Hardware Implementations for the Binary Modular Exponentiation: Sequential, Parallel and Systolic. |
SBAC-PAD |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Deepak Kapur, Paliath Narendran, Lida Wang |
An E-unification Algorithm for Analyzing Protocols That Use Modular Exponentiation. |
RTA |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Nadia Nedjah, Luiza de Macedo Mourelle |
Efficient Pre-processing for Large Window-Based Modular Exponentiation Using Genetic Algorithms. |
IEA/AIE |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 875 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ >>] |
|