Fault-Tolerant Ring Embedding in de Bruijn Networks
IEEE Transactions on Computers
Cross-Correlations of Quadratic Form Sequences in OddCharacteristic
Designs, Codes and Cryptography
Montgomery Multiplication in GF(2^k
Designs, Codes and Cryptography
Low-Energy Digit-Serial/Parallel Finite Field Multipliers
Journal of VLSI Signal Processing Systems - Special issue on application specific systems, architectures and processors
Optimal Processor Mapping for Linear-Complement Communication on Hypercubes
IEEE Transactions on Parallel and Distributed Systems
Multibit Correcting Data Interface for Fault-Tolerant Systems
IEEE Transactions on Computers
Analytical Estimation of Vector Access Performance in Parallel Memory Architectures
IEEE Transactions on Computers
Analysis of One-Dimensional Linear Hybrid Cellular Automata over GF(q)
IEEE Transactions on Computers
Reconfigurable Implementation of Elliptic Curve Crypto Algorithms
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
New Parallel Architecture for Modular Multiplication and Squaring Based on Cellular Automata
PARA '02 Proceedings of the 6th International Conference on Applied Parallel Computing Advanced Scientific Computing
Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Area Efficient Exponentiation Using Modular Multiplier/Squarer in GF(2m
COCOON '01 Proceedings of the 7th Annual International Conference on Computing and Combinatorics
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Fast Algorithms for Determining the Linear Complexity of Period Sequences
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Bit-Serial AOP Arithmetic Architectures over GF (2m)
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
On the Interpolation Attacks on Block Ciphers
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Maximal Periods of x + c in Fq
AAECC-14 Proceedings of the 14th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
The GH Public-Key Cryptosystem
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Using transforming matrices to generate DNA clone grids
Discrete Applied Mathematics
Parallel Multipliers Based on Special Irreducible Pentanomials
IEEE Transactions on Computers
A Generalized Method for Constructing Subquadratic Complexity GF(2^k) Multipliers
IEEE Transactions on Computers
Elliptic curve cryptography: Java implementation
Proceedings of the 1st annual conference on Information security curriculum development
Efficient detection of discrepancies in multiple file copies
Distributed Computing
High-speed systolic architectures for finite field inversion
Integration, the VLSI Journal - Special issue: ACM great lakes symposium on VLSI
Design of long period pseudo-random sequences from the addition of m-sequences over Fp
EURASIP Journal on Wireless Communications and Networking - Special issue on innovative signal transmission and detection techniques for next generation cellular CDMA systems
Energy Scalable Universal Hashing
IEEE Transactions on Computers
A Generalization of Niho's Theorem
Designs, Codes and Cryptography
Affine equivalence in the AES round function
Discrete Applied Mathematics
On linear complexity of sequences over GF(2n)
Theoretical Computer Science
Achieving efficient polynomial multiplication in fermat fields using the fast Fourier transform
Proceedings of the 44th annual Southeast regional conference
The divisibility modulo 24 of Kloosterman sums on GF(2m), m odd
Journal of Combinatorial Theory Series A
Two-tuple balance of non-binary sequences with ideal two-level autocorrelation
Discrete Applied Mathematics
LFSR multipliers over GF(2m) defined by all-one polynomial
Integration, the VLSI Journal
International Journal of Information and Computer Security
Efficient Finite Fields in the Maxima Computer Algebra System
WAIFI '08 Proceedings of the 2nd international workshop on Arithmetic of Finite Fields
Parallel Generation of l-Sequences
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
Elliptic Curve Cryptography on FPGA for Low-Power Applications
ACM Transactions on Reconfigurable Technology and Systems (TRETS)
New Sequences with Low Correlation and Large Family Size
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
On the Computational Efficiency of XTR+
Information Security and Cryptology
FPGA Implementation of Elliptic Curve Point Multiplication over GF(2191)
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Theoretical exploration of pattern attributes for maximum-length shift-register sequences
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
CRT-based high-speed parallel architecture for long BCH encoding
IEEE Transactions on Circuits and Systems II: Express Briefs
A universal VLSI architecture for Reed-Solomon error-and-erasure decoders
IEEE Transactions on Circuits and Systems Part I: Regular Papers
Affine equivalence in the AES round function
Discrete Applied Mathematics
High-speed systolic architectures for finite field inversion
Integration, the VLSI Journal - Special issue: ACM great lakes symposium on VLSI
Differential properties of power functions
International Journal of Information and Coding Theory
Time-space efficient exponentiation over GF(2m)
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartI
Fast exponentiaion over GF(2m) based on cellular automata
ICCS'03 Proceedings of the 2003 international conference on Computational science: PartII
Efficient architectures for elliptic curve cryptography processors for RFID
ICCD'09 Proceedings of the 2009 IEEE international conference on Computer design
How to teach undergraduate students a real cipher design
ITHET'10 Proceedings of the 9th international conference on Information technology based higher education and training
Pseudorandom sequences and stream ciphers
Algorithms and theory of computation handbook
Efficient semisystolic architectures for finite-field arithmetic
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
A new fingerprinting codes for multimedia contents
MMM'07 Proceedings of the 13th International conference on Multimedia Modeling - Volume Part II
The merit factor problem for binary sequences
AAECC'06 Proceedings of the 16th international conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Some attacks on the bit-search generator
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
A fast algorithm for determining the linear complexity of periodic sequences
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
New methods to construct cheating immune multisecret sharing scheme
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
A fast algorithm for determining the linear complexity of periodic sequences over GF(3)
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
On the peak-to-average power ratio of M-sequences
Finite Fields and Their Applications
On Niho type cross-correlation functions of m-sequences
Finite Fields and Their Applications
A new class of monomial bent functions
Finite Fields and Their Applications
When does G(x )+γTr(H(x)) permute Fpn?
Finite Fields and Their Applications
Bounds for Exponential Sums over Finite Fields
Finite Fields and Their Applications
Editorial: A decade of Finite Fields and Their Applications
Finite Fields and Their Applications
Correlation power analysis attack of AES on FPGA using customized communication protocol
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Efficient gröbner basis reductions for formal verification of galois field multipliers
DATE '12 Proceedings of the Conference on Design, Automation and Test in Europe
Utilization of Pipeline Technique in AOP Based Multipliers with Parallel Inputs
Journal of Signal Processing Systems
New efficient bit-parallel polynomial basis multiplier for special pentanomials
Integration, the VLSI Journal
On the algebraic construction of cryptographically good 32×32 binary linear transformations
Journal of Computational and Applied Mathematics
On the subfield subcodes of Hermitian codes
Designs, Codes and Cryptography
Hi-index | 0.02 |