VICTOR: an efficient RSA hardware implementation
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
A chosen text attack on the modified cryptographic checksum algorithm of Cohen and Huang
CRYPTO '89 Proceedings on Advances in cryptology
Hardware speedups in long integer multiplication
ACM SIGARCH Computer Architecture News - Symposium on parallel algorithms and architectures
An RNS Montgomery Modular Multiplication Algorithm
IEEE Transactions on Computers
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Power Analysis Attacks of Modular Exponentiation in Smartcards
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Fast Implementation of Public-Key Cryptography ona DSP TMS320C6201
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Secure evolvable hardware for public-key cryptosystems
New Generation Computing - Evolutionary computation
Fast hardware for modular exponentiation with efficient exponent pre-processing
Journal of Systems Architecture: the EUROMICRO Journal
Evolutionary Public-Key Cryptographic Circuits
IEA/AIE '08 Proceedings of the 21st international conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems: New Frontiers in Applied Artificial Intelligence
ESIGN: an efficient digital signature implementation for smart cards
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
High-speed implementation methods for RSA scheme
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
On the development of a fast elliptic curve cryptosystem
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
VECPAR'02 Proceedings of the 5th international conference on High performance computing for computational science
Parallel modular exponentiation using load balancing without precomputation
Journal of Computer and System Sciences
Fast truncated multiplication for cryptographic applications
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Hi-index | 0.00 |