Optimal Left-to-Right Binary Signed-Digit Recoding
IEEE Transactions on Computers - Special issue on computer arithmetic
Exponentiation Using Division Chains
IEEE Transactions on Computers
Improving and Extending the Lim/Lee Exponentiation Algorithm
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
Algorithms for Multi-exponentiation
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Speeding up Elliptic Cryptosystems by Using a Signed Binary Window Method
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
More Flexible Exponentiation with Precomputation
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Incremental Cryptography: The Case of Hashing and Signing
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Secure Server-Aided Signature Generation
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Efficient Parallel Modular Exponentiation Algorithm
ADVIS '02 Proceedings of the Second International Conference on Advances in Information Systems
Fast Key Exchange with Elliptic Curve Systems
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Fast Point Decompression for Standard Elliptic Curves
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
Computing pairings using x-coordinates only
Designs, Codes and Cryptography
A low-complexity LUT-based squaring algorithm
Computers & Mathematics with Applications
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
On the Final Exponentiation for Calculating Pairings on Ordinary Elliptic Curves
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
CEC'09 Proceedings of the Eleventh conference on Congress on Evolutionary Computation
New modular multiplication algorithms for fast modular exponentiation
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Resource requirements for the application of addition chains in modulo exponentiation
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
An analysis of exponentiation based on formal languages
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Parallel computation of modular exponentiation for fast cryptography
International Journal of High Performance Systems Architecture
WISM'10 Proceedings of the 2010 international conference on Web information systems and mining
Designing a code generator for pairing based cryptographic functions
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
SSLShader: cheap SSL acceleration with commodity processors
Proceedings of the 8th USENIX conference on Networked systems design and implementation
A simulated annealing algorithm for the problem of minimal addition chains
EPIA'11 Proceedings of the 15th Portugese conference on Progress in artificial intelligence
Efficient batch verification for RSA-Type digital signatures in a ubiquitous environment
EUC'06 Proceedings of the 2006 international conference on Embedded and Ubiquitous Computing
A parallel modular exponentiation scheme for transformed exponents
APPT'05 Proceedings of the 6th international conference on Advanced Parallel Processing Technologies
Finding optimal addition chains using a genetic algorithm approach
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I
A loopless gray code for minimal signed-binary representations
ESA'05 Proceedings of the 13th annual European conference on Algorithms
Power attack on small RSA public exponent
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
New computation paradigm for modular exponentiation using a graph model
SAGA'05 Proceedings of the Third international conference on StochasticAlgorithms: foundations and applications
Hi-index | 0.00 |