Exponentiation by squaring

Results: 24



#Item
11S. Vaudenay, A. M. Youssef (Eds.): Selected Areas in Cryptography – SAC 2001, Springer-Verlag LNCS 2259, pp. 165–180, ISBNAlgorithms for Multi-exponentiation Bodo M¨oller Technische Universit¨

S. Vaudenay, A. M. Youssef (Eds.): Selected Areas in Cryptography – SAC 2001, Springer-Verlag LNCS 2259, pp. 165–180, ISBNAlgorithms for Multi-exponentiation Bodo M¨oller Technische Universit¨

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:24:58
12Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection Jothi Rangasamy, Douglas Stebila, Lakshmi Kuppusamy, Colin Boyd, and Juan Gonzalez Nieto Information Security Institute, Queensland Universi

Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection Jothi Rangasamy, Douglas Stebila, Lakshmi Kuppusamy, Colin Boyd, and Juan Gonzalez Nieto Information Security Institute, Queensland Universi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-08 12:13:25
13Technical Report TI27th AprilTU Darmstadt, Fachbereich Informatik Algorithms for multi-exponentiation Bodo M¨oller Technische Universit¨

Technical Report TI27th AprilTU Darmstadt, Fachbereich Informatik Algorithms for multi-exponentiation Bodo M¨oller Technische Universit¨

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:23:29
14Memory-saving computation of the pairing final exponentiation on BN curves∗ Sylvain Duquesne and Loubna Ghammam March 3, 2015

Memory-saving computation of the pairing final exponentiation on BN curves∗ Sylvain Duquesne and Loubna Ghammam March 3, 2015

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-03 08:06:21
15Power Attack on Small RSA Public Exponent Pierre-alain Fouque1 , S´ebastien Kunz-Jacques1,2 , Gwena¨elle Martinet2 , Fr´ed´eric Muller3 , and Fr´ed´eric Valette4 ´ Ecole normale sup´erieure, 45 rue d’Ulm, 75005

Power Attack on Small RSA Public Exponent Pierre-alain Fouque1 , S´ebastien Kunz-Jacques1,2 , Gwena¨elle Martinet2 , Fr´ed´eric Muller3 , and Fr´ed´eric Valette4 ´ Ecole normale sup´erieure, 45 rue d’Ulm, 75005

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-03-05 01:42:52
16Optimal software-implemented Itoh–Tsujii inversion for F2m Jeremy Maitin-Shepard [removed] University of California at Berkeley  Abstract

Optimal software-implemented Itoh–Tsujii inversion for F2m Jeremy Maitin-Shepard [removed] University of California at Berkeley Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-13 04:01:36
17Fast Matrix Multiplication

Fast Matrix Multiplication

Add to Reading List

Source URL: theoryofcomputing.org

Language: English - Date: 2013-12-24 16:15:16
18Efficient and Side-Channel Resistant RSA Implementation for 8-bit AVR Microcontrollers Zhe Liu∗† , Johann Großsch¨adl† , and Ilya Kizhvatov†

Efficient and Side-Channel Resistant RSA Implementation for 8-bit AVR Microcontrollers Zhe Liu∗† , Johann Großsch¨adl† , and Ilya Kizhvatov†

Add to Reading List

Source URL: www.caad.arch.ethz.ch

Language: English - Date: 2010-12-05 01:36:55
19A survey of fast exponentiation methods Daniel M. Gordon Center for Communications Research

A survey of fast exponentiation methods Daniel M. Gordon Center for Communications Research

Add to Reading List

Source URL: saluc.engr.uconn.edu

Language: English - Date: 2006-01-25 21:38:14
20UCL Crypto Group Technical Report Series  A practical implementation of the

UCL Crypto Group Technical Report Series A practical implementation of the

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2004-01-21 23:25:50