Back to Results
First PageMeta Content
Non-adjacent form / Exponentiation / Logarithm / Binary numeral system / Exponentiation by squaring / Mathematics / Elementary mathematics / Exponentials


Appears in P. J. Lee, C. H. Lim (Eds.): Information Security and Cryptology – ICISC 2002, Springer-Verlag LNCS 2587, pp. 298–312, ISBN, 2003. Improved Techniques for Fast Exponentiation Bodo M¨oller Te
Add to Reading List

Document Date: 2006-01-02 00:24:26


Open Document

File Size: 234,15 KB

Share Result on Facebook

City

Darmstadt / /

Company

accumulators Ab / Y Ab / B Ab / /

/

IndustryTerm

exponentiation algorithms / generation algorithm / power products / computing / left-to-right algorithms / power product / /

OperatingSystem

Microsoft Windows / /

Technology

cryptography / exponentiation algorithms / A2b return A1 This algorithm / b0 This algorithm / following algorithm / public key / finite state machine / generation algorithm / following modified algorithm / /

SocialTag