Modular arithmetic

Results: 480



#Item
11Computer Networks–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

Computer Networks–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
12Taking Roots over High Extensions of Finite Fields ´ Eric Schost

Taking Roots over High Extensions of Finite Fields ´ Eric Schost

Add to Reading List

Source URL: www.csd.uwo.ca

Language: English - Date: 2011-11-11 00:09:18
13273  Doc. Math. J. DMV Global Quadratic Units and Hecke Algebras Haruzo Hida1

273 Doc. Math. J. DMV Global Quadratic Units and Hecke Algebras Haruzo Hida1

Add to Reading List

Source URL: www.math.uiuc.edu

Language: English - Date: 2014-07-15 07:20:00
14273  Doc. Math. J. DMV Global Quadratic Units and Hecke Algebras Haruzo Hida1

273 Doc. Math. J. DMV Global Quadratic Units and Hecke Algebras Haruzo Hida1

Add to Reading List

Source URL: documenta.sagemath.org

Language: English - Date: 2014-07-15 07:20:00
15A Compact and Scalable RNS Architecture Pedro Miguens Matutino Ricardo Chaves and Leonel Sousa  ISEL / INESC-ID / IST, Technical University of Lisbon

A Compact and Scalable RNS Architecture Pedro Miguens Matutino Ricardo Chaves and Leonel Sousa ISEL / INESC-ID / IST, Technical University of Lisbon

Add to Reading List

Source URL: www.inesc-id.pt

Language: English - Date: 2014-01-29 04:45:59
16671  Documenta Math. Arithmetic of a fake projective plane and related elliptic surfaces

671 Documenta Math. Arithmetic of a fake projective plane and related elliptic surfaces

Add to Reading List

Source URL: documenta.sagemath.org

Language: English - Date: 2010-10-11 05:44:40
17ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

Add to Reading List

Source URL: www.crypto.ethz.ch

Language: English - Date: 2015-02-25 05:09:48
18Remote Timing Attacks are Practical David Brumley Stanford University  Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
191  A Randomized Multi-modulo RNS Architecture for Double-and-Add in ECC to prevent Power Analysis Side Channel Attacks Jude Angelo Ambrose†

1 A Randomized Multi-modulo RNS Architecture for Double-and-Add in ECC to prevent Power Analysis Side Channel Attacks Jude Angelo Ambrose†

Add to Reading List

Source URL: www.inesc-id.pt

Language: English - Date: 2013-12-23 08:24:26
20Trinomial bases and Chinese remaindering for modular polynomial multiplication ´ Eric Schost1 and Arash Hariri2 1

Trinomial bases and Chinese remaindering for modular polynomial multiplication ´ Eric Schost1 and Arash Hariri2 1

Add to Reading List

Source URL: www.csd.uwo.ca

Language: English - Date: 2008-12-16 23:33:36