Non-adjacent form
Results: 2
# | Item |
---|---|
1![]() | Appears in P. J. Lee, C. H. Lim (Eds.): Information Security and Cryptology – ICISC 2002, Springer-Verlag LNCS 2587, pp. 298–312, ISBN, 2003. Improved Techniques for Fast Exponentiation Bodo M¨oller TeAdd to Reading ListSource URL: www.bmoeller.deLanguage: English - Date: 2006-01-02 00:24:26 |
2![]() | Analysis and Optimality of the Width-w Non-Adjacent Form to Imaginary Quadratic Bases Daniel Krenn (joint work with Clemens Heuberger)Add to Reading ListSource URL: www.cant.ulg.ac.beLanguage: English - Date: 2011-05-31 09:18:08 |