Non-adjacent form

Results: 2



#Item
1Appears in P. J. Lee, C. H. Lim (Eds.): Information Security and Cryptology – ICISC 2002, Springer-Verlag LNCS 2587, pp. 298–312, ISBN, 2003. Improved Techniques for Fast Exponentiation Bodo M¨oller Te

Appears in P. J. Lee, C. H. Lim (Eds.): Information Security and Cryptology – ICISC 2002, Springer-Verlag LNCS 2587, pp. 298–312, ISBN, 2003. Improved Techniques for Fast Exponentiation Bodo M¨oller Te

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:24:26
2Analysis and Optimality of the Width-w Non-Adjacent Form to Imaginary Quadratic Bases Daniel Krenn (joint work with Clemens Heuberger)

Analysis and Optimality of the Width-w Non-Adjacent Form to Imaginary Quadratic Bases Daniel Krenn (joint work with Clemens Heuberger)

Add to Reading List

Source URL: www.cant.ulg.ac.be

Language: English - Date: 2011-05-31 09:18:08