209 papers found
Refreshing results…
Exponent Recoding and Regular Exponentiation Algorithms
Download from www.researchgate.netRSA Moduli with a Predetermined Portion: Techniques and Applications
Download from joye.site88.netHighly Regular Right-to-Left Algorithms for Scalar Multiplication
Download from link.springer.comCryptanalysis of a Video Scrambling Based on Space Filling Curves
Download from www.researchgate.netSecuring OpenSSL against Micro-Architectural Attacks.
Download from www.researchgate.netOn the notions of PRP-RKA, KR and KR-RKA for block ciphers
Download from joye.site88.netTrading Inversions for Multiplications in Elliptic Curve Cryptography
Download from citeseerx.ist.psu.eduA Practical and Tightly Secure Signature Scheme Without Hash Function
Download from citeseerx.ist.psu.eduFast Generation of Prime Numbers on Portable Devices: An Update
Download from link.springer.comElliptic curve cryptosystems in the presence of permanent and transient faults
Download from citeseerx.ist.psu.eduMissing publications? Read more about our data sources.