-
1
-
-
0012680953
-
A lower bound for the length of addition chains
-
A. Schönhage, "A lower bound for the length of addition chains," Theor. Comput. Sci., vol. 1, pp. 1-12, 1975.
-
(1975)
Theor. Comput. Sci
, vol.1
, pp. 1-12
-
-
Schönhage, A.1
-
2
-
-
33751017631
-
Immune system approaches to intrusion detection - A review
-
Proc. 3rd Int. Conf. Artif. Immune Syst, ICARIS 2004, G. Nicosia, V. Cutello, P. J. Bentley, and J. Timmins, Eds, Catania, Sicily, Italy, Sep
-
U. Aickelin, J. Greensmith, and J. Twycross, "Immune system approaches to intrusion detection - A review," in Proc. 3rd Int. Conf. Artif. Immune Syst., ICARIS 2004, G. Nicosia, V. Cutello, P. J. Bentley, and J. Timmins, Eds., Catania, Sicily, Italy, Sep. 2004, vol. 3239, Lecture Notes in Computer Science, pp. 316-329.
-
(2004)
Lecture Notes in Computer Science
, vol.3239
, pp. 316-329
-
-
Aickelin, U.1
Greensmith, J.2
Twycross, J.3
-
3
-
-
26944469320
-
Inspiration for the next generation of artificial immune systems
-
Proc. 4th Int. Conf. Artif. Immune Syst, ICARIS 2005, C. Jacob, M. L. Pilat, P. J. Bentley, and J. Timmis, Eds, Aug
-
P. S. Andrews and J. Timmins, "Inspiration for the next generation of artificial immune systems," in Proc. 4th Int. Conf. Artif. Immune Syst., ICARIS 2005, C. Jacob, M. L. Pilat, P. J. Bentley, and J. Timmis, Eds., Aug. 2005, vol. 3627, Lecture Notes in Computer Science, pp. 126-138.
-
(2005)
Lecture Notes in Computer Science
, vol.3627
, pp. 126-138
-
-
Andrews, P.S.1
Timmins, J.2
-
5
-
-
0012694061
-
Efficient computation of addition chains
-
F. Bergeron, J. Berstel, and S. Brlek, "Efficient computation of addition chains," J. de théorie des nombres de Bordeaux, vol. 6, pp. 21-38, 1994.
-
(1994)
J. de théorie des nombres de Bordeaux
, vol.6
, pp. 21-38
-
-
Bergeron, F.1
Berstel, J.2
Brlek, S.3
-
6
-
-
0000742754
-
Addition chain heuristics
-
Proc. Adv. Cryptology, CRYPTO 89, G. Brassard, Ed
-
J. Bos and M. Coster, "Addition chain heuristics," in Proc. Adv. Cryptology, CRYPTO 89, G. Brassard, Ed., 1989, vol. 435, Lecture Notes in Computer Science, pp. 400-407.
-
(1989)
Lecture Notes in Computer Science
, vol.435
, pp. 400-407
-
-
Bos, J.1
Coster, M.2
-
7
-
-
85027967075
-
Fast exponentiation with precomputation
-
Proc. Adv. Cryptology, EUROCRYPT 92, R. A. Rueppel, Ed
-
E. F. Brickell, D. M. Gordon, K. S. McCurley, and D. B. Wilson, "Fast exponentiation with precomputation," in Proc. Adv. Cryptology, EUROCRYPT 92, R. A. Rueppel, Ed., 1992, vol. 658, Lecture Notes in Computer Science, pp. 200-207.
-
(1992)
Lecture Notes in Computer Science
, vol.658
, pp. 200-207
-
-
Brickell, E.F.1
Gordon, D.M.2
McCurley, K.S.3
Wilson, D.B.4
-
8
-
-
0002152261
-
Clonal selection and after
-
G. I. Bell, A. S. Perelson, and G. H. Pimgley, Jr, Eds. New York: Marcel Dekker
-
F. M. Burnet, "Clonal selection and after," in Theoretical Immunology, G. I. Bell, A. S. Perelson, and G. H. Pimgley, Jr., Eds. New York: Marcel Dekker, 1978, pp. 63-85.
-
(1978)
Theoretical Immunology
, pp. 63-85
-
-
Burnet, F.M.1
-
9
-
-
22944458514
-
On the optimal computation of finite field exponentiation
-
Proc. 9th Ibero-Amer. Conf. AI Adv. Artif. Intell, IBERAMIA 2004, C. Lemaître, C. Reyes, and J. González, Eds, Nov
-
N. Cruz-Cortes, F. Rodriguez-Henriquez, and C. Coello Coello, "On the optimal computation of finite field exponentiation," in Proc. 9th Ibero-Amer. Conf. AI Adv. Artif. Intell., IBERAMIA 2004, C. Lemaître, C. Reyes, and J. González, Eds., Nov. 2004, vol. 3315, Lecture Notes in Computer Science, pp. 747-756.
-
(2004)
Lecture Notes in Computer Science
, vol.3315
, pp. 747-756
-
-
Cruz-Cortes, N.1
Rodriguez-Henriquez, F.2
Coello Coello, C.3
-
10
-
-
79952272440
-
An immunological approach to combinatorial optimization problems
-
Proc. Adv. Artif. Intell, IBERAMIA 2002 Seville, Spain, Nov
-
V. Cutello and G. Nicosia, "An immunological approach to combinatorial optimization problems," in Proc. Adv. Artif. Intell., IBERAMIA 2002 Seville, Spain, Nov. 2002, vol. 2527, Lecture Notes in Artificial Intelligence, pp. 361-370.
-
(2002)
Lecture Notes in Artificial Intelligence
, vol.2527
, pp. 361-370
-
-
Cutello, V.1
Nicosia, G.2
-
12
-
-
0031355901
-
Immunity-based systems: A survey
-
Orlando, FL, Oct. 12-15
-
D. Dasgupta and N. Attoh-Okine, "Immunity-based systems: A survey," in Proc. IEEE Int. Conf. Syst., Man, Cybern., Orlando, FL, Oct. 12-15, 1997, pp. 369-374.
-
(1997)
Proc. IEEE Int. Conf. Syst., Man, Cybern
, pp. 369-374
-
-
Dasgupta, D.1
Attoh-Okine, N.2
-
13
-
-
26944481744
-
Negative selection algorithm for aircraft fault detection
-
G. Nicosia, V. Cutello, P. Bentley, and J. Timmis, Eds, Sep
-
D. Dasgupta, K. KrishnaKumar, D. Wong, and M. Berry, "Negative selection algorithm for aircraft fault detection," in Proc. 3rd Int. Conf. Artif. Immune Syst., ICARIS 2004, G. Nicosia, V. Cutello, P. Bentley, and J. Timmis, Eds., Sep. 2004, pp. 13-16.
-
(2004)
Proc. 3rd Int. Conf. Artif. Immune Syst., ICARIS 2004
, pp. 13-16
-
-
Dasgupta, D.1
KrishnaKumar, K.2
Wong, D.3
Berry, M.4
-
15
-
-
0036613006
-
Learning and optimization using the clonal selection principle
-
Jun
-
L. Nunes de Castro and F. J. Von Zuben, "Learning and optimization using the clonal selection principle," IEEE Trans. Evol. Comput., vol. 6, no. 3, pp. 239-251, Jun. 2002.
-
(2002)
IEEE Trans. Evol. Comput
, vol.6
, Issue.3
, pp. 239-251
-
-
Nunes de Castro, L.1
Von Zuben, F.J.2
-
16
-
-
0002893043
-
Immunology as information processing
-
L. A. Segel and I. Cohen, Eds. Oxford, U.K, Oxford Univ. Press
-
S. Forrest and S. A. Hofmeyr, "Immunology as information processing," in Design Principles for the Immune System and Other Distributed Autonomous Systems, Santa Fe Institute Studies in the Sciences of Complexity, L. A. Segel and I. Cohen, Eds. Oxford, U.K.: Oxford Univ. Press, 2000, pp. 361-387.
-
(2000)
Design Principles for the Immune System and Other Distributed Autonomous Systems, Santa Fe Institute Studies in the Sciences of Complexity
, pp. 361-387
-
-
Forrest, S.1
Hofmeyr, S.A.2
-
17
-
-
0029716418
-
A sense of self for unix processes
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff, "A sense of self for unix processes," in Proc. IEEE Symp. Comput. Security Privacy, 1996, pp. 120-128.
-
(1996)
Proc. IEEE Symp. Comput. Security Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
18
-
-
0000664170
-
The design of natural and artificial adaptive systems
-
R. Michael and L. George, Eds. New York: Academic Press, ch. 12, pp
-
S. A. Frank, "The design of natural and artificial adaptive systems," in Adaptation, R. Michael and L. George, Eds. New York: Academic Press, 1996, ch. 12, pp. 451-505.
-
(1996)
Adaptation
, pp. 451-505
-
-
Frank, S.A.1
-
19
-
-
3543106606
-
Anomaly detection using real-valued negative selection
-
Dec
-
F. González and D. Dasgupta, "Anomaly detection using real-valued negative selection," Genetic Programming Evolv. Mach., vol. 4, no. 4, pp. 383-403, Dec. 2003.
-
(2003)
Genetic Programming Evolv. Mach
, vol.4
, Issue.4
, pp. 383-403
-
-
González, F.1
Dasgupta, D.2
-
20
-
-
0000490812
-
A survey of fast exponentiation methods
-
Apr
-
D. M. Gordon, "A survey of fast exponentiation methods," J. Algorithms, vol. 27, no. 1, pp. 129-146, Apr. 1998.
-
(1998)
J. Algorithms
, vol.27
, Issue.1
, pp. 129-146
-
-
Gordon, D.M.1
-
21
-
-
0003209523
-
Constrained genetic search via schema adaptation. An immune network solution
-
N. Olhoff and G. I. N. Rozvany, Eds, Goslar, Germany
-
P. Hajela and J. Lee, "Constrained genetic search via schema adaptation. An immune network solution," in Proc. 1st World Congr. Stuctural Multidisciplinary Opt., N. Olhoff and G. I. N. Rozvany, Eds., Goslar, Germany, 1995, pp. 915-920.
-
(1995)
Proc. 1st World Congr. Stuctural Multidisciplinary Opt
, pp. 915-920
-
-
Hajela, P.1
Lee, J.2
-
22
-
-
0036613003
-
An artificial immune system architecture for computer security applications
-
Jun
-
P. K. Harmer, P. D. Williams, G. H. Gunsch, and G. B. Lamont, "An artificial immune system architecture for computer security applications," IEEE Trans. Evol. Comput., vol. 6, no. 3, pp. 252-280, Jun. 2002.
-
(2002)
IEEE Trans. Evol. Comput
, vol.6
, Issue.3
, pp. 252-280
-
-
Harmer, P.K.1
Williams, P.D.2
Gunsch, G.H.3
Lamont, G.B.4
-
23
-
-
15744368384
-
The evolution and analysis of a potential antibody library for use in job-shop scheduling
-
D. C. Dorigo and F. Glover, Eds. New York: McGraw-Hill
-
E. Hart, "The evolution and analysis of a potential antibody library for use in job-shop scheduling," in New Ideas in Optimization, D. C. Dorigo and F. Glover, Eds. New York: McGraw-Hill, 1999, pp. 185-202.
-
(1999)
New Ideas in Optimization
, pp. 185-202
-
-
Hart, E.1
-
24
-
-
40249096573
-
-
Standard Specifications for Public-Key Cryptography, Nov. 2004. Online. Available
-
Standard Specifications for Public-Key Cryptography, Draft Version D18, IEEE P1363 (IEEE standards documents), Nov. 2004. Online. Available: http://grouper.ieee.org/groups/1363/
-
Draft Version D18, IEEE P1363 (IEEE standards documents)
-
-
-
25
-
-
0000827611
-
m) using normal basis
-
m) using normal basis," Inf. Comput., vol. 78, pp. 171-177, 1988.
-
(1988)
Inf. Comput
, vol.78
, pp. 171-177
-
-
Itoh, T.1
Tsujii, S.2
-
27
-
-
40249120276
-
High-speed RSA implementation RSA Laboratories, Redwood City, CA
-
Tech. Rep. TR 201, 71 pages
-
Ç. K. Koç, High-speed RSA implementation RSA Laboratories, Redwood City, CA, Tech. Rep. TR 201, 1994, 71 pages.
-
(1994)
-
-
Koç, C.K.1
-
28
-
-
0029406556
-
Analysis of sliding window techniques for exponentiation
-
Oct
-
Ç. K. Koç, "Analysis of sliding window techniques for exponentiation," Computer and Mathematics With Applications, vol. 30, no. 10, pp. 17-24, Oct. 1995.
-
(1995)
Computer and Mathematics With Applications
, vol.30
, Issue.10
, pp. 17-24
-
-
Koç, C.K.1
-
29
-
-
0031651428
-
Window and extended window methods for addition chain and addition-subtraction chain
-
Jan
-
N. Kunihiro and H. Yamamoto, "Window and extended window methods for addition chain and addition-subtraction chain," IEICE Trans. Fundamentals, vol. E81-A, no. 1, pp. 72-81, Jan. 1998.
-
(1998)
IEICE Trans. Fundamentals
, vol.E81-A
, Issue.1
, pp. 72-81
-
-
Kunihiro, N.1
Yamamoto, H.2
-
30
-
-
0033887804
-
New methods for generating short addition chains
-
Jan
-
N. Kunihiro and H. Yamamoto, "New methods for generating short addition chains," IEICE Trans. Fundamentals, vol. E83-A, no. 1, pp. 60-67, Jan. 2000.
-
(2000)
IEICE Trans. Fundamentals
, vol.E83-A
, Issue.1
, pp. 60-67
-
-
Kunihiro, N.1
Yamamoto, H.2
-
31
-
-
0009950263
-
A distributed architechture for a self-adaptive computer virus immune system
-
New York: McGraw-Hill
-
G. B. Lamont, R. E. Marmelstein, and D. A. Van Veldhuizen, "A distributed architechture for a self-adaptive computer virus immune system," in New Ideas in Optimization. New York: McGraw-Hill, 1999, pp. 167-183.
-
(1999)
New Ideas in Optimization
, pp. 167-183
-
-
Lamont, G.B.1
Marmelstein, R.E.2
Van Veldhuizen, D.A.3
-
33
-
-
3042645009
-
Efficient preprocessing for large window-based modular exponentiation using genetic algorithms, Developments in Applied Artificial Intelligence, vol. 2718
-
N. Nedjah and L. D. Mourelle, "Efficient preprocessing for large window-based modular exponentiation using genetic algorithms," Developments in Applied Artificial Intelligence, vol. 2718, Lecture Notes in Artificial Intelligence, pp. 625-635, 2003.
-
(2003)
Lecture Notes in Artificial Intelligence
, pp. 625-635
-
-
Nedjah, N.1
Mourelle, L.D.2
-
34
-
-
0039838052
-
On vectorial addition chains
-
J. Olivos, "On vectorial addition chains," J. Algorithms, vol. 2, no. 1, pp. 13-21, 1981.
-
(1981)
J. Algorithms
, vol.2
, Issue.1
, pp. 13-21
-
-
Olivos, J.1
-
35
-
-
35048812612
-
Towards a conceptual framework for artificial immune systems
-
Proc. 3rd Int. Conf. Artif. Immune Syst, ICARIS 2004, G. Nicosia, V. Cutello, P. Bentley, and J. Timmis, Eds, Sep
-
S. Stepney, R. E. Smith, J. Timmis, and A. M. Tyrrell, "Towards a conceptual framework for artificial immune systems," in Proc. 3rd Int. Conf. Artif. Immune Syst., ICARIS 2004, G. Nicosia, V. Cutello, P. Bentley, and J. Timmis, Eds., Sep. 2004, vol. 3239, Lecture Notes in Computer Science, pp. 53-64.
-
(2004)
Lecture Notes in Computer Science
, vol.3239
, pp. 53-64
-
-
Stepney, S.1
Smith, R.E.2
Timmis, J.3
Tyrrell, A.M.4
-
36
-
-
0035333542
-
m) using normal basis
-
May
-
m) using normal basis," IEEE Trans. Comput., vol. 50, no. 5, pp. 394-398, May 2001.
-
(2001)
IEEE Trans. Comput
, vol.50
, Issue.5
, pp. 394-398
-
-
Takagi, N.1
Yoshiki, J.2
Tagaki, K.3
-
37
-
-
40249096572
-
-
J. von zur Gathen and M. Nöcker, Computing special powers in finite fields: Extended abstract, in Proc. International Symp. Symbolic and Algebraic Comput., 1999, pp. 83-90.
-
J. von zur Gathen and M. Nöcker, "Computing special powers in finite fields: Extended abstract," in Proc. International Symp. Symbolic and Algebraic Comput., 1999, pp. 83-90.
-
-
-
-
38
-
-
40249115413
-
Expansion of sliding window method for finding shorter addition/subtraction-chains
-
Jan, Online, Available
-
Y. Lee, H. Kim, S. Hong, and H. Yoon, "Expansion of sliding window method for finding shorter addition/subtraction-chains," Int. J. Network Security vol. 2, no. 1, pp. 34-40, Jan. 2006. [Online]. Available: http://isrc.nchu.edu.tw/ijns/
-
(2006)
Int. J. Network Security
, vol.2
, Issue.1
, pp. 34-40
-
-
Lee, Y.1
Kim, H.2
Hong, S.3
Yoon, H.4
-
39
-
-
0035125792
-
qn) based on optimal addition sequences
-
Jan
-
qn) based on optimal addition sequences," IEICE Trans. Fundamentals, vol. E84-A, no. 1, pp. 114-119, Jan. 2001.
-
(2001)
IEICE Trans. Fundamentals
, vol.E84-A
, Issue.1
, pp. 114-119
-
-
Tsuruoka, Y.1
Koyama, K.2
-
40
-
-
85043760127
-
Exponentiating faster with addition chains
-
Proc. Adv. Cryptology, EUROCRYPT 90, I. B. Damgard, Ed
-
Y. Yacobi, "Exponentiating faster with addition chains," in Proc. Adv. Cryptology, EUROCRYPT 90, I. B. Damgard, Ed., 1990, vol. 473, Lecture Notes in Computer Science, pp. 222-229.
-
(1990)
Lecture Notes in Computer Science
, vol.473
, pp. 222-229
-
-
Yacobi, Y.1
-
41
-
-
0030783572
-
m)
-
Jan
-
m)," IEE Electronic Lett., vol. 33, no. 3, pp. 196-197, Jan. 1997.
-
(1997)
IEE Electronic Lett
, vol.33
, Issue.3
, pp. 196-197
-
-
Yen, S.M.1
|