-
1
-
-
84937078021
-
Signed-digit number representations for fast parallel arithmetic
-
Sept
-
A. Avizienis, "Signed-digit number representations for fast parallel arithmetic," IRE Trans. Electron. Comput., vol. EC, no. 10, pp. 389-400, Sept. 1961.
-
(1961)
IRE Trans. Electron. Comput.
, vol.EC
, Issue.10
, pp. 389-400
-
-
Avizienis, A.1
-
2
-
-
3042641393
-
On the importance of eliminating errors in cryptographic computations
-
D. Boneh, R. A. Demillo, and R. J. Lipton, "On the importance of eliminating errors in cryptographic computations," J. Cryptology, vol. 14, pp. 101-119, 2001.
-
(2001)
J. Cryptology
, vol.14
, pp. 101-119
-
-
Boneh, D.1
Demillo, R.A.2
Lipton, R.J.3
-
3
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
LNCS, J. Kilian, Ed. New York: Springer-Verlag
-
D. Boneh and M. K. Franklin, "Identity-based encryption from the Weil pairing," in CRYPTO (LNCS, vol. 2139), J. Kilian, Ed. New York: Springer-Verlag, 2001, pp. 213-229.
-
(2001)
CRYPTO
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
4
-
-
35048887476
-
Short group signatures
-
LNCS, M. K. Franklin, Ed. New York: Springer-Ver-lag
-
D. Boneh, X. Boyen, and H. Shacham, "Short group signatures," in CRYPTO (LNCS, vol. 3152), M. K. Franklin, Ed. New York: Springer-Ver-lag, 2004, pp. 41-55.
-
(2004)
CRYPTO
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
5
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
M. K. Franklin, in, LNCS, J. Kilian, Ed. New York: Springer-Verlag
-
D. Boneh and M. K. Franklin, "Identity-based encryption from the Weil pairing," in CRYPTO (LNCS, vol. 2139), J. Kilian, Ed. New York: Springer-Verlag, 2001, pp. 213-229.
-
(2001)
CRYPTO
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
-
6
-
-
14844295011
-
Direct anonymous attestation
-
V. Atluri, B. Pfitzmann, and P. D. McDaniel, Eds. ACM
-
E. F. Brickell, J. Camenisch, and L. Chen, "Direct anonymous attestation," in Proc. ACM Conf. Computer and Communications Security, V. Atluri, B. Pfitzmann, and P. D. McDaniel, Eds. ACM, 2004, pp. 132-145.
-
(2004)
Proc. ACM Conf. Computer and Communications Security
, pp. 132-145
-
-
Brickell, E.F.1
Camenisch, J.2
Chen, L.3
-
7
-
-
52149103884
-
A new direct anonymous attestation scheme from bilinear maps
-
LNCS, P. Lipp, A.-R. Sa-deghi, and K.-M. Koch, Eds. New York: Springer-Verlag, 2008
-
E. Brickell, L. Chen, and J. Li, "A new direct anonymous attestation scheme from bilinear maps," in TRUST (LNCS, vol. 4968), P. Lipp, A.-R. Sa-deghi, and K.-M. Koch, Eds. New York: Springer-Verlag, 2008, pp. 166-178.
-
TRUST
, vol.4968
, pp. 166-178
-
-
Brickell, E.1
Chen, L.2
Li, J.3
-
9
-
-
52149086372
-
Pairings in trusted computing
-
LNCS, S. D. Galbraith and K. G. Paterson, Eds. New York: Springer-Verlag
-
L. Chen, P. Morrissey, and N. P. Smart, "Pairings in trusted computing," in Pairing (LNCS, vol. 5209), S. D. Galbraith and K. G. Paterson, Eds. New York: Springer-Verlag, 2008, pp. 1-17.
-
(2008)
Pairing
, vol.5209
, pp. 1-17
-
-
Chen, L.1
Morrissey, P.2
Smart, N.P.3
-
10
-
-
24944525692
-
Identity based threshold ring signature
-
LNCS, C. Park and S. Chee, Eds. New York: Springer-Verlag
-
S. S. M. Chow, L. C. K. Hui, and S.-M. Yiu, "Identity based threshold ring signature," in ICISC (LNCS, vol. 3506), C. Park and S. Chee, Eds. New York: Springer-Verlag, 2004, pp. 218-232.
-
(2004)
ICISC
, vol.3506
, pp. 218-232
-
-
Chow, S.S.M.1
Hui, L.C.K.2
Yiu, S.-M.3
-
11
-
-
84947743704
-
Efficient elliptic curve exponentiation using mixed coordinates
-
LNCS, K. Ohta and D. Pei, Eds. New York: Springer-Verlag
-
H. Cohen, A. Miyaji, and T. Ono, "Efficient elliptic curve exponentiation using mixed coordinates," in ASIACRYPT (LNCS, vol. 1514), K. Ohta and D. Pei, Eds. New York: Springer-Verlag, 1998, pp. 51-65.
-
(1998)
ASIACRYPT
, vol.1514
, pp. 51-65
-
-
Cohen, H.1
Miyaji, A.2
Ono, T.3
-
14
-
-
84954767265
-
An faster modular multiplication algorithm
-
S. E. Eldridge, "An faster modular multiplication algorithm," Int. J. Comput. Math., vol. 40, no. 1, pp. 63-68, 1991.
-
(1991)
Int. J. Comput. Math.
, vol.40
, Issue.1
, pp. 63-68
-
-
Eldridge, S.E.1
-
15
-
-
33747624721
-
An RSA implementation resistant to fault attacks and to simple power analysis
-
C. Giraud, "An RSA implementation resistant to fault attacks and to simple power analysis," IEEE Trans. Comput., vol. 55, no. 9, pp. 1116-1120, 2006.
-
(2006)
IEEE Trans. Comput.
, vol.55
, Issue.9
, pp. 1116-1120
-
-
Giraud, C.1
-
16
-
-
35248856053
-
k)
-
LNCS, B. S. Kaliski, Jr., Ç. K. Koç, and C. Paar, Eds. New York: Springer-Verlag
-
k)," in CHES (LNCS, vol. 2523), B. S. Kaliski, Jr., Ç. K. Koç, and C. Paar, Eds. New York: Springer-Verlag, 2002, pp. 484-499.
-
(2002)
CHES
, vol.2523
, pp. 484-499
-
-
Gutub, A.A.-A.1
Tenca, A.F.2
Savaş, E.3
Koç, Ç.K.4
-
17
-
-
68549090587
-
Montgomery exponentiation with no final subtractions: Improved results
-
LNCS, Ç. K. Koç and C. Paar, Eds. New York: Springer-Verlag
-
G. Hachez and J.-J. Quisquater, "Montgomery exponentiation with no final subtractions: Improved results," in CHES (LNCS, vol. 1965), Ç. K. Koç and C. Paar, Eds. New York: Springer-Verlag, 2000, pp. 293-301.
-
(2000)
CHES
, vol.1965
, pp. 293-301
-
-
Hachez, G.1
Quisquater, J.-J.2
-
19
-
-
84946844750
-
A one round protocol for tripartite Diffie-Hellman
-
LNCS, W. Bosma, Ed. New York: Springer-Verlag
-
A. Joux, "A one round protocol for tripartite Diffie-Hellman," in ANTS (LNCS, vol. 1838), W. Bosma, Ed. New York: Springer-Verlag, 2000, pp. 385-394.
-
(2000)
ANTS
, vol.1838
, pp. 385-394
-
-
Joux, A.1
-
20
-
-
38049090584
-
Highly regular right-to-left algorithms for scalar multiplication
-
LNCS, New York: Springer-Verlag
-
M. Joye, "Highly regular right-to-left algorithms for scalar multiplication," in CHES (LNCS, vol. 4727). New York: Springer-Verlag, 2007, pp. 135-147.
-
(2007)
CHES
, vol.4727
, pp. 135-147
-
-
Joye, M.1
-
21
-
-
70549091137
-
Highly regular m-ary powering ladders
-
LNCS, M. J. J. Jr., V. Rijmen, and R. Safavi-Naini, Eds. New York: Springer-Verlag
-
M. Joye, "Highly regular m-ary powering ladders," in Selected Areas in Cryptography (LNCS, vol. 5867), M. J. J. Jr., V. Rijmen, and R. Safavi-Naini, Eds. New York: Springer-Verlag, 2009, pp. 350-363.
-
(2009)
Selected Areas in Cryptography
, vol.5867
, pp. 350-363
-
-
Joye, M.1
-
22
-
-
35248874869
-
The Montgomery powering ladder
-
LNCS, B. S. Kaliski, Jr., Ç. K. Koç, and C. Paar, Eds. New York: Springer-Verlag
-
M. Joye and S.-M. Yen, "The Montgomery powering ladder," in CHES (LNCS, vol. 2523), B. S. Kaliski, Jr., Ç. K. Koç, and C. Paar, Eds. New York: Springer-Verlag, 2002, pp. 291-302.
-
(2002)
CHES
, vol.2523
, pp. 291-302
-
-
Joye, M.1
Yen, S.-M.2
-
23
-
-
0029358884
-
The Montgomery inverse and its applications
-
Aug
-
B. S. Kaliski, Jr., "The Montgomery inverse and its applications," IEEE Trans. Comput., vol. 44, no. 8, pp. 1064-1065, Aug. 1995.
-
(1995)
IEEE Trans. Comput.
, vol.44
, Issue.8
, pp. 1064-1065
-
-
Kaliski Jr., B.S.1
-
24
-
-
3042690263
-
Cryptographic hardware and embedded systems-CHES 2002
-
LNCS, Redwood Shores, CA, Aug. 13-15, New York: Springer-Verlag
-
B. S. Kaliski, Jr., Ç. K. Koç, and C. Paar, Eds., "Cryptographic hardware and embedded systems-CHES 2002," in Proc. 4th Int. Workshop (LNCS, vol. 2523), Redwood Shores, CA, Aug. 13-15, 2002. New York: Springer-Verlag, 2003.
-
(2002)
Proc. 4th Int. Workshop
, vol.2523
-
-
Kaliski Jr., B.S.1
Koç, Ç.K.2
Paar, C.E.3
-
25
-
-
75949120375
-
Efficient and side-channel-aware implementations of elliptic curve cryptosystems over prime fields
-
D. Karakoyunlu, F. K. Gurkaynak, B. Sunar, and Y. Leblebici, "Efficient and side-channel-aware implementations of elliptic curve cryptosystems over prime fields," IET Inform. Security, vol. 4, no. 1, pp. 30-43, 2010.
-
(2010)
IET Inform. Security
, vol.4
, Issue.1
, pp. 30-43
-
-
Karakoyunlu, D.1
Gurkaynak, F.K.2
Sunar, B.3
Leblebici, Y.4
-
26
-
-
0012970453
-
-
J. Kilian, Ed., LNCS, New York: Springer-Verlag
-
J. Kilian, Ed., Advances in Cryptology-CRYPTO 2001 (LNCS, vol. 2139). New York: Springer-Verlag, 2001.
-
(2001)
Advances in Cryptology-CRYPTO 2001
, vol.2139
-
-
-
27
-
-
84968503742
-
Elliptic curve cryptosystems
-
Jan
-
N. Koblitz, "Elliptic curve cryptosystems," Math. Comput., vol. 48, no. 177, pp. 203-209, Jan. 1987.
-
(1987)
Math. Comput.
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
28
-
-
0002842804
-
k2
-
Apr
-
k2," Des., Codes Cryptogr., vol. 14, no. 1, pp. 57-69, Apr. 1998.
-
(1998)
Des., Codes Cryptogr.
, vol.14
, Issue.1
, pp. 57-69
-
-
Koç, Ç.K.1
Acar, T.2
-
29
-
-
0030172012
-
Analyzing and comparing Montgomery multiplication algorithms
-
June
-
Ç. K. Koç, T. Acar, and B. S. Kaliski, Jr., "Analyzing and comparing Montgomery multiplication algorithms," IEEE Micro, vol. 16, no. 3, pp. 26-33, June 1996.
-
(1996)
IEEE Micro
, vol.16
, Issue.3
, pp. 26-33
-
-
Koç, Ç.K.1
Acar, T.2
Kaliski Jr., B.S.3
-
30
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
LNCS, N. Koblitz, Ed. New York: Springer-Verlag
-
P. C. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems," in CRYPTO (LNCS, vol. 1109), N. Koblitz, Ed. New York: Springer-Verlag, 1996, pp. 104-113.
-
(1996)
CRYPTO
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
31
-
-
84939573910
-
Differential power analysis
-
LNCS, M. J. Wiener, Ed. New York: Springer-Verlag
-
P. C. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," in CRYPTO (LNCS, vol. 1666), M. J. Wiener, Ed. New York: Springer-Verlag, 1999, pp. 388-397.
-
(1999)
CRYPTO
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
32
-
-
50649116562
-
An efficient hardware implementation of the Tate pairing in characteristic three
-
G. Kömürcü and E. Savaş, "An efficient hardware implementation of the Tate pairing in characteristic three," in ICONS. IEEE Computer Society, 2008, pp. 23-28.
-
(2008)
ICONS. IEEE Computer Society
, pp. 23-28
-
-
Kömürcü, G.1
Savaş, E.2
-
34
-
-
85015402934
-
Use of elliptic curves in cryptography
-
LNCS, H. C. Williams, Ed. New York: Springer-Verlag
-
V. S. Miller, "Use of elliptic curves in cryptography," in CRYPTO (LNCS, vol. 218), H. C. Williams, Ed. New York: Springer-Verlag, 1985, pp. 417-426.
-
(1985)
CRYPTO
, vol.218
, pp. 417-426
-
-
Miller, V.S.1
-
35
-
-
84966243285
-
Modular multiplication without trial division
-
Apr
-
P. L. Montgomery, "Modular multiplication without trial division," Math. Comput., vol. 44, no. 170, pp. 519-521, Apr. 1985.
-
(1985)
Math. Comput.
, vol.44
, Issue.170
, pp. 519-521
-
-
Montgomery, P.L.1
-
36
-
-
33645182417
-
Digital signature standard DSS
-
National Institute for Standards and Technology, Aug
-
National Institute for Standards and Technology, "Digital signature standard (DSS)," Fed. Reg., vol. 56, p. 169, Aug. 1991.
-
(1991)
Fed. Reg.
, vol.56
, pp. 169
-
-
-
37
-
-
0032118834
-
Modular multiplication method
-
July
-
J.-H. Oh and S.-J. Moon, "Modular multiplication method," IEE Proc. Comput. Digital Tech., vol. 145, no. 4, pp. 317-318, July 1998.
-
(1998)
IEE Proc. Comput. Digital Tech.
, vol.145
, Issue.4
, pp. 317-318
-
-
Oh, J.-H.1
Moon, S.-J.2
-
38
-
-
62349091388
-
Parametric, secure and compact implementation of RSA on FPGA
-
DC: IEEE Computer Society
-
E. Öksüzoglu and E. Savaş, "Parametric, secure and compact implementation of RSA on FPGA," in RECONFIG '08: Proc. 2008 Int. Conf. Reconfigurable Computing and FPGAs. Washington, DC: IEEE Computer Society, 2008, pp. 391-396.
-
(2008)
RECONFIG '08: Proc. 2008 Int. Conf. Reconfigurable Computing and FPGAs. Washington
, pp. 391-396
-
-
Öksüzoglu, E.1
Savaş, E.2
-
39
-
-
57849132156
-
A versatile Montgomery multiplier architecture with characteristic three support
-
E. Öztürk, B. Sunar, and E. Savaş, "A versatile Montgomery multiplier architecture with characteristic three support," Comput. Electr. Eng., vol. 35, no. 1, pp. 71-85, 2009.
-
(2009)
Comput. Electr. Eng.
, vol.35
, Issue.1
, pp. 71-85
-
-
Öztürk, E.1
Sunar, B.2
Savaş, E.3
-
40
-
-
33646775803
-
Low-power elliptic curve cryptography using scaled modular arithmetic
-
LNCS, M. Joye and J.-J. Quisquater, Eds. New York: Springer-Verlag
-
E. Öztürk, B. Sunar, and E. Savaş, "Low-power elliptic curve cryptography using scaled modular arithmetic," in CHES (LNCS, vol. 3156), M. Joye and J.-J. Quisquater, Eds. New York: Springer-Verlag, 2004, pp. 92-106.
-
(2004)
CHES
, vol.3156
, pp. 92-106
-
-
Öztürk, E.1
Sunar, B.2
Savaş, E.3
-
41
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
42
-
-
2642549675
-
Cryptosystems based on pairing
-
Okinawa, Japan, Jan
-
R. Sakai, K. Ohgishi, and M. Kasahara, "Cryptosystems based on pairing," in Proc. Symp. Cryptography and Information Security, Okinawa, Japan, Jan. 2000, pp. 26-28.
-
(2000)
Proc. Symp. Cryptography and Information Security
, pp. 26-28
-
-
Sakai, R.1
Ohgishi, K.2
Kasahara, M.3
-
43
-
-
70449505670
-
Architectures for unified field inversion with applications in proc
-
Sept
-
E. Savaş and Ç. K. Koç, "Architectures for unified field inversion with applications in proc. vol. 3," in Proc. 9th IEEE Int. Conf. Electronics, Circuits and Systems-ICECS 2002, Sept. 2002, pp. 1155-1158.
-
(2002)
Proc. 9th IEEE Int. Conf. Electronics, Circuits and Systems-ICECS 2002
, vol.3
, pp. 1155-1158
-
-
Savaş, E.1
Koç, Ç.K.2
-
44
-
-
0034215495
-
The Montgomery modular inverse-revisited
-
July
-
E. Savaş and Ç. K. Koç, "The Montgomery modular inverse-revisited," IEEE Trans. Comput., vol. 49, no. 7, pp. 763-766, July 2000.
-
(2000)
IEEE Trans. Comput.
, vol.49
, Issue.7
, pp. 763-766
-
-
Savaş, E.1
Koç, Ç.K.2
-
45
-
-
23644434097
-
Efficient unified Montgomery inversion with multibit shifting
-
July
-
E. Savaş, M. Naseer, A. A.-A. Gutub, and Ç. K. Koç, "Efficient unified Montgomery inversion with multibit shifting," IEE Proc. Comput. Digital Tech., vol. 152, no. 4, pp. 489-498, July 2005.
-
(2005)
IEE Proc. Comput. Digital Tech.
, vol.152
, Issue.4
, pp. 489-498
-
-
Savaş, E.1
Naseer, M.2
Gutub, A.A.-A.3
Koç, Ç.K.4
-
46
-
-
1642392425
-
k)
-
Mar
-
k)," IEE Proc. Comput. Digital Tech., vol. 151, no. 2, pp. 147-160, Mar. 2004.
-
(2004)
IEE Proc. Comput. Digital Tech.
, vol.151
, Issue.2
, pp. 147-160
-
-
Savaş, E.1
Tenca, A.F.2
Çiftçibasi, M.E.3
Koç, Ç.K.4
-
47
-
-
68549115194
-
m)
-
LNCS, Ç. K. Koç and C. Paar, Eds. New York: Springer-Verlag
-
m)," in Cryptographic Hardware and Embedded Systems-CHES 2000 (LNCS, vol. 1965), Ç. K. Koç and C. Paar, Eds. New York: Springer-Verlag, 2000, pp. 281-296.
-
(2000)
Cryptographic Hardware and Embedded Systems-CHES 2000
, vol.1965
, pp. 281-296
-
-
Savaş, E.1
Tenca, A.F.2
Koç, Ç.K.3
-
48
-
-
0001827537
-
Identity-based cryptosystems and signature schemes
-
A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc. CRYPTO, 1984, pp. 47-53.
-
(1984)
Proc. CRYPTO
, pp. 47-53
-
-
Shamir, A.1
-
49
-
-
38049086644
-
How to maximize the potential of FPGA resources for modular exponentiation
-
LNCS, New York: Spring-er-Verlag
-
D. Suzuki, "How to maximize the potential of FPGA resources for modular exponentiation," in CHES (LNCS, vol. 4727). New York: Spring-er-Verlag, 2007, pp. 272-288.
-
(2007)
CHES
, vol.4727
, pp. 272-288
-
-
Suzuki, D.1
-
50
-
-
34648844291
-
Modular exponentiation using parallel multipliers
-
S. H. Tang, K. S. Tsui, and P. H. W. Leong, "Modular exponentiation using parallel multipliers," in Proc. 2003 IEEE Int. Conf. Field Programmable Technology (FPT), 2003, pp. 52-59.
-
(2003)
Proc. 2003 IEEE Int. Conf. Field Programmable Technology (FPT)
, pp. 52-59
-
-
Tang, S.H.1
Tsui, K.S.2
Leong, P.H.W.3
-
51
-
-
77956052389
-
A scalable architecture for Montgomery multiplication
-
LNCS, Ç. K. Koç and C. Paar, Eds. New York: Springer-Verlag
-
A. F. Tenca and Ç. K. Koç, "A scalable architecture for Montgomery multiplication," in Cryptographic Hardware and Embedded Systems (LNCS, vol. 1717), Ç. K. Koç and C. Paar, Eds. New York: Springer-Verlag, 1999, pp. 94-108.
-
(1999)
Cryptographic Hardware and Embedded Systems
, vol.1717
, pp. 94-108
-
-
Tenca, A.F.1
Koç, Ç.K.2
-
52
-
-
4143116646
-
An efficient and scalable radix-4 modular multiplier design using recoding techniques
-
Pacific Grove, CA: IEEE Press, Nov. 9-12
-
A. F. Tenca and L. A. Tawalbeh, "An efficient and scalable radix-4 modular multiplier design using recoding techniques," in Proc. 37th Asilomar Conf. Signals, Systems, and Computers. Pacific Grove, CA: IEEE Press, Nov. 9-12, 2003, no. 2, pp. 1445-1450.
-
(2003)
Proc. 37th Asilomar Conf. Signals, Systems, and Computers
, Issue.2
, pp. 1445-1450
-
-
Tenca, A.F.1
Tawalbeh, L.A.2
-
53
-
-
84944901460
-
High-radix design of a scalable modular multiplier
-
LNCS, Ç. K. Koç, D. Naccache, and C. Paar, Eds. New York: Springer-Verlag
-
A. F. Tenca, G. Todorov, and Ç. K. Koç, "High-radix design of a scalable modular multiplier," in CHES, (LNCS, vol. 2162), Ç. K. Koç, D. Naccache, and C. Paar, Eds. New York: Springer-Verlag, 2001, pp. 185-201.
-
(2001)
CHES
, vol.2162
, pp. 185-201
-
-
Tenca, A.F.1
Todorov, G.2
Koç, Ç.K.3
-
54
-
-
0009458561
-
Faster modular multiplication by operand scaling
-
LNCS, J. Feigenbaum, Ed. New York: Springer-Verlag
-
C. D. Walter, "Faster modular multiplication by operand scaling," in Advances in Cryptology-CRYPTO'91 (LNCS, No. 576), J. Feigenbaum, Ed. New York: Springer-Verlag, 1992, pp. 313-323.
-
(1992)
Advances in Cryptology-CRYPTO'91
, Issue.576
, pp. 313-323
-
-
Walter, C.D.1
-
55
-
-
0033204468
-
Montgomery exponentiation needs no final subtractions
-
Oct
-
C. D. Walter, "Montgomery exponentiation needs no final subtractions," Electron. Lett., vol. 35, no. 21, pp. 1831-1832, Oct. 1999.
-
(1999)
Electron. Lett.
, vol.35
, Issue.21
, pp. 1831-1832
-
-
Walter, C.D.1
-
56
-
-
77952988324
-
-
Online. Available
-
X ilinx Inc. Trust Zone technology overview [Online]. Available: http://www.xilinx.com/support/documentation/data-sheets/ds312.pdf.
-
Trust Zone Technology Overview
-
-
Inc, X.1
-
57
-
-
0036505481
-
Incomplete reduction in modular arithmetic
-
Mar
-
T. Yanik, E. Savaş, and Ç. K. Koç, "Incomplete reduction in modular arithmetic," IEE Proc. Comput. Digital Tech., vol. 149, no. 2, pp. 46-52, Mar. 2002.
-
(2002)
IEE Proc. Comput. Digital Tech.
, vol.149
, Issue.2
, pp. 46-52
-
-
Yanik, T.1
Savaş, E.2
Koç, Ç.K.3
|