Author:
Cruz-Cortés Nareli,Rodríguez-Henríquez Francisco,Juárez-Morales Raúl,Coello Coello Carlos A.
Publisher
Springer Berlin Heidelberg
Reference7 articles.
1. Knuth, D.: The Art of Computer Programming, 3rd edn. Addison-Wesley, Reading (1997)
2. Menezes, A.J., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
3. Gordon, D.M.: A Survey of Fast Exponentiation Methods. Journal of Algorithms 27(1), 129–146 (1998)
4. Lecture Notes in Artificial Intelligence;N. Cruz-Cortés,2004
5. Lecture Notes in Computer Science;J. Bos,1990
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Evolutionary computation and machine learning in security;Proceedings of the Genetic and Evolutionary Computation Conference Companion;2022-07-09
2. Evolutionary computation and machine learning in cryptology;Proceedings of the Genetic and Evolutionary Computation Conference Companion;2021-07-07
3. Evolutionary computation and machine learning in cryptology;Proceedings of the 2020 Genetic and Evolutionary Computation Conference Companion;2020-07-08
4. Performance Comparison of Some Addition Chain Methods Based on Integer Family;Information Science and Applications 2018;2018-07-24
5. Evolutionary computation and cryptology;Proceedings of the Genetic and Evolutionary Computation Conference Companion;2017-07-15