Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering
Reference34 articles.
1. Bichsel, P., Camenisch, J., Gross, T., & Shoup, V. (2009). Anonymous credentials on a standard Java card. In Proceedings of the 16th ACM conference on computer and communications security, CCS’09. (pp. 600–610). New York: ACM.
2. Joseph, G., & Penzhorn, W. (2005). Design and implementation of fast multiplication algorithms in public key cryptosystems for smart cards. In The southern Africa telecommunication networks and applications conference.
3. Grochadl, J., Avanzi, R. M., Savas, E., & Tillich, S. (2005). Energy-efficient software implementation of long integer modular arithmetic. In Cryptographic hardware and embedded systems—CHES (pp. 75–90). Berlin: Springer.
4. Koc, K., & Acar, T. (1997). A methodology for high-speed software implementations of number-theoretic cryptosystems. Tech. rep, Oregon State University.
5. Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21, 120–126.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献