Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computational Mathematics,Computer Networks and Communications,Software
Reference11 articles.
1. P. Barrett,Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor. In Lecture Notes in Computer Science 263, Conf. Proceedings, Crypto 86. Springer, 1987.
2. G. R. Blakeley,A computer algorithm for calculating the product AB modulo M. IEEE Trans. on Computers, Vol. C 32, no. 5, pp. 497–500, May 1983.
3. E. F. Brickell,A fast modular multiplication algorithm with applications to two key cryptography. In Advances in Cryptology, Conf. Proceedings, Crypto 82. Plenum Press, 1982.
4. F. E. Fich and M. Tompa,The parallel complexity of exponentiating polynomials over finite fields. 17th ACM Symp. on the Theory of Computing, 1985.
5. Harn, Hwang, Lee, and Lu,A programmable VLSI architecture for computing multiplication and polynomial evaluation modulo a positive integer. IEEE J. of Solid-state Circuits, Vol. 23, No. 1, pp. 204–207, Feb. 1988.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献