Publisher
Springer Berlin Heidelberg
Reference7 articles.
1. P. Montgomery, Modular Multiplication without Trial Division, Mathematics of Computation 44(170), pp 519–521, July 1997.
2. E. Brickell, A Survey of Hardware Implementations for RSA, Advances in Cryptology, Proceedings of Crypto’89, 1990.
3. C. Ding, D. Pei and A. Salomaa, Chinese Remainder Theorem-Applications in Computing, Coding, Cryptography, World Scientific Publishing, 1996.
4. J. C. Bajard, L. S. Didier and P. Kornerup, An RNS Montgomery Modular Multiplication Algorithm, Proceedings of ARITH13, IEEE Computer Society, pp 234–239, July 1997.
5. H. Handschuh and P. Paillier, CryptoBytes Vol. 4, Num. 1, Sum. 1998
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Tunable Encrypted Deduplication with Attack-resilient Key Management;ACM Transactions on Storage;2022-11-11
2. t-BMPNet: Trainable Bitwise Multilayer Perceptron Neural Network over Fully Homomorphic Encryption Scheme;Security and Communication Networks;2021-12-04
3. - Database Access;Enterprise Level Security;2016-04-27
4. References;Anonymous Communication Networks;2014-04-03
5. Alternative Methods for Data Access;Guide to the De-Identification of Personal Health Information;2013-04-23