Author:
Wollinger Thomas,Kumar Sandeep
Reference53 articles.
1. C. Ajluni. Two New Imaging Techniques to Improve IC Defect Indentification. Electronic Design, 43(14):37–38, July 1995.
2. P. Barrett. Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor. In A. M. Odlyzko, editor, Advances in Cryptology — CRYPTO’ 86, LNCS 263, pages 311–323, Berlin, Germany, August 1986. Springer-Verlag.
3. E. Biham and A. Shamir. Differential Fault Analysis of Secret Key Cryptosystems. In Burt Kaliski, editor, Advances in Cryptology — Crypto’ 97, pages 513–525, Berlin, 1997. Springer-Verlag. LNCS 1294.
4. Mathematical Society Lecture Notes Series;I. Blake,1999
5. T. Blum and C. Paar. Montgomery modular multiplication on reconfigurable hardware. In Proceedings of the 14th IEEE Symposium on Computer Arithmetic (ARITH-14), pages 70–77, 1999.