A versatile Montgomery multiplier architecture with characteristic three support (Englisch)
- Neue Suche nach: Öztürk, E.
- Neue Suche nach: Sunar, B.
- Neue Suche nach: Savaş, E.
- Neue Suche nach: Öztürk, E.
- Neue Suche nach: Sunar, B.
- Neue Suche nach: Savaş, E.
In:
Computers and Electrical Engineering
;
35
, 1
;
71-85
;
2008
-
ISSN:
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:A versatile Montgomery multiplier architecture with characteristic three support
-
Beteiligte:
-
Erschienen in:Computers and Electrical Engineering ; 35, 1 ; 71-85
-
Verlag:
- Neue Suche nach: Elsevier Ltd
-
Erscheinungsdatum:08.05.2008
-
Format / Umfang:15 pages
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis – Band 35, Ausgabe 1
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Further performance analysis of the generalized MC DS-CDMA system in Nakagami-m fading channelsSener, Seher / Develi, Ibrahim / Karaboga, Nurhan et al. | 2008
- 9
-
A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verificationKang, Baoyuan / Boyd, Colin / Dawson, Ed et al. | 2008
- 18
-
Performance of commercial multimedia workloads on the Intel Pentium 4: A case studyMartinez, Christopher / Pinnamaneni, Mythri / John, Eugene B. et al. | 2008
- 33
-
Two efficient two-factor authenticated key exchange protocols in public wireless LANsJuang, Wen-Shenq / Wu, Jing-Lin et al. | 2008
- 41
-
A self-verification authentication mechanism for mobile satellite communication systemsChen, Tzung-Her / Lee, Wei-Bin / Chen, Hsing-Bai et al. | 2008
- 49
-
Identity-based strong designated verifier signature schemes: Attacks and new constructionKang, Baoyuan / Boyd, Colin / Dawson, Ed et al. | 2008
- 54
-
An area/performance trade-off analysis of a GF(2m) multiplier architecture for elliptic curve cryptographyMorales-Sandoval, Miguel / Feregrino-Uribe, Claudia / Cumplido, René / Algredo-Badillo, Ignacio et al. | 2008
- 59
-
Dynamic queue level control of TCP/RED systems in AQM routersZhang, Wei / Tan, Liansheng / Peng, Gang et al. | 2008
- 71
-
A versatile Montgomery multiplier architecture with characteristic three supportÖztürk, E. / Sunar, B. / Savaş, E. et al. | 2008
- 86
-
A secure identity-based multi-proxy signature schemeCao, Feng / Cao, Zhenfu et al. | 2008
- 96
-
Multiple partner coded cooperation scheme for wireless communications and its performance analysis for two cooperative usersJamshidi, Azizollah / Karimi-Birgani, Bizhan et al. | 2008
- 107
-
Enhanced password-based simple three-party key exchange protocolKim, Hyun-Seok / Choi, Jin-Young et al. | 2008
- 115
-
Secure seamless peer-to-peer (P2P) UDP communication using IPv4 LSRR option and IPv4+4 addressesTopal, Cihan / Akinlar, Cuneyt et al. | 2008
- 126
-
An efficient cryptosystem Delta for stream cipher applicationsKanso, Ali A. et al. | 2008
- 141
-
Fast edge integration based active contours for color imagesZheng, Ying / Li, Guangyao / Sun, Xiehua / Zhou, Xinmin et al. | 2008
- 150
-
New left-to-right minimal weight signed-digit radix-r representationQin, Baodong / Li, Ming / Kong, Fanyu / Li, Daxing et al. | 2008
- 159
-
More efficient systolic arrays for multiplication in GF( Formula Not Shown ) using LSB first algorithm with irreducible polynomials and trinomialsKwon, S. / Kim, C. H. / Hong, C. P. et al. | 2009
- 159
-
More efficient systolic arrays for multiplication in GF() using LSB first algorithm with irreducible polynomials and trinomialsKwon, Soonhak / Kim, Chang Hoon / Hong, Chun Pyo et al. | 2008
- 159
-
More efficient systolic arrays for multiplication in GF() using LSB first algorithm with irreducible polynomials and trinomialsKwon, Soonhak et al. | 2009
- 168
-
Adjusted probabilistic route discovery in mobile ad hoc networksAbdulai, Jamal-Deen / Ould-Khaoua, Mohamed / Mackenzie, Lewis M. et al. | 2008
- 183
-
Robust watermarking based on DWT and nonnegative matrix factorizationLu, Wei / Sun, Wei / Lu, Hongtao et al. | 2008
- 189
-
Dynamic and efficient joint encryption scheme in the plain public key modelShao, Zuhua et al. | 2008
- 197
-
Enhanced AODV routing protocol for Bluetooth scatternetAl-Jarrah, Omar / Megdadi, Omar et al. | 2008
- 209
-
Undecimated double density wavelet transform based speckle reduction in SAR imagesGnanadurai, D. / Sadasivam, V. / Paul Tiburtius Nishandh, J. / Muthukumaran, L. / Annamalai, C. et al. | 2008
- 218
-
Multichannel direct sequence spectrum signaling using code phase shift keyingSahu, P.P. / Singh, Mahipal et al. | 2008
- 227
-
2008 List of Referees| 2008
- IFC
-
Editorial Board| 2008