Redundant integer representations and fast exponentiation (English)
- New search for: Gollmann, Dieter
- New search for: Han, Yongfei
- New search for: Mitchell, Chris J.
- New search for: Gollmann, Dieter
- New search for: Han, Yongfei
- New search for: Mitchell, Chris J.
In:
Designs, Codes and Cryptography
;
7
, 1-2
; 135-151
;
1996
-
ISSN:
- Article (Journal) / Print
-
Title:Redundant integer representations and fast exponentiation
-
Contributors:
-
Published in:Designs, Codes and Cryptography ; 7, 1-2 ; 135-151
-
Publisher:
- New search for: Kluwer Academic Publishers
- New search for: Kluwer
-
Place of publication:Boston, Mass. [u.a.]
-
Publication date:1996
-
ISSN:
-
ZDBID:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 31.12 / 54.62 / 31.20
- Further information on Basic classification
- New search for: 770/3150
-
Keywords:
-
Classification:
-
Source:
Table of contents – Volume 7, Issue 1-2
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 7
-
Foreword to this issue| 1996
- 9
-
The National Security Establishment and the Development of Public-Key CryptographyDiffie, Whitfield et al. | 1996
- 13
-
“And now for something completely different” (the egyptologist and the cryptographer: A personal reminiscence)| 1996
- 17
-
Watching the bhang meter and flying through dirtBeth, Thomas et al. | 1996
- 17
-
Watching the Bhang Meter and Flying throughBeth, D. T. et al. | 1996
- 27
-
A formal language for cryptographic protocol requirementsSyverson, Paul / Meadows, Catherine et al. | 1996
- 61
-
Message recovery for signature schemes based on the discrete logarithm problemNyberg, Kaisa / Rueppel, Rainer A. et al. | 1996
- 83
-
Authentication Codes in Plaintext and Chosen-Content AttacksSafavi-Naini, R. / Tombak, L. et al. | 1996
- 101
-
Authentication schemes, perfect local randomizers, perfect secrecy and secret sharing schemesMitchell, C. J. / Piper, F. C. / Walker, M. / Wild, P. et al. | 1996
- 111
-
Characterizing the Structures of Cryptographic Functions Satisfying the Propagation Criterion for Almost All VectorsZhang, Xian-Mo / Zheng, Yuliang et al. | 1996
- 135
-
Redundant integer representations and fast exponentiationGollmann, Dieter / Han, Yongfei / Mitchell, Chris J. et al. | 1996
- 153
-
Key-Exchange in Real Quadratic Congruence Function FieldsScheidler, R. / Stein, A. / Williams, Hugh C. et al. | 1996
- I
-
Erratum| 1996