Login / Signup
Fast Truncated Multiplication for Cryptographic Applications.
Laszlo Hars
Published in:
CHES (2005)
Keyphrases
</>
smart card
floating point
secure communication
modular exponentiation
key management
real time
encryption scheme
hash functions
encryption key
cryptographic protocols
peer to peer
multiscale
security protocols
website
security properties
arithmetic operations
artificial intelligence
machine learning
neural network