Login / Signup
Look-Up Table-Based Large Finite Field Multiplication in Memory Constrained Cryptosystems.
M. Anwarul Hasan
Published in:
IEEE Trans. Computers (2000)
Keyphrases
</>
memory requirements
image processing
artificial intelligence
computing power
public key cryptosystems
database
neural network
search engine
computational complexity
low cost
finite number
random access