Author of the publication

Improving Goldschmidt Division, Square Root, and Square Root Reciprocal.

, , , , and . IEEE Trans. Computers, 49 (7): 759-763 (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Vertical and horizontal correlation attacks on RNS-based exponentiations., , , and . J. Cryptographic Engineering, 5 (3): 171-185 (2015)Strictly chained (p,q)-ary partitions, and . CoRR, (2012)Breaking Randomized Mixed-Radix Scalar Multiplication Algorithms., and . LATINCRYPT, volume 11774 of Lecture Notes in Computer Science, page 24-39. Springer, (2019)Side-Channel Attacks on Blinded Scalar Multiplications Revisited., , and . CARDIS, volume 11833 of Lecture Notes in Computer Science, page 95-108. Springer, (2019)On the Maximal Weight of (P, Q)-ary Chain Partitions With Bounded Parts., , and . Integers, (2014)Faster Cofactorization with ECM Using Mixed Representations., and . Public Key Cryptography (2), volume 12111 of Lecture Notes in Computer Science, page 483-504. Springer, (2020)A Full RNS Implementation of RSA., and . IEEE Trans. Computers, 53 (6): 769-774 (2004)Arithmetic Operations in Finite Fields of Medium Prime Characteristic Using the Lagrange Representation., , and . IEEE Trans. Computers, 55 (9): 1167-1177 (2006)Randomizing Scalar Multiplication Using Exact Covering Systems of Congruences., , and . IACR Cryptology ePrint Archive, (2015)Hybrid Binary-Ternary Joint Sparse Form and its Application in Elliptic Curve Cryptography., , and . IACR Cryptology ePrint Archive, (2008)