Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Randomized Exponentiation Algorithms.. Cryptographic Engineering, Springer, (2009)The Montgomery and Joye Powering Ladders are Dual.. IACR Cryptology ePrint Archive, (2017)Montgomery's Multiplication Technique: How to Make It Smaller and Faster.. CHES, volume 1717 of Lecture Notes in Computer Science, page 80-93. Springer, (1999)Modular Arithmetic., , and . Encyclopedia of Cryptography and Security, Springer, (2005)Optimal parameters for on-line arithmetic.. Int. J. Comput. Math., 56 (1-2): 11-18 (1995)Fast Fourier Transforms Using the Complex Logarithmic Number System., , , and . VLSI Signal Processing, 33 (3): 325-335 (2003)Systolic Modular Multiplication.. IEEE Trans. Computers, 42 (3): 376-378 (1993)Space/Time Trade-Offs for Higher Radix Modular Multiplication Using Repeated Addition.. IEEE Trans. Computers, 46 (2): 139-141 (1997)Exponentiation Using Division Chains.. IEEE Trans. Computers, 47 (7): 757-765 (1998)Faster Modular Multiplication by Operand Scaling.. CRYPTO, volume 576 of Lecture Notes in Computer Science, page 313-323. Springer, (1991)