Author of the publication

Storage-Efficient Finite Field Basis Conversion.

, and . Selected Areas in Cryptography, volume 1556 of Lecture Notes in Computer Science, page 81-93. Springer, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proofs for Two-Server Password Authentication., and . CT-RSA, volume 3376 of Lecture Notes in Computer Science, page 227-244. Springer, (2005)On Hash Function Firewalls in Signature Schemes.. CT-RSA, volume 2271 of Lecture Notes in Computer Science, page 1-16. Springer, (2002)Hard-Core Bit.. Encyclopedia of Cryptography and Security, Springer, (2005)Irreducible Polynomial.. Encyclopedia of Cryptography and Security, Springer, (2005)Asymmetric Cryptosystem.. Encyclopedia of Cryptography and Security, Springer, (2005)Ring.. Encyclopedia of Cryptography and Security, Springer, (2005)Symmetric Cryptosystem.. Encyclopedia of Cryptography and Security, Springer, (2005)Pseudorandom Function.. Encyclopedia of Cryptography and Security, Springer, (2005)Quadratic Residue.. Encyclopedia of Cryptography and Security, Springer, (2005)A new level of signal processing software: Automatic buffer address generation., , and . ICASSP, page 1180-1183. IEEE, (1983)