Author of the publication

New Modular Multiplication Algorithms for Fast Modular Exponentiation.

, , and . EUROCRYPT, volume 1070 of Lecture Notes in Computer Science, page 166-177. Springer, (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Modular Multiplication Algorithms for Fast Modular Exponentiation., , and . EUROCRYPT, volume 1070 of Lecture Notes in Computer Science, page 166-177. Springer, (1996)Three-dimensional velocity maximizing agile turn of air-to-air missile with collision triangle constraint., , , , , , and . MED, page 123-128. IEEE, (2017)Optimal Control of Roll-Pitch Seeker with Singularity Avoidance., , , , , and . MED, page 915-920. IEEE, (2018)Accelerating Key Establishment Protocols for Mobile Communication., , , and . ACISP, volume 1587 of Lecture Notes in Computer Science, page 51-63. Springer, (1999)Stage optimization of multi-stage anti-air missile using co-evolutionary augmented Lagrangian method., and . MED, page 1257-1262. IEEE, (2017)Improved batch exponentiation., , , , and . Inf. Process. Lett., 109 (15): 832-837 (2009)A new appraoch to server-aided secret computation., , , and . ICISC, page 33-45. Korea Institute of Information Security and Cryptology (KIISC), (1998)Secure Group Communication with Multiplicative One-way Functions., , , and . ITCC (1), page 685-690. IEEE Computer Society, (2005)Trust Management for Resilient Wireless Sensor Networks., , , and . ICISC, volume 3935 of Lecture Notes in Computer Science, page 56-68. Springer, (2005)Active Trial-and-error Attack on SASC Protocols., , , and . Int. J. Netw. Secur., 2 (2): 105-110 (2006)