2015
DOI: 10.1109/tcad.2014.2387866
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Efficient Architectures for Single Exponentiations in Finite Fields Suitable for High-Performance Cryptographic Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 38 publications
0
1
0
Order By: Relevance
“…It is worth mentioning that the authors of this work have extensive background on fault detection and tolerance in many fields including cryptography [17][18][19][20][21][22][23][24][25][26][27][28][29][30][31][32][33][34] . Moreover, in the fields of computer arithmetic and cryptographic engineering, they have prior expertise [35][36][37][38][39][40][41][42][43][44][45] .…”
Section: Figure 3 Traditional Vs Iwmds Security (Comparison For Teamentioning
confidence: 99%
“…It is worth mentioning that the authors of this work have extensive background on fault detection and tolerance in many fields including cryptography [17][18][19][20][21][22][23][24][25][26][27][28][29][30][31][32][33][34] . Moreover, in the fields of computer arithmetic and cryptographic engineering, they have prior expertise [35][36][37][38][39][40][41][42][43][44][45] .…”
Section: Figure 3 Traditional Vs Iwmds Security (Comparison For Teamentioning
confidence: 99%