Font Size: a A A
Keyword [Cryptosystems]
Result: 141 - 160 | Page: 8 of 9
141. Key randomization countermeasures to power analysis attacks on elliptic curve cryptosystems
142. Accelerating the scalar multiplication on elliptic curve cryptosystems over prime fields
143. On the implementation of pairing-based cryptosystems
144. The impact of the implementation style on power consumption and DPA attacks for embedded cryptosystems
145. A survey of attacks on multivariate cryptosystems
146. Issues in implementation of public key cryptosystems
147. Hardware architectures of elliptic curve based cryptosytems over binary fields
148. An investigation of the theory and applications of homomorphic cryptography
149. High-speed VLSI architectures for error-correcting codes and cryptosystems
150. Identity-based cryptographic schemes for large user communities
151. Non-commutative cryptography: Diffie-Hellman and CCA secure cryptosystems using matrices over group rings and digital signatures
152. Algebraic aspects of multivariate cryptosystems based on tame transformations
153. Hyperelliptic curves and their applications to cryptography
154. High-speed cellular-automata based block cipher and fault tolerant public-key cryptosystems
155. A unified PCA and DSP based POD module for hybrid cryptosystems
156. Public key cryptosystems: History and development
157. Elliptic curve cryptosystems: A survey
158. Linear threshold schemes, visual cryptography, and parasite-host cryptosystems
159. High-speed algorithms and architectures for number-theoretic cryptosystems
160. Elliptic curve cryptosystems
  <<First  <Prev  Next>  Last>>  Jump to