<--- Back to Details
First PageDocument Content
Algebra / Mathematics / Abstract algebra / Finite fields / Binary operations / Root-finding algorithms / Field theory / Square root / Exponentiation / XTR / Methods of computing square roots / Pi
Date: 2012-12-15 22:49:56
Algebra
Mathematics
Abstract algebra
Finite fields
Binary operations
Root-finding algorithms
Field theory
Square root
Exponentiation
XTR
Methods of computing square roots
Pi

Introduction A Linear Algebra Approach for Computing the Square Root Applications of Square Root in Cryptography Conclusion Low Complexity Bit-Parallel Square Root

Add to Reading List

Source URL: delta.cs.cinvestav.mx

Download Document from Source Website

File Size: 966,76 KB

Share Document on Facebook

Similar Documents

Stealing Keys from PCs by Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin  Lev Pachmanov

Stealing Keys from PCs by Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

DocID: 1xW2E - View Document

Appears in P. J. Lee, C. H. Lim (Eds.): Information Security and Cryptology – ICISC 2002, Springer-Verlag LNCS 2587, pp. 298–312, ISBN, 2003. Improved Techniques for Fast Exponentiation Bodo M¨oller Te

Appears in P. J. Lee, C. H. Lim (Eds.): Information Security and Cryptology – ICISC 2002, Springer-Verlag LNCS 2587, pp. 298–312, ISBN, 2003. Improved Techniques for Fast Exponentiation Bodo M¨oller Te

DocID: 1vkME - View Document

Cryptology ePrint Archive, Report, http://eprint.iacr.org/ Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification Bodo M¨oller and Andy Rupp

Cryptology ePrint Archive, Report, http://eprint.iacr.org/ Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification Bodo M¨oller and Andy Rupp

DocID: 1vkLm - View Document

Stealing Keys from PCs by Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin  Lev Pachmanov

Stealing Keys from PCs by Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

DocID: 1tEtV - View Document

EXPONENTIATION WITH ARBITRARY BASES, EXPONENTS MATH 152, SECTION 55 (VIPUL NAIK) Corresponding material in the book: Section 7.5. What students should definitely get: The definition of ab , where a > 0 and b is real. The

EXPONENTIATION WITH ARBITRARY BASES, EXPONENTS MATH 152, SECTION 55 (VIPUL NAIK) Corresponding material in the book: Section 7.5. What students should definitely get: The definition of ab , where a > 0 and b is real. The

DocID: 1sa3i - View Document