Format | |
---|---|
BibTeX | |
MARCXML | |
TextMARC | |
MARC | |
DublinCore | |
EndNote | |
NLM | |
RefWorks | |
RIS |
Linked e-resources
Details
Table of Contents
Chapter 1. Introduction
Chapter 2. Public-Key Cryptographic Algorithms and Techniques
Chapter 3. Modular Exponentiations and Modular Multiplication
Chapter 4. Improving the Performance of Public-Key Techniques
Chapter 5. Hardware Implementation of Bit Forwarding Techniques
Chapter 6. Improved Hardware Realization for Public-key Transformations
Chapter 7. Conclusion.
Chapter 2. Public-Key Cryptographic Algorithms and Techniques
Chapter 3. Modular Exponentiations and Modular Multiplication
Chapter 4. Improving the Performance of Public-Key Techniques
Chapter 5. Hardware Implementation of Bit Forwarding Techniques
Chapter 6. Improved Hardware Realization for Public-key Transformations
Chapter 7. Conclusion.