Search results
International Journal of Circuit Theory and Applications > 50 > 4 > 1160 - 1173
IET Information Security > 2017 > 11 > 6 > 301 - 311
IEEE Transactions on Circuits and Systems I: Regular Papers > 2017 > 64 > 11 > 2894 - 2906
Security and Communication Networks > 9 > 18 > 4992 - 5002
IEEE Transactions on Circuits and Systems I: Regular Papers > 2017 > 64 > 2 > 399 - 408
IEEE Transactions on Very Large Scale Integration (VLSI) Systems > 2017 > 25 > 2 > 725 - 734
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2004 > Track on Computational Methods > 656-666
Lecture Notes in Computer Science > Computer and Information Sciences – ISCIS 2006 > Security and Cryptography > 991-1001
Lecture Notes in Computer Science > Information Security, Practice and Experience > Algorithms and Implementations (II) > 96-109
Lecture Notes in Computer Science > Selected Areas in Cryptography > Implementation of Public Key Cryptography > 364-375
Lecture Notes in Computer Science > Field Programmable Logic and Application > Arithmetic 1 > 670-680
Lecture Notes in Computer Science > Selected Areas in Cryptography > Elliptic Curves and Efficient Implementation II > 230-244
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2008 > Implementation > 406-414
Microprocessors and Microsystems > 2016 > 40 > C > 45-52
New Algorithms, Architectures and Applications for Reconfigurable Computing > Applications > 231-249
Journal of Signal Processing Systems > 2016 > 82 > 3 > 331-343
IEEE Transactions on Very Large Scale Integration (VLSI) Systems > 2015 > 23 > 10 > 2322 - 2326
IEEE Transactions on Very Large Scale Integration (VLSI) Systems > 2015 > 23 > 10 > 2090 - 2102
IEEE Transactions on Circuits and Systems II: Express Briefs > 2015 > 62 > 5 > 481 - 485