[1]
|
Some Properties of the Computation of the Modular Inverse with Applications in Cryptography
Computation,
2023
DOI:10.3390/computation11040070
|
|
|
[2]
|
Design and Implementation of an Ed25519 coprocessor
2022 3rd International Conference on Electronics, Communications and Information Technology (CECIT),
2022
DOI:10.1109/CECIT58139.2022.00074
|
|
|
[3]
|
Design and Implementation of an Ed25519 coprocessor
2022 3rd International Conference on Electronics, Communications and Information Technology (CECIT),
2022
DOI:10.1109/CECIT58139.2022.00074
|
|
|
[4]
|
A Note on the Computation of the Modular Inverse for Cryptography
Axioms,
2021
DOI:10.3390/axioms10020116
|
|
|
[5]
|
A Note on the Computation of the Modular Inverse for Cryptography
Axioms,
2021
DOI:10.3390/axioms10020116
|
|
|
[6]
|
A novice cryptosystem based on nth root of Gaussian integers
2017 International Conference on Computer, Communications and Electronics (Comptelix),
2017
DOI:10.1109/COMPTELIX.2017.8003977
|
|
|
[7]
|
On the decomposition of modular multiplicative inverse operators via a new functional algorithm approach to Bachet’s-Bezout’s Lemma
Journal of Physics: Conference Series,
2017
DOI:10.1088/1742-6596/936/1/012095
|
|
|
[8]
|
Information Protection Based on Extraction of Square Roots of Gaussian Integers
International Journal of Communications, Network and System Sciences,
2011
DOI:10.4236/ijcns.2011.43016
|
|
|
[9]
|
Scheme for Secure Communication via Information Hiding Based on Key Exchange and Decomposition Protocols
International Journal of Communications, Network and System Sciences,
2011
DOI:10.4236/ijcns.2011.42009
|
|
|
[10]
|
Space Complexity of Algorithm for Modular Multiplicative Inverse
International Journal of Communications, Network and System Sciences,
2011
DOI:10.4236/ijcns.2011.46041
|
|
|