Articles citing this article

The Citing articles tool gives a list of articles citing the current article.
The citing articles come from EDP Sciences database, as well as other publishers participating in CrossRef Cited-by Linking Program. You can set up your personal account to receive an email alert each time this article is cited by a new article (see the menu on the right-hand side of the abstract page).

Cited article:

Information Security and Privacy

Dong-Guk Han, Nam Su Chang, Seok Won Jung, et al.
Lecture Notes in Computer Science, Information Security and Privacy 2727 67 (2003)
https://doi.org/10.1007/3-540-45067-X_7

Topics in Cryptology — CT-RSA 2001

Michael Brown, Darrel Hankerson, Julio López and Alfred Menezes
Lecture Notes in Computer Science, Topics in Cryptology — CT-RSA 2001 2020 250 (2001)
https://doi.org/10.1007/3-540-45353-9_19

Information Security and Privacy

André Weimerskirch, Christof Paar and Sheueling Chang Shantz
Lecture Notes in Computer Science, Information Security and Privacy 2119 502 (2001)
https://doi.org/10.1007/3-540-47719-5_39

Selected Areas in Cryptography

Jean-Sébastien Coron, David M’Raïhi and Christophe Tymen
Lecture Notes in Computer Science, Selected Areas in Cryptography 2259 151 (2001)
https://doi.org/10.1007/3-540-45537-X_12

Cryptographic Hardware and Embedded Systems — CHES 2001

Elisabeth Oswald and Manfred Aigner
Lecture Notes in Computer Science, Cryptographic Hardware and Embedded Systems — CHES 2001 2162 39 (2001)
https://doi.org/10.1007/3-540-44709-1_5

Advances in Cryptology — CRYPTO 2001

Robert P. Gallant, Robert J. Lambert and Scott A. Vanstone
Lecture Notes in Computer Science, Advances in Cryptology — CRYPTO 2001 2139 190 (2001)
https://doi.org/10.1007/3-540-44647-8_11

Progress in Cryptology — INDOCRYPT 2001

Mathieu Ciet, Quisquater Jean-Jacques and Francesco Sica
Lecture Notes in Computer Science, Progress in Cryptology — INDOCRYPT 2001 2247 108 (2001)
https://doi.org/10.1007/3-540-45311-3_11

Cryptographic Hardware and Embedded Systems — CHES 2000

Darrel Hankerson, Julio López Hernandez and Alfred Menezes
Lecture Notes in Computer Science, Cryptographic Hardware and Embedded Systems — CHES 2000 1965 1 (2000)
https://doi.org/10.1007/3-540-44499-8_1

Complexity and fast algorithms for multiexponentiations

V.S. Dimitrov, G.A. Jullien and W.C. Miller
IEEE Transactions on Computers 49 (2) 141 (2000)
https://doi.org/10.1109/12.833110

Closed-form expression for the average weight of signed-digit representations

Huapeng Wu and M.A. Hasan
IEEE Transactions on Computers 48 (8) 848 (1999)
https://doi.org/10.1109/12.795126

Advances in Cryptology - ASIACRYPT’99

Yongfei Han, Peng-Chor Leong, Peng-Chong Tan and Jiang Zhang
Lecture Notes in Computer Science, Advances in Cryptology - ASIACRYPT’99 1716 75 (1999)
https://doi.org/10.1007/978-3-540-48000-6_8

Cryptographic Hardware and Embedded Systems

Jean-Sébastien Coron
Lecture Notes in Computer Science, Cryptographic Hardware and Embedded Systems 1717 292 (1999)
https://doi.org/10.1007/3-540-48059-5_25

Cryptographic Hardware and Embedded Systems

Lijun Gao, Sarvesh Shrivastava and Gerald E. Sobelman
Lecture Notes in Computer Science, Cryptographic Hardware and Embedded Systems 1717 257 (1999)
https://doi.org/10.1007/3-540-48059-5_22

Advances in Cryptology — ASIACRYPT’98

Henri Cohen, Atsuko Miyaji and Takatoshi Ono
Lecture Notes in Computer Science, Advances in Cryptology — ASIACRYPT’98 1514 51 (1998)
https://doi.org/10.1007/3-540-49649-1_6

Public Key Cryptography

Jung Hee Cheon, Sungmo Park, Sangwoo Park and Daeho Kim
Lecture Notes in Computer Science, Public Key Cryptography 1431 195 (1998)
https://doi.org/10.1007/BFb0054025

Algorithmic Number Theory

Erik De Win, Serge Mister, Bart Preneel and Michael Wiener
Lecture Notes in Computer Science, Algorithmic Number Theory 1423 252 (1998)
https://doi.org/10.1007/BFb0054867

Information and Communications Security

Atsuko Miyaji, Takatoshi Ono and Henri Cohen
Lecture Notes in Computer Science, Information and Communications Security 1334 282 (1997)
https://doi.org/10.1007/BFb0028484

Advances in Cryptology — CRYPTO '97

Jerome A. Solinas
Lecture Notes in Computer Science, Advances in Cryptology — CRYPTO '97 1294 357 (1997)
https://doi.org/10.1007/BFb0052248

On-line evaluation of powers using Euclid's algorithm

Srećko Brlek, Pierre Castéran, Laurent Habsieger and Richard Mallette
RAIRO - Theoretical Informatics and Applications 29 (5) 431 (1995)
https://doi.org/10.1051/ita/1995290504311

Advances in Cryptology — CRYPTO’ 92

Kenji Koyama and Yukio Tsuruoka
Lecture Notes in Computer Science, Advances in Cryptology — CRYPTO’ 92 740 345 (1993)
https://doi.org/10.1007/3-540-48071-4_25

Signed digit representations of minimal Hamming weight

S. Arno and F.S. Wheeler
IEEE Transactions on Computers 42 (8) 1007 (1993)
https://doi.org/10.1109/12.238495