Search Constraints
Search Results
Select an image to start the slideshow
Transformations involving composite fields
1 of 16
The security features of SNMP version 3
2 of 16
Smart card based implementation of an electronic wallet system
3 of 16
Random bit generator test suite
4 of 16
Elliptic curve generation by CM in Java
5 of 16
Cryptographic coprocessor with algorithm agility
6 of 16
An Optical interface for high speed network encryption
7 of 16
AES algorithm library
8 of 16
Efficient Elliptic Curve Processor Architectures for Field Programmable Logic
9 of 16
Efficient Algorithms for Elliptic Curve Cryptosystems on Embedded Systems
10 of 16
Computer Architectures for Cryptosystems Based on Hyperelliptic Curves
11 of 16
The Application of the Mordell-Weil Group to Cryptographic Systems
12 of 16
Computation in Optimal Extension Fields
13 of 16
Efficient Algorithms for Elliptic Curve Cryptosystems
14 of 16
Modular Exponentiation on Reconfigurable Hardware
15 of 16
Elliptic Curve Cryptosystems on Reconfigurable Hardware
16 of 16