Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Zhou, Yuanyuan
van de Pol, Joop
Yu, Yu
and
Standaert, François-Xavier
2022.
Advances in Cryptology – ASIACRYPT 2022.
Vol. 13794,
Issue. ,
p.
508.
Didier, Laurent-Stéphane
Mrabet, Nadia
Glandus, Léa
and
Robert, Jean-Marc
2024.
Truncated multiplication and batch software SIMD AVX512 implementation for faster Montgomery multiplications and modular exponentiation.
IACR Communications in Cryptology,
De Smet, Ruben
Blancquaert, Robrecht
Godden, Tom
Steenhaut, Kris
and
Braeken, An
2024.
Armed with Faster Crypto: Optimizing Elliptic Curve Cryptography for ARM Processors.
Sensors,
Vol. 24,
Issue. 3,
p.
1030.
Jain, Ashish
Bansal, Sulabh
Das, Nripendra Narayan
and
Gupta, Shyam Sunder
2024.
Red deer algorithm to detect the secret key of the monoalphabetic cryptosystem.
Soft Computing,
Vol. 28,
Issue. 17-18,
p.
10569.
van Gent, Daniël
and
Pulles, Ludo
2025.
HAWK: Having Automorphisms Weakens Key.
IACR Communications in Cryptology,
Vol. 2,
Issue. 2,
Bernstein, Daniel J.
and
Lange, Tanja
2025.
Information Security in a Connected World.
Vol. 15600,
Issue. ,
p.
124.