Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
62
views
29
references
Top references
cited by
15
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,557
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Cryptographic Hardware and Embedded Systems – CHES 2011
High-Speed High-Security Signatures
other
Author(s):
Daniel J. Bernstein
,
Niels Duif
,
Tanja Lange
,
Peter Schwabe
,
Bo-Yin Yang
Publication date
(Print):
2011
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Procedural speed in criminal law
Most cited references
29
Record
: found
Abstract
: not found
Article
: not found
Security Arguments for Digital Signatures and Blind Signatures
David Pointcheval
,
Jacques Stern
(2000)
0
comments
Cited
211
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Curve25519: New Diffie-Hellman Speed Records
Daniel J. Bernstein
(2006)
0
comments
Cited
54
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Faster Addition and Doubling on Elliptic Curves
Daniel J. Bernstein
,
Tanja Lange
(2007)
0
comments
Cited
38
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2011
Pages
: 124-142
DOI:
10.1007/978-3-642-23951-9_9
SO-VID:
ba457fe3-67fb-4360-9cc7-63c9b0c33ff6
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 17
FPGA-Based True Random Number Generation Using Circuit Metastability with Adaptive Feedback Control
pp. 475
Small Public Keys and Fast Verification for $\mathcal{M}\(ultivariate \)\mathcal{Q}$ uadratic Public Key Systems
pp. 49
Improved Collision-Correlation Power Analysis on First Order Protected AES
pp. 63
Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols
pp. 79
Protecting AES with Shamir’s Secret Sharing Scheme
pp. 95
A Fast and Provably Secure Higher-Order Masking of AES S-Box
pp. 124
High-Speed High-Security Signatures
pp. 312
spongent: A Lightweight Hash Function
pp. 326
The LED Block Cipher
pp. 342
Piccolo: An Ultra-Lightweight Blockcipher
Similar content
3,557
Retinal pathological features and proteome signatures of Alzheimer’s disease
Authors:
Yosef Koronyo
,
Altan Rentsendorj
,
Nazanin Mirzaei
…
Construction of a cuproptosis‑related lncRNA signature to predict biochemical recurrence of prostate cancer
Authors:
Zhaojun Yu
,
Huanhuan Deng
,
Haichao Chao
…
Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings
Authors:
Jinhui Chao
,
Osamu Nakamura
,
Kohji Sobataka
…
See all similar
Cited by
15
The Simplest Protocol for Oblivious Transfer
Authors:
Tung Chou
,
Claudio Orlandi
Revisiting TESLA in the Quantum Random Oracle Model
Authors:
Erdem Alkim
,
Nina Bindel
,
Johannes Buchmann
…
NEON Crypto
Authors:
Daniel J. Bernstein
,
Peter Schwabe
See all cited by