# Exponentiation by squaring

## Papers overview

Semantic Scholar uses AI to extract papers important to this topic.

2011

2011

- International Journal of Geographical Information…
- 2011

Moving objects produce trajectories, which are stored in databases by means of finite samples of time-stamped locations. When… (More)

Is this relevant?

Highly Cited

2010

Highly Cited

2010

- IACR Cryptology ePrint Archive
- 2010

Power Analysis has been widely studied since Kocher et al. presented in 1998 the initial Simple and Differential Power Analysis… (More)

Is this relevant?

2010

2010

- IEEE Transactions on Computers
- 2010

This paper proposes new chosen-message power-analysis attacks for public-key cryptosystems based on modular exponentiation, where… (More)

Is this relevant?

Highly Cited

2002

Highly Cited

2002

- ICISC
- 2002

We present improvements to algorithms for efficient exponentiation. The fractional window technique is a generalization of the… (More)

Is this relevant?

Highly Cited

2001

Highly Cited

2001

- Selected Areas in Cryptography
- 2001

This paper compares different approaches for computing power products ∏ 1≤i≤k g ei i in commutative groups. We look at the… (More)

Is this relevant?

2000

2000

- 2000

Gauss periods yield (self-dual) normal bases in nite elds, and these normal bases can be used to implement arithmetic eeciently… (More)

Is this relevant?

1998

1998

- 1998

The well-known binary method computes C = M (mod N) using an average number of 1:5(n 1) multiplications, where n is the number of… (More)

Is this relevant?

1998

1998

- Journal of Systems and Software
- 1998

Exponentiation of large positive integer with a 512-bit exponent is the basis of several well-known cryptographic algorithms. In… (More)

Is this relevant?

Highly Cited

1992

Highly Cited

1992

- EUROCRYPT
- 1992

In several crypt,ographic systems, a fixed elcment g of a group (generally z/qz) is repeatedly raised to many different powers… (More)

Is this relevant?

Highly Cited

1990

Highly Cited

1990

- IBM Systems Journal
- 1990

Several cryptosystems based on exponentiation have been proposed in recent years. Some of these are of the public key variety and… (More)

Is this relevant?