Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,149,024 papers from all fields of science
Search
Sign In
Create Free Account
Multiplication algorithm
Known as:
Multiplication algorithms
, FFT multiplication
, Shift and add algorithm
Expand
A multiplication algorithm is an algorithm (or method) to multiply two numbers. Depending on the size of the numbers, different algorithms are in use…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
46 relations
ACC0
ARM Cortex-M
Algorithm
Analog computer
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Faster Software for Fast Endomorphisms
B. Brumley
International Workshop on Constructive Side…
2015
Corpus ID: 9472834
GLV curves Gallant et al. have performance advantages over standard elliptic curves, using half the number of point doublings for…
Expand
Highly Cited
2009
Highly Cited
2009
Arithmetic Circuits of Redundant SUT-RNS
S. Timarchi
,
K. Navi
IEEE Transactions on Instrumentation and…
2009
Corpus ID: 12426063
The residue number system (RNS) is suitable for implementing high-speed digital processing devices because it supports parallel…
Expand
2007
2007
LFSR multipliers over GF(2m) defined by all-one polynomial
Hyun-Sung Kim
,
Sung-Woon Lee
Integr.
2007
Corpus ID: 44020793
2005
2005
Impulse response analysis for several digital tomosynthesis mammography reconstruction algorithms
Ying Chen
,
J. Lo
,
J. Dobbins
SPIE Medical Imaging
2005
Corpus ID: 2103511
Digital tomosynthesis mammography algorithms allow reconstructions of arbitrary planes in the breast from limited-angle series of…
Expand
2004
2004
Exploring the design-space for FPGA-based implementation of RSA
A. Cilardo
,
A. Mazzeo
,
L. Romano
,
G. P. Saggese
Microprocessors and microsystems
2004
Corpus ID: 1905044
2004
2004
Defeating Countermeasures Based on Randomized BSD Representations
Pierre-Alain Fouque
,
Frédéric Muller
,
Guillaume Poupard
,
F. Valette
Workshop on Cryptographic Hardware and Embedded…
2004
Corpus ID: 11852835
The recent development of side channel attacks has lead implementers to use increasingly sophisticated countermeasures in…
Expand
Highly Cited
2002
Highly Cited
2002
Parallel scalar multiplication on general elliptic curves over Fp hedged against Non-Differential Side-Channel Attacks
Wieland Fischer
,
Christophe Giraud
,
E. Knudsen
,
Jean-Pierre Seifert
IACR Cryptology ePrint Archive
2002
Corpus ID: 16995694
. Abstract. For speeding up elliptic curve scalar multiplication and making it secure against side-channel attacks such as timing…
Expand
1999
1999
Computing Composed Products of Polynomials
J. Brawley
,
Shuhong Gao
,
Donald Mills
1999
Corpus ID: 14724691
If f(x) and g(x) are polynomials in Fqx] of degrees m and n respectively, then the composed sum of f and g, denoted f g, is the…
Expand
1981
1981
First General-Purpose Electronic Computer
A. Burks
,
A. Burks
Annals of the History of Computing
1981
Corpus ID: 14205498
The conception, development, and design of the ENIAC are presented in the context of a causal history. Early influences…
Expand
1972
1972
Computation of Powers of Multivariate Polynomials over the Integers
L. E. Heindel
Journal of computer and system sciences (Print)
1972
Corpus ID: 29658954
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE