Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Pal, Pinakpani"'
Autor:
Deora, Mayank, Pal, Pinakpani
Solving two variable linear diophantine equations has applications in many cryptographic protocols such as RSA and Elliptic curve cryptography. Extended euclid's algorithm is the most widely used algorithm to solve these equations. We revisit two alg
Externí odkaz:
http://arxiv.org/abs/2409.14052
Publikováno v:
In Signal Processing 2002 82(11):1763-1771
Autor:
Mukherjee, Abhik1, Pal, Pinakpani2
Publikováno v:
Fluctuation & Noise Letters. Mar2006, Vol. 6 Issue 1, pL103-L115. 13p. 5 Graphs.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Biswas, Atanu1 (AUTHOR) atanu@isical.ac.in, Pal, Pinakpani2 (AUTHOR)
Publikováno v:
Communications in Statistics: Simulation & Computation. Jul2009, Vol. 38 Issue 6, p1308-1320. 13p. 2 Graphs.
Autor:
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Dawson, Ed, Wong, Duncan S., Mishra, Pradeep Kumar, Pal, Pinakpani, Sarkar, Palash
Publikováno v:
Information Security Practice & Experience (9783540721598); 2007, p269-283, 15p
A General Methodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography.
Autor:
Jianying Zhou, Yung, Moti, Feng Bao, Gupta, Kishan Chand, Mishra, Pradeep Kumar, Pal, Pinakpani
Publikováno v:
Applied Cryptography & Network Security (9783540347033); 2006, p405-420, 16p
Publikováno v:
Information Systems Security (9783540307068); 2005, p322-327, 6p
Autor:
Pal, Pinakpani
Publikováno v:
Advances in Pattern Recognition - Proceedings of the 6th International Conference; 2006, pv-v, 1p