Research Journal of Applied Sciences

Year: 2015
Volume: 10
Issue: 2
Page No. 66 - 69

Evaluation of Time Complexity in Investigation of Methods of Modular Exponentiation

Authors : Aigul K. Shaikhanova, Aleksandr D. Zolotov, Eldos M. Muhametov, Mikolaj P. Karpinski and Dinara O. Kozhahmetova

References

Bellezza, A., 2001. Countermeasures against side-channel attacks for elliptic curve cryptosystems. Cryptology ePrint Archive: Repoet 2001/103, USA., November 2001. https://eprint.iacr.org/2001/103.pdf.

Biham, E. and A. Shamir, 1997. Differential fault analysis of secret key cryptosystems. Proceedings of the17th Annual International Cryptology Conference on Advances in Cryptology, August 17-21, 1997, Santa Barbara, CA., pp: 513-525-.

Comer, D.E. and D.L. Stevens, 2000. Internetworking with TCP/IP, vol III: Client-Server Programming And Applications. Prentice Hall, Upper Saddle River, NJ., ISBN-13: 978-0130320711, Pages: 601.

Kshetri, N. and S. Murugesan, 2013. EU and US cybersecurity strategies and their impact on businesses and consumers. Computer, 46: 84-88.
CrossRef  |  Direct Link  |  

Kurose, J.F. and K.W. Ross, 2011. Computer Networking: A Top-Down Approach. 6th Edn., Addison-Wesley, Boston, MA.

Mangard, S. and E. Oswald and T. Popp, 2007. Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, Berlin, Germany.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved