×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [compute y]
1 An Elliptic Curve Processor Suitable for RFID-Tags L. Batina 1, J. Guajardo 2, T. Kerins 2, N. Mentens 1, P. Tuyls 2 and I. Verbauwhede 1 Katholieke
214 views
6.805 lecture - Sept. 28, 1999 1 Confidentiality: Only authorized people - e.g., the sender and recipient of a message, and not any eavesdroppers - can
226 views
Randomized algorithm
78 views
< Prev