News
Abstract: Many cryptographic systems use multiplication in the finite field GF(2/sup n/) for their underlying computations. In the recent past, a number of look-up table-based algorithms have been ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results