Vollala, Satyanarayana; Begum, B. Shameedha; Joshi, Amit D. - In: International Journal of Information Security and … 11 (2017) 2, pp. 11-24
security services. In majority of the cryptosystems the crucial arithmetic operation is modular exponentiation. It is composed … modular exponentiation. The modular multiplication involved in BFW3 is evaluated with the help of Montgomery method. These …