Benjamin Arazi Communication-Computation Trade-off in Executing ECDSA in a Contactless Smartcard. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2006, v:38, n:3, pp:399-415 [Journal]
Benjamin Arazi The Optimal Burst-Error Correction Capability of the Codes Generated by f(X) = (X^p+1)(X^q+1)/(X+1) [Citation Graph (0, 0)][DBLP] Information and Control, 1978, v:39, n:3, pp:303-314 [Journal]
Benjamin Arazi An Approach for Generating Different Types of Gray Codes [Citation Graph (0, 0)][DBLP] Information and Control, 1984, v:63, n:1/2, pp:1-10 [Journal]
Benjamin Arazi Double-Precision Modular Multiplication Based on a Single-Precision Modular Multiplier and a Standard CPU. [Citation Graph (0, 0)][DBLP] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:761-769 [Journal]
Benjamin Arazi Architectures for Exponentiation Over GF(2^n) Adopted for Smartcard Application. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 1993, v:42, n:4, pp:494-497 [Journal]