Cryptographic techniques in redundant number systems | IEEE Conference Publication | IEEE Xplore