The State of Elliptic Curve Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Cryptography in Quadratic Function Fields
Designs, Codes and Cryptography
Designs, Codes and Cryptography
First Implementation of Cryptographic Protocols Based on Algebraic Number Fields
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Isomorphism Classes of Hyperelliptic Curves of Genus 2 over Fq
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Analysis of the Weil Descent Attack of Gaudry, Hess and Smart
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
Characterization of Elliptic Curve Traces under FR-Reduction
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
The Generalized Weil Pairing and the Discrete Logarithm Problem on Elliptic Curves
LATIN '02 Proceedings of the 5th Latin American Symposium on Theoretical Informatics
Speeding up the Arithmetic on Koblitz Curves of Genus Two
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Computing Zeta Functions of Hyperelliptic Curves over Finite Fields of Characteristic 2
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Supersingular Abelian Varieties in Cryptology
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Finding Secure Curves with the Satoh-FGH Algorithm and an Early-Abort Strategy
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Extending the GHS Weil Descent Attack
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Speeding up the Scalar Multiplication in the Jacobians of Hyperelliptic Curves Using Frobenius Map
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Elliptic Curve Discrete Logarithms and the Index Calculus
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2n
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Efficient Elliptic Curve Exponentiation Using Mixed Coordinates
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Weil Descent of Elliptic Curves over Finite Fields of Characteristic Three
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Supersingular Curves in Cryptography
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Computation of Discrete Logarithms in F2607
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
An Extension of Kedlaya's Point-Counting Algorithm to Superelliptic Curves
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
ID-Based Blind Signature and Ring Signature from Pairings
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Two Topics in Hyperelliptic Cryptography
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Selection of secure hyperelliptic curves of g = 2 based on a subfield
Journal of Computer Science and Technology
Authenticating tripartite key agreement protocol with pairings
Journal of Computer Science and Technology
On the complexity of the discrete logarithm and Diffie-Hellman problems
Journal of Complexity - Special issue on coding and cryptography
The generalized Weil pairing and the discrete logarithm problem on elliptic curves
Theoretical Computer Science - Latin American theorotical informatics
Elliptic and hyperelliptic curves on embedded μP
ACM Transactions on Embedded Computing Systems (TECS)
Hardware and Software Normal Basis Arithmetic for Pairing-Based Cryptography in Characteristic Three
IEEE Transactions on Computers
IEEE Transactions on Computers
Aggregated path authentication for efficient BGP security
Proceedings of the 12th ACM conference on Computer and communications security
Refinements of Miller's algorithm for computing the Weil/Tate pairing
Journal of Algorithms
Implementation of cryptosystems based on Tate pairing
Journal of Computer Science and Technology
Provably secure non-interactive key distribution based on pairings
Discrete Applied Mathematics - Special issue: Coding and cryptography
Hardware acceleration of the Tate pairing on a genus 2 hyperelliptic curve
Journal of Systems Architecture: the EUROMICRO Journal
Efficient pairing computation on supersingular Abelian varieties
Designs, Codes and Cryptography
PGP in constrained wireless devices
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Elliptic curve DSA (ECSDA): an enhanced DSA
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Eta pairing computation on general divisors over hyperelliptic curves y2=xp-x+d
Journal of Symbolic Computation
A pairing-based authentication scheme for protecting multiple mobile agent hosts
AIC'06 Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications
An efficient session key generation for NTDR networks based on bilinear paring
Computer Communications
Ate Pairing on Hyperelliptic Curves
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
A Coprocessor for the Final Exponentiation of the ηTPairing in Characteristic Three
WAIFI '07 Proceedings of the 1st international workshop on Arithmetic of Finite Fields
Arithmetic Operators for Pairing-Based Cryptography
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Pairing Computation on Twisted Edwards Form Elliptic Curves
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Generators for the l-Torsion Subgroup of Jacobians of Genus Two Curves
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Pairings on Hyperelliptic Curves with a Real Model
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
FPGA implementations of elliptic curve cryptography and Tate pairing over a binary field
Journal of Systems Architecture: the EUROMICRO Journal
An identity-based key infrastructure suitable for messaging and its application to e-mail
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Bilinear-pairing-based remote user authentication schemes using smart cards
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Subset-Restricted Random Walks for Pollard rho Method on ${\mathbf{F}_{p^m}}$
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Generating Genus Two Hyperelliptic Curves over Large Characteristic Finite Fields
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
An escrow-less identity-based group-key agreement protocol for dynamic peer groups
International Journal of Security and Networks
Improved Implementations of Cryptosystems Based on Tate Pairing
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
Improved remote user authentication scheme using bilinear pairings
Proceedings of the 2009 International Conference on Hybrid Information Technology
Efficient and generalized pairing computation on Abelian varieties
IEEE Transactions on Information Theory
FPGA and ASIC implementations of the ηT pairing in characteristic three
Computers and Electrical Engineering
Provably secure non-interactive key distribution based on pairings
Discrete Applied Mathematics - Special issue: Coding and cryptography
Refinements of Miller's algorithm for computing the Weil/Tate pairing
Journal of Algorithms
Ramanujan's class invariants and their use in elliptic curve cryptography
Computers & Mathematics with Applications
On the performance of hyperelliptic cryptosystems
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Comparing the MOV and FR reductions in elliptic curve cryptography
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
An algorithm for solving the discrete log problem on hyperelliptic curves
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Pairing calculation on supersingular genus 2 curves
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Efficient ID-based blind signature and proxy signature from bilinear pairings
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Secure remote user authentication scheme using bilinear pairings
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Constructing elliptic curves with prescribed embedding degrees
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
Restricted queries over an encrypted index with applications to regulatory compliance
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Abelian varieties with prescribed embedding degree
ANTS-VIII'08 Proceedings of the 8th international conference on Algorithmic number theory
An analysis of the vector decomposition problem
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
A flexible processor for the characteristic 3 ηT pairing
International Journal of High Performance Systems Architecture
IEEE Transactions on Information Theory
Kleptography from standard assumptions and applications
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Compact hardware for computing the tate pairing over 128-bit-security supersingular curves
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Faster pairing computation on genus 2 hyperelliptic curves
Information Processing Letters
A new public key cryptography algorithm using chaotic systems and hyperelliptic curves
ICS'06 Proceedings of the 10th WSEAS international conference on Systems
Local duality and the discrete logarithm problem
IWCC'11 Proceedings of the Third international conference on Coding and cryptology
A generalization of Verheul's theorem for some ordinary curves
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Efficient pairing computation on Elliptic curves in Hessian form
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
FPGA implementation of pairings using residue number system and lazy reduction
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
APPA: aggregate privacy-preserving authentication in vehicular Ad Hoc networks
ISC'11 Proceedings of the 14th international conference on Information security
A round-optimal three-party ID-based authenticated key agreement protocol
Information Sciences: an International Journal
A new proxy signcryption scheme using warrants
International Journal of Intelligent Engineering Informatics
Efficient doubling on genus two curves over binary fields
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Efficient tate pairing computation for elliptic curves over binary fields
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Abelian varieties and cryptography
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Efficient identity-based signatures and blind signatures
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Hidden pairings and trapdoor DDH groups
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
Fast bilinear maps from the tate-lichtenbaum pairing on hyperelliptic curves
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
Signature calculus and discrete logarithm problems
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
Evolution of hyperelliptic curve cryptosystems
ICDCIT'10 Proceedings of the 6th international conference on Distributed Computing and Internet Technology
Efficient hardware for the tate pairing calculation in characteristic three
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
New ID-Based threshold signature scheme from bilinear pairings
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
A method for distinguishing the two candidate elliptic curves in CM method
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
New families of hyperelliptic curves with efficient gallant-lambert-vanstone method
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
A method for efficient parallel computation of Tate pairing
International Journal of Grid and Utility Computing
Refinement of miller's algorithm over edwards curves
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
Identity-Based key agreement protocols in a multiple PKG environment
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV
Pairing-Based cryptography at high security levels
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Pairings on elliptic curves over finite commutative rings
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Optimal eta pairing on supersingular genus-2 binary hyperelliptic curves
CT-RSA'12 Proceedings of the 12th conference on Topics in Cryptology
Ordinary abelian varieties having small embedding degree
Finite Fields and Their Applications
Counting points on Cab curves using Monsky--Washnitzer cohomology
Finite Fields and Their Applications
Isomorphism classes of elliptic and hyperelliptic curves over finite fields F(2g+1)n
Finite Fields and Their Applications
Finite Fields and Their Applications
Algebraic curves and cryptography
Finite Fields and Their Applications
Improved Pollard rho method for computing discrete logarithms over finite extension fields
Journal of Computational and Applied Mathematics
Generalised jacobians in cryptography and coding theory
WAIFI'12 Proceedings of the 4th international conference on Arithmetic of Finite Fields
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Zeta function and cryptographic exponent of supersingular curves of genus 2
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Remarks on Cheon's algorithms for pairing-related problems
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
The tate pairing via elliptic nets
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Eta pairing computation on general divisors over hyperelliptic curves y2 = x7 - x ± 1
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Additively homomorphic encryption with a double decryption mechanism, revisited
ISC'12 Proceedings of the 15th international conference on Information Security
The tate-lichtenbaum pairing on a hyperelliptic curve via hyperelliptic nets
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
Security weaknesses of a signature scheme and authenticated key agreement protocols
Information Processing Letters
Hi-index | 0.13 |