A pseudo-random bit generator based on elliptic logarithms
Proceedings on Advances in cryptology---CRYPTO '86
Intractable problems in number theory (invited talk)
CRYPTO '88 Proceedings on Advances in cryptology
A family of Jacobians suitable for discrete log cryptosystems
CRYPTO '88 Proceedings on Advances in cryptology
Reducing elliptic curve logarithms to logarithms in a finite field
STOC '91 Proceedings of the twenty-third annual ACM symposium on Theory of computing
Computing the number of points of elliptic curves over finite fields
ISSAC '91 Proceedings of the 1991 international symposium on Symbolic and algebraic computation
A new elliptic curve based analogue of RSA
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
On the importance of securing your bins: the garbage-man-in-the-middle attack
Proceedings of the 4th ACM conference on Computer and communications security
Fast Arithmetic for Public-Key Algorithms in Galois Fields with Composite Exponents
IEEE Transactions on Computers
Information Security, Mathematics, and Public-Key Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
The State of Elliptic Curve Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Parallel Multiplication in GF(2^k) usingPolynomial Residue Arithmetic
Designs, Codes and Cryptography
IEEE Transactions on Computers
How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves
Designs, Codes and Cryptography
Performance analysis of elliptic curve cryptography for SSL
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Distributed Computing Attacks on Cryptographic Systems
BT Technology Journal
Itoh-Tsujii Inversion in Standard Basis and Its Application in Cryptography and Codes
Designs, Codes and Cryptography
Satoh's algorithm in characteristic 2
Mathematics of Computation
Minimal Addition-Subtraction Chains Using Genetic Algorithms
ADVIS '02 Proceedings of the Second International Conference on Advances in Information Systems
Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Signature Schemes Based on 3rd Order Shift Registers
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Elliptic Curve Based Password Authenticated Key Exchange Protocols
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Isomorphism Classes of Hyperelliptic Curves of Genus 2 over Fq
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Software Implementation of the NIST Elliptic Curves Over Prime Fields
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Generalization of Elliptic Curve Digital Signature Schemes
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Characterization of Elliptic Curve Traces under FR-Reduction
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
The Generalized Weil Pairing and the Discrete Logarithm Problem on Elliptic Curves
LATIN '02 Proceedings of the 5th Latin American Symposium on Theoretical Informatics
Faster Attacks on Elliptic Curve Cryptosystems
SAC '98 Proceedings of the Selected Areas in Cryptography
Speeding up the Arithmetic on Koblitz Curves of Genus Two
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
An Improved Implementation of Elliptic Curves over GF(2) when Using Projective Point Arithmetic
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Fast Simultaneous Scalar Multiplication on Elliptic Curve with Montgomery Form
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
On the Power of Multidoubling in Speeding Up Elliptic Scalar Multiplication
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
New Public Key Cryptosystem Using Finite Non Abelian Groups
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Hidden Number Problem with the Trace and Bit Security of XTR and LUC
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
CM-Curves with Good Cryptographic Properties
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Efficient Multiplication on Certain Nonsupersingular Elliptic Curves
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Design of Elliptic Curves with Controllable Lower Boundary of Extension Degree for Reduction Attacks
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract)
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
How Secure Are Elliptic Curves over Composite Extension Fields?
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Elliptic Curve Discrete Logarithms and the Index Calculus
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Efficient Implementation of Schoof's Algorithm
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Efficient Elliptic Curve Exponentiation Using Mixed Coordinates
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Weil Descent of Elliptic Curves over Finite Fields of Characteristic Three
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Elliptic Curve Public-Key Cryptosystems - An Introduction
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Fully Parameterizable Elliptic Curve Cryptography Processor over GF(2)
FPL '02 Proceedings of the Reconfigurable Computing Is Going Mainstream, 12th International Conference on Field-Programmable Logic and Applications
A Software Library for Elliptic Curve Cryptography
ESA '02 Proceedings of the 10th Annual European Symposium on Algorithms
Efficient Implementation of Elliptic Curve Cryptosystems on an ARM7 with Hardware Accelerator
ISC '01 Proceedings of the 4th International Conference on Information Security
Elliptic Curve Arithmetic Using SIMD
ISC '01 Proceedings of the 4th International Conference on Information Security
A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks
ISC '02 Proceedings of the 5th International Conference on Information Security
ISC '02 Proceedings of the 5th International Conference on Information Security
A New Aspect of Dual Basis for Efficient Field Arithmetic
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Cryptoanalysis of Two Sparse Polynomial Based Public Key Cryptosystems
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Fast Elliptic Curve Point Counting Using Gaussian Normal Basis
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Power Analysis Attacks of Modular Exponentiation in Smartcards
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Fast Implementation of Public-Key Cryptography ona DSP TMS320C6201
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Software Implementation of Elliptic Curve Cryptography over Binary Fields
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
Fast Implementation of Elliptic Curve Defined over GF(pm) on CalmRISC with MAC2424 Coprocessor
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m)
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2n)
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
An End-to-End Systems Approach to Elliptic Curve Cryptography
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Two Topics in Hyperelliptic Cryptography
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Fast Key Exchange with Elliptic Curve Systems
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2m) on an FPGA
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
A Scalable Dual-Field Elliptic Curve Cryptographic Processor
IEEE Transactions on Computers
A Super-Serial Galois Fields Multiplier for FPGAs and its Application to Public-Key Algorithms
FCCM '99 Proceedings of the Seventh Annual IEEE Symposium on Field-Programmable Custom Computing Machines
FPGA Implementation of a Microcoded Elliptic Curve Cryptographic Processor
FCCM '00 Proceedings of the 2000 IEEE Symposium on Field-Programmable Custom Computing Machines
Hardware architectures for public key cryptography
Integration, the VLSI Journal
Secure web transaction with anonymous mobile agent over internet
Journal of Computer Science and Technology
Payment technologies for E-commerce
Fast Normal Basis Multiplication Using General Purpose Processors
IEEE Transactions on Computers
Asymmetric Cryptographic Algorithms
Cybernetics and Systems Analysis
Improvement of the Miyazaki--Takaragi threshold digital signature scheme
Information Processing Letters
IBM Journal of Research and Development - Mathematics and computing
Elliptic and hyperelliptic curves on embedded μP
ACM Transactions on Embedded Computing Systems (TECS)
Security on FPGAs: State-of-the-art implementations and attacks
ACM Transactions on Embedded Computing Systems (TECS)
Digital multi-signature scheme based on the elliptic curve cryptosystem
Journal of Computer Science and Technology
Design and Evaluation of a Security Scheme for Sensor Networks
ISQED '05 Proceedings of the 6th International Symposium on Quality of Electronic Design
Generic Groups, Collision Resistance, and ECDSA
Designs, Codes and Cryptography
Resource-aware conference key establishment for heterogeneous networks
IEEE/ACM Transactions on Networking (TON)
IEEE Transactions on Computers
On-demand design service innovations
IBM Journal of Research and Development
High-level synthesis for large bit-width multipliers on FPGAs: a case study
CODES+ISSS '05 Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis
An efficient group key establishment in location-aided mobile ad hoc networks
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
A note on window τ-NAF algorithm
Information Processing Letters
Optimum Digit Serial GF(2^m) Multipliers for Curve-Based Cryptography
IEEE Transactions on Computers
Low-Weight Polynomial Form Integers for Efficient Modular Multiplication
IEEE Transactions on Computers
Attacking elliptic curve cryptosystems with special-purpose hardware
Proceedings of the 2007 ACM/SIGDA 15th international symposium on Field programmable gate arrays
High-speed hardware implementations of Elliptic Curve Cryptography: A survey
Journal of Systems Architecture: the EUROMICRO Journal
Efficient parallel multiplier in shifted polynomial basis
Journal of Systems Architecture: the EUROMICRO Journal
Side-channel resistant system-level design flow for public-key cryptography
Proceedings of the 17th ACM Great Lakes symposium on VLSI
Efficient elliptic curve scalar multiplication algorithms resistant to power analysis
Information Sciences: an International Journal
Establishing and protecting digital identity in federation systems
Journal of Computer Security - The First ACM Workshop on Digital Identity Management -- DIM 2005
A survey of algebraic properties used in cryptographic protocols
Journal of Computer Security
Journal of VLSI Signal Processing Systems
Elliptic curve DSA (ECSDA): an enhanced DSA
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
SecLEACH-On the security of clustered sensor networks
Signal Processing
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller
Computers and Electrical Engineering
Computers and Electrical Engineering
Computers and Electrical Engineering
IEEE Transactions on Computers
Alpaca: extensible authorization for distributed services
Proceedings of the 14th ACM conference on Computer and communications security
High-performance public-key cryptoprocessor for wireless mobile applications
Mobile Networks and Applications
A state-of-the-art elliptic curve cryptographic processor operating in the frequency domain
Mobile Networks and Applications
Hardware organization to achieve high-speed elliptic curve cryptography for mobile devices
Mobile Networks and Applications
New and improved architectures for Montgomery modular multiplication
Mobile Networks and Applications
Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings
Computers and Electrical Engineering
Comparison of innovative signature algorithms for WSNs
WiSec '08 Proceedings of the first ACM conference on Wireless network security
On the design of secure protocols for hierarchical sensor networks
International Journal of Security and Networks
Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks
International Journal of Security and Networks
A GF(p) elliptic curve group operator resistant against side channel attacks
Proceedings of the 18th ACM Great Lakes symposium on VLSI
Designing secure electronic cash payment systems based on efficient partially blind signature scheme
AIC'06 Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications
Special-Purpose Hardware for Solving the Elliptic Curve Discrete Logarithm Problem
ACM Transactions on Reconfigurable Technology and Systems (TRETS)
An electronic voting protocol with deniable authentication for mobile ad hoc networks
Computer Communications
A practical scheme for non-interactive verifiable secret sharing
SFCS '87 Proceedings of the 28th Annual Symposium on Foundations of Computer Science
New schemes for sharing points on an elliptic curve
Computers & Mathematics with Applications
A novel efficient conference scheme for mobile communications
International Journal of Mobile Communications
FPGA design for algebraic tori-based public-key cryptography
Proceedings of the conference on Design, automation and test in Europe
Design and implementation of a secure wireless mote-based medical sensor network
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
How to protect privacy in floating car data systems
Proceedings of the fifth ACM international workshop on VehiculAr Inter-NETworking
FPGA implementation of high performance elliptic curve cryptographic processor over GF(2163)
Journal of Systems Architecture: the EUROMICRO Journal
An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security
Computational Intelligence and Security
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
New Point Addition Formulae for ECC Applications
WAIFI '07 Proceedings of the 1st international workshop on Arithmetic of Finite Fields
FPGA Design of Self-certified Signature Verification on Koblitz Curves
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Collision Search for Elliptic Curve Discrete Logarithm over GF(2m) with FPGA
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Fast Point Decompression for Standard Elliptic Curves
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
Montgomery Residue Representation Fault-Tolerant Computation in GF(2k)
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
A Tree-Based Approach for Computing Double-Base Chains
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange Representation
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Modular Reduction in GF(2n) without Pre-computational Phase
WAIFI '08 Proceedings of the 2nd international workshop on Arithmetic of Finite Fields
Montgomery Ladder for All Genus 2 Curves in Characteristic 2
WAIFI '08 Proceedings of the 2nd international workshop on Arithmetic of Finite Fields
Ultra High Performance ECC over NIST Primes on Commercial FPGAs
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
Efficient migration for mobile computing in distributed networks
Computer Standards & Interfaces
Extending web applications with a lightweight zero knowledge proof authentication
CSTST '08 Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology
The investigation of the elliptic curve cryptology applies to the new generation protocol
WSEAS Transactions on Computers
A novel access control protocol for secure sensor networks
Computer Standards & Interfaces
A novel application of grey system theory to information security (Part I)
Computer Standards & Interfaces
Threshold authenticated encryption scheme using labor-division signature
Computer Standards & Interfaces
New mutual agreement protocol to secure mobile RFID-enabled devices
Information Security Tech. Report
Side Channels in the McEliece PKC
PQCrypto '08 Proceedings of the 2nd International Workshop on Post-Quantum Cryptography
Robust User Password Change Scheme based on the Elliptic Curve Cryptosystem
Fundamenta Informaticae
Computers and Electrical Engineering
ICAIT '08 Proceedings of the 2008 International Conference on Advanced Infocomm Technology
Fast point multiplication on Koblitz curves: Parallelization method and implementations
Microprocessors & Microsystems
A New Upper Bound for the Minimal Density of Joint Representations in Elliptic Curve Cryptosystems
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
A High-Speed Design of Montgomery Multiplier
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Quantum resistant public key cryptography: a survey
Proceedings of the 8th Symposium on Identity and Trust on the Internet
Fault Analysis Attack against an AES Prototype Chip Using RSL
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist SPA
Information Security and Cryptology
Quasi-quadratic elliptic curve point counting using rigid cohomology
Journal of Symbolic Computation
International Journal of Information and Communication Technology
Novel Precomputation Schemes for Elliptic Curve Cryptosystems
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
Secured communication protocol for internetworking ZigBee cluster networks
Computer Communications
A secure elliptic curve-based RFID protocol
Journal of Computer Science and Technology
Public Key Signatures and Lightweight Security Solutions in a Wireless Environment
NEW2AN '09 and ruSMART '09 Proceedings of the 9th International Conference on Smart Spaces and Next Generation Wired/Wireless Networking and Second Conference on Smart Spaces
Journal of Symbolic Computation
An Agent-Based English Auction Protocol Using Elliptic Curve Cryptosystem for Mobile Commerce
ICA3PP '09 Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing
Hierarchical Time-Bound Key Management for Mobile Agents
ICA3PP '09 Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing
Secure M2M service space in residential home
Proceedings of the Fourth International ICST Conference on COMmunication System softWAre and middlewaRE
Secure distributed constraint satisfaction: reaching agreement without revealing private information
Artificial Intelligence - Special issue: Distributed constraint satisfaction
Secure roaming of key association scheme providing perfect forward secrecy in IEEE 802.16
CSNA '07 Proceedings of the IASTED International Conference on Communication Systems, Networks, and Applications
A highly efficient cipher processor for dual-field elliptic curve cryptography
IEEE Transactions on Circuits and Systems II: Express Briefs
A directed signature scheme and its application to group key initial distribution
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
An RNS implementation of an Fpelliptic curve point multiplier
IEEE Transactions on Circuits and Systems Part I: Regular Papers
IBM Journal of Research and Development
Sizzle: a standards-based end-to-end security architecture for the embedded internet
Sizzle: a standards-based end-to-end security architecture for the embedded internet
A note on window τ-NAF algorithm
Information Processing Letters
Refinements of Miller's algorithm for computing the Weil/Tate pairing
Journal of Algorithms
An FPGA based co-processor for elliptic curve cryptography
AsiaCSN '08 Proceedings of the Fifth IASTED International Conference on Communication Systems and Networks
Quantitative evaluation of side-channel security for elliptic curve cryptosystems
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
A trust-third-party based key management protocol for secure mobile RFID service
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Low-cost untraceable authentication protocols for RFID
Proceedings of the third ACM conference on Wireless network security
Sizzle: A standards-based end-to-end security architecture for the embedded Internet
Pervasive and Mobile Computing
A public key cryptosystem based on elliptic curves over Z/nZ equivalent to factoring
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Fast arithmetic architectures for public-key algorithms over Galois fields GF((2n)m)
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Non supersingular elliptic curves for public key cryptosystems
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
On the complexity of hyperelliptic discrete logarithm problem
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Public-key cryptosystems with very small key lengths
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
How intractable is the discrete logarithm for a general finite group?
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Counting the number of points on elliptic curves over finite fields: strategies and performances
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Relationships among the computational powers of breaking discrete log cryptosystems
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
An improved protocol for demonstrating possession of discrete logarithms and some generalizations
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Comparing the MOV and FR reductions in elliptic curve cryptography
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
An algorithm for solving the discrete log problem on hyperelliptic curves
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
On redundant T-adic expansions and non-adjacent digit sets
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Secure signed radix-r recoding methods for constrained-embedded devices
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Interpolation of the elliptic curve Diffie-Hellman mapping
AAECC'03 Proceedings of the 15th international conference on Applied algebra, algebraic algorithms and error-correcting codes
Cryptanalysis of the full version randomized addition-subtraction chains
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
A random M-ary method based countermeasure against side channel attacks
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
Enhanced doubling attacks on signed-all-bits set recoding
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
New Frobenius expansions for elliptic curves with efficient endomorphisms
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Efficient computations of the Tate pairing for the large MOV degrees
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
A WTLS handshake protocol with user anonymity and forward secrecy
CIC'02 Proceedings of the 7th CDMA international conference on Mobile communications
Hardware performance characterization of block cipher structures
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Fault tolerant and distributed broadcast encryption
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Fast elliptic curve arithmetic and improved weil pairing evaluation
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Affine precomputation with sole inversion in elliptic curve cryptography
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
An energy and communication efficient group key in sensor networks using elliptic curve polynomial
ADHOC-NOW'07 Proceedings of the 6th international conference on Ad-hoc, mobile and wireless networks
Journal of Signal Processing Systems
Improving e-payment security using Elliptic Curve Cryptosystem
Electronic Commerce Research
Fast Reconfigurable Elliptic Curve Cryptography Acceleration for GF(2m) on 32 bit Processors
Journal of Signal Processing Systems
Compiler assisted elliptic curve cryptography
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Efficient arithmetic on subfield elliptic curves over small finite fields of odd characteristic
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
On the BRIP algorithms security for RSA
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
Analysis of ECDSA authentication processing in VANETs
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
A secure and efficient three-pass authenticated key agreement protocol based on elliptic curves
NETWORKING'08 Proceedings of the 7th international IFIP-TC6 networking conference on AdHoc and sensor networks, wireless networks, next generation internet
IITA'09 Proceedings of the 3rd international conference on Intelligent information technology application
A zero-knowledge proof of digital signature scheme based on the elliptic curve cryptosystem
IITA'09 Proceedings of the 3rd international conference on Intelligent information technology application
Public-key cryptography from different assumptions
Proceedings of the forty-second ACM symposium on Theory of computing
SPA resistant elliptic curve cryptosystem using addition chains
International Journal of High Performance Systems Architecture
A new construction of knapsack PKC by using a random sequence
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
Finite field arithmetic for cryptography
IEEE Circuits and Systems Magazine
A high performance ECC hardware implementation with instruction-level parallelism over GF(2163)
Microprocessors & Microsystems
Minimizing hamming weight based on 1's complement of binary numbers over GF(2m)
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Efficient implementation of elliptic curve cryptography using low-power digital signal processor
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
A secure and efficient SIP authentication scheme for converged VoIP networks
Computer Communications
An efficient date-constraint hierarchical key management scheme for mobile agents
Expert Systems with Applications: An International Journal
Efficient utilization of elliptic curve cryptosystem for hierarchical access control
Journal of Systems and Software
Optimized System-on-Chip Integration of a Programmable ECC Coprocessor
ACM Transactions on Reconfigurable Technology and Systems (TRETS)
Faster group operations on elliptic curves
AISC '09 Proceedings of the Seventh Australasian Conference on Information Security - Volume 98
Elliptic curves cryptosystems for ecommerce applications
MCBE'10/MCBC'10 Proceedings of the 11th WSEAS international conference on mathematics and computers in business and economics and 11th WSEAS international conference on Biology and chemistry
Optimizing the HW/SW boundary of an ECC SoC design using control hierarchy and distributed storage
Proceedings of the Conference on Design, Automation and Test in Europe
A high speed coprocessor for elliptic curve scalar multiplications over Fp
CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
Co-Z addition formulæ and binary ladders on elliptic curves
CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
A novel key management and access control scheme for mobile agent
ICIC'06 Proceedings of the 2006 international conference on Intelligent computing: Part II
Montgomery multiplication on the cell
PPAM'09 Proceedings of the 8th international conference on Parallel processing and applied mathematics: Part I
A timing attack against patterson algorithm in the McEliece PKC
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
Efficient key management for preserving HIPAA regulations
Journal of Systems and Software
High-performance modular multiplication on the cell processor
WAIFI'10 Proceedings of the Third international conference on Arithmetic of finite fields
A modified low complexity digit-level Gaussian normal basis multiplier
WAIFI'10 Proceedings of the Third international conference on Arithmetic of finite fields
Security of IEEE 802.16 in mesh mode
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Identity based encryption: Progress and challenges
Information Security Tech. Report
Scan-based attack against elliptic curve cryptosystems
Proceedings of the 2010 Asia and South Pacific Design Automation Conference
A high-performance unified-field reconfigurable cryptographic processor
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
A survey of local and global pairings on elliptic curves and abelian varieties
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Workload characterization of cryptography algorithms for hardware acceleration
Proceedings of the 2nd ACM/SPEC International Conference on Performance engineering
Bounds and trade-offs for Double-Base Number Systems
Information Processing Letters
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
ICCOM'06 Proceedings of the 10th WSEAS international conference on Communications
Security design for an inter-domain publish/subscribe architecture
The future internet
Toric forms of elliptic curves and their arithmetic
Journal of Symbolic Computation
An efficient anonymous authentication protocol for mobile pay-TV
Journal of Network and Computer Applications
Prime field ECDSA signature processing for reconfigurable embedded systems
International Journal of Reconfigurable Computing - Special issue on selected papers from the international workshop on reconfigurable communication-centric systems on chips (ReCoSoC' 2010)
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Computational aspects of elliptic curves and modular forms
Proceedings of the 36th international symposium on Symbolic and algebraic computation
Division polynomials for Jacobi quartic curves
Proceedings of the 36th international symposium on Symbolic and algebraic computation
A family of implementation-friendly BN elliptic curves
Journal of Systems and Software
An alternative class of irreducible polynomials for optimal extension fields
Designs, Codes and Cryptography
Identification methods over Ea,bn
ICACM'11 Proceedings of the 2011 international conference on Applied & computational mathematics
Faster explicit formulas for computing pairings over ordinary curves
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Memory-constrained implementations of elliptic curve cryptography in co-Z coordinate representation
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
Information security on elliptic curves
CIT'11 Proceedings of the 5th WSEAS international conference on Communications and information technology
Secure communication for electronic business applications in mobile agent networks
Expert Systems with Applications: An International Journal
Remote timing attacks are still practical
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Generalized learning problems and applications to non-commutative cryptography
ProvSec'11 Proceedings of the 5th international conference on Provable security
A review on body area networks security for healthcare
ISRN Communications and Networking
To infinity and beyond: combined attack on ECC using points of low order
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
FPGA implementation of pairings using residue number system and lazy reduction
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Elliptic curve for data protection
Proceedings of the 2011 Information Security Curriculum Development Conference
Design and evaluation of parallel, scalable, curve based processor over binary field
WSEAS Transactions on Computers
A note on the signed sliding window integer recoding and a left-to-right analogue
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Scalar multiplication on koblitz curves using double bases
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Extended double-base number system with applications to elliptic curve cryptography
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
An optimizing authenticated key exchange protocol for self-organizing sensor networks
UCS'06 Proceedings of the Third international conference on Ubiquitous Computing Systems
Kleptographic attacks on e-voting schemes
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Generic cryptanalysis of combined countermeasures with randomized BSD representations
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Do all elliptic curves of the same order have the same difficulty of discrete log?
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Efficient and secure elliptic curve point multiplication using double-base chains
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
An advanced method for joint scalar multiplications on memory constraint devices
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
SPA-resistant simultaneous scalar multiplication
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
HSEP design using f2m HECC and threeb symmetric key under e-commerce environment
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
HSEP design using f2m HECC and threeb symmetric key under e-commerce environment
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
HSEP design using f2m HECC and threeb symmetric key under e-commerce environment
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
A MEP (mobile electronic payment) and IntCA protocol design
HPCC'05 Proceedings of the First international conference on High Performance Computing and Communications
Unified point addition formulæ and side-channel attacks
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Superscalar coprocessor for high-speed curve-based cryptography
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
FPGA implementation of point multiplication on koblitz curves using kleinian integers
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Cellular automata architecture for elliptic curve cryptographic hardware
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part III
Public key cryptography-based security scheme for wireless sensor networks in healthcare
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
Scalar multiplication on elliptic curves defined over fields of small odd characteristic
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Similar keys of multivariate quadratic public key cryptosystems
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
A note on signed binary window algorithm for elliptic curve cryptosystems
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Efficient simultaneous inversion in parallel and application to point multiplication in ECC
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Efficient doubling on genus 3 curves over binary fields
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Arithmetic of generalized jacobians
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
Signature calculus and discrete logarithm problems
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
An improved popescu's authenticated key agreement protocol
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
A method for authenticating based on ZKp in distributed environment
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
Evolutionary hardware architecture for division in elliptic curve cryptosystems over GF(2n)
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part III
Two new fast methods for simultaneous scalar multiplication in elliptic curve cryptosystems
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Choosing parameter sets for NTRUEncrypt with NAEP and SVES-3
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Key generation based on elliptic curve over finite prime field
International Journal of Electronic Security and Digital Forensics
Hyperelliptic curve coprocessors on a FPGA
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Service allocation in selfish mobile ad hoc networks using vickrey auction
EDBT'04 Proceedings of the 2004 international conference on Current Trends in Database Technology
On partial lifting and the elliptic curve discrete logarithm problem
ISAAC'04 Proceedings of the 15th international conference on Algorithms and Computation
An efficient CDH-based signature scheme with a tight security reduction
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Resistance of randomized projective coordinates against power analysis
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Short memory scalar multiplication on koblitz curves
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Hardware/software co-design for hyperelliptic curve cryptography (HECC) on the 8051 µP
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
A non-redundant and efficient architecture for karatsuba-ofman algorithm
ISC'05 Proceedings of the 8th international conference on Information Security
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs
Personal and Ubiquitous Computing
International Journal of Applied Cryptography
Testing mersenne primes with elliptic curves
CASC'06 Proceedings of the 9th international conference on Computer Algebra in Scientific Computing
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
Accelerating inverse of GF(2n) with precomputation
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
The elliptic curve discrete logarithm problems over the p-adic field and formal groups
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
Efficient arithmetic on hessian curves
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
A timing attack against the secret permutation in the mceliece PKC
PQCrypto'10 Proceedings of the Third international conference on Post-Quantum Cryptography
Computing elliptic curve discrete logarithms with the negation map
Information Sciences: an International Journal
Encoding-Free elgamal encryption without random oracles
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Curve25519: new diffie-hellman speed records
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
A HIICA(Highly-Improved intra CA) design for m-commerce
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Tiny 3-TLS: a trust delegation protocol for wireless sensor networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
A smart card implementation of the mceliece PKC
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Efficient hardware implementation of elliptic curve cryptography over GF(pm)
WISA'05 Proceedings of the 6th international conference on Information Security Applications
A DPA countermeasure by randomized frobenius decomposition
WISA'05 Proceedings of the 6th international conference on Information Security Applications
An algebraic framework for cipher embeddings
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Efficient precomputation schemes of kP+lQ
Information Processing Letters
International Journal of Applied Cryptography
Relative doubling attack against montgomery ladder
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
An updated survey on secure ECC implementations: attacks, countermeasures and cost
Cryptography and Security
Practical attacks on a cryptosystem proposed in patent WO/2009/066313
WISA'11 Proceedings of the 12th international conference on Information Security Applications
Group law computations on jacobians of hyperelliptic curves
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
Improved three-way split formulas for binary polynomial multiplication
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
Sublinear scalar multiplication on hyperelliptic koblitz curves
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
Hierarchical ECC-Based RFID authentication protocol
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
Improved precomputation scheme for scalar multiplication on elliptic curves
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
A new lattice-based public-key cryptosystem mixed with a knapsack
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
A provably secure authenticated key agreement protocol for wireless communications
Computers and Electrical Engineering
Integration, the VLSI Journal
Fast and scalable parallel processing of scalar multiplication in elliptic curve cryptosystems
Security and Communication Networks
I: Basic technologies: TESS: A security system based on discrete exponentiation
Computer Communications
Explicit bounds of polynomial coefficients and counting points on Picard curves over finite fields
Mathematical and Computer Modelling: An International Journal
Mathematical and Computer Modelling: An International Journal
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
Improving the complexity of index calculus algorithms in elliptic curves over binary fields
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
Information Sciences: an International Journal
Counting points on Cab curves using Monsky--Washnitzer cohomology
Finite Fields and Their Applications
Finite field arithmetic using quasi-normal bases
Finite Fields and Their Applications
Isomorphism classes of elliptic and hyperelliptic curves over finite fields F(2g+1)n
Finite Fields and Their Applications
Fast computation of canonical lifts of elliptic curves and its application to point counting
Finite Fields and Their Applications
Algebraic curves and cryptography
Finite Fields and Their Applications
Side effects of identity management in SIP VoIP environment
Information Security Tech. Report
A novel elliptical curve ID cryptography protocol for multi-hop ZigBee sensor networks
Wireless Communications & Mobile Computing
Improved Pollard rho method for computing discrete logarithms over finite extension fields
Journal of Computational and Applied Mathematics
Exploring the design space of prime field vs. binary field ECC-Hardware implementations
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Certificateless strong designated verifier multisignature scheme using bilinear pairings
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
High-Speed unified elliptic curve cryptosystem on FPGAs using binary huff curves
VDAT'12 Proceedings of the 16th international conference on Progress in VLSI Design and Test
Fast point quadrupling on elliptic curves
Proceedings of the Third Symposium on Information and Communication Technology
Efficient multiplication over extension fields
WAIFI'12 Proceedings of the 4th international conference on Arithmetic of Finite Fields
Improved fixed-base comb method for fast scalar multiplication
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
MQQ-SIG: an ultra-fast and provably CMA resistant digital signature scheme
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
Robust User Password Change Scheme based on the Elliptic Curve Cryptosystem
Fundamenta Informaticae
Secure Dynamic Access Control Scheme of PHR in Cloud Computing
Journal of Medical Systems
Steganographic manipulations with elliptic curve cryptography
International Journal of Electronic Security and Digital Forensics
Low power elliptic curve cryptography
PATMOS'07 Proceedings of the 17th international conference on Integrated Circuit and System Design: power and timing modeling, optimization and simulation
An ECC based public key infrastructure usable for mobile applications
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Controlling incoming connections using certificates and distributed hash tables
NEW2AN'07 Proceedings of the 7th international conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking
SPA countermeasure based on unsigned left-to-right recodings
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Towards a DL-based additively homomorphic encryption scheme
ISC'07 Proceedings of the 10th international conference on Information Security
ISC'07 Proceedings of the 10th international conference on Information Security
Improved multi-precision squaring for low-end RISC microcontrollers
Journal of Systems and Software
Complete atomic blocks for elliptic curves in jacobian coordinates over prime fields
LATINCRYPT'12 Proceedings of the 2nd international conference on Cryptology and Information Security in Latin America
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
On the strength comparison of the ECDLP and the IFP
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
Low-power and high-speed design of a versatile bit-serial multiplier in finite fields GF(2m)
Integration, the VLSI Journal
Faster pairing coprocessor architecture
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
Low-Cost countermeasure against RPA
CARDIS'12 Proceedings of the 11th international conference on Smart Card Research and Advanced Applications
Speeding up elliptic curve discrete logarithm computations with point halving
Designs, Codes and Cryptography
Cryptography with fast point multiplication by using ASCII codes and its implementation
International Journal of Communication Networks and Distributed Systems
Computers and Electrical Engineering
A hardware-accelerated ECDLP with high-performance modular multiplication
International Journal of Reconfigurable Computing - Special issue on Selected Papers from the 2011 International Conference on Reconfigurable Computing and FPGAs (ReConFig 2011)
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
A new elliptic curve cryptosystem for securing sensitive data applications
International Journal of Electronic Security and Digital Forensics
Utilization of Pipeline Technique in AOP Based Multipliers with Parallel Inputs
Journal of Signal Processing Systems
Information Sciences: an International Journal
Image encryption based on the Jacobian elliptic maps
Journal of Systems and Software
Securing ZigBee smart energy profile 1.x with OpenECC library
Proceedings of the first ACM workshop on Smart energy grid security
Defeating with fault injection a combined attack resistant exponentiation
COSADE'13 Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design
High-Performance scalar multiplication using 8-dimensional GLV/GLS decomposition
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
Non-Interactive Authenticated Key Agreement over the Mobile Communication Network
Mobile Networks and Applications
International Journal of Security and Networks
Two ID-based authenticated schemes with key agreement for mobile environments
The Journal of Supercomputing
Reordering computation sequences for memory-efficient binary field multiplication
The Journal of Supercomputing
Robust smart card secured authentication scheme on SIP using Elliptic Curve Cryptography
Computer Standards & Interfaces
Improved migration for mobile computing in distributed networks
Computer Standards & Interfaces
Enhanced Dynamic Authentication Scheme (EDAS)
Information Systems Frontiers
Hi-index | 0.03 |