The State of Elliptic Curve Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Analysis of the Xedni Calculus Attack
Designs, Codes and Cryptography
Computing discrete logarithms in high-genus hyperelliptic Jacobians in provably subexponential time
Mathematics of Computation
Designs, Codes and Cryptography
Curves with Many Points and Their Applications
AAECC-13 Proceedings of the 13th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Fail-Stop Threshold Signature Schemes Based on Elliptic Curves
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Note on Fast Computation of Secret RSA Exponents
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
New Key Agreement Protocols in Braid Group Cryptography
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
The Security of Hidden Field Equations (HFE)
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Speeding up the Arithmetic on Koblitz Curves of Genus Two
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
An Improved Implementation of Elliptic Curves over GF(2) when Using Projective Point Arithmetic
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
New Public-Key Cryptosystem Using Braid Groups
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Modular Multiplication in GF(pk) Using Lagrange Representation
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Speeding up the Scalar Multiplication in the Jacobians of Hyperelliptic Curves Using Frobenius Map
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
C*-+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2n
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
On P Systems with Active Membranes Solving the Integer Factorization Problem in a Polynomial Time
WMP '00 Proceedings of the Workshop on Multiset Processing: Multiset Processing, Mathematical, Computer Science, and Molecular Computing Points of View
WMC-CdeA '02 Revised Papers from the International Workshop on Membrane Computing
Informatics - 10 Years Back. 10 Years Ahead.
Genus Two Hyperelliptic Curve Coprocessor
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Selection of secure hyperelliptic curves of g = 2 based on a subfield
Journal of Computer Science and Technology
Computer algebra handbook
The teaching of cryptologic mathematics
CompSysTech '03 Proceedings of the 4th international conference conference on Computer systems and technologies: e-Learning
On the complexity of the discrete logarithm and Diffie-Hellman problems
Journal of Complexity - Special issue on coding and cryptography
On counting and generating curves over small finite fields
Journal of Complexity - Special issue on coding and cryptography
Elliptic and hyperelliptic curves on embedded μP
ACM Transactions on Embedded Computing Systems (TECS)
A threshold signature scheme for group communications without a shared distribution center
Future Generation Computer Systems - Special issue: Computational science of lattice Boltzmann modelling
Generic Groups, Collision Resistance, and ECDSA
Designs, Codes and Cryptography
IEEE Transactions on Computers
A secure watermarking scheme for buyer-seller identification and copyright protection
EURASIP Journal on Applied Signal Processing
On efficient implementation of FPGA-based hyperelliptic curve cryptosystems
Computers and Electrical Engineering
IEEE Transactions on Computers
High-performance public-key cryptoprocessor for wireless mobile applications
Mobile Networks and Applications
An application of algebraic curves for key exchange on mobile grid computing
ACOS'07 Proceedings of the 6th Conference on WSEAS International Conference on Applied Computer Science - Volume 6
Eta pairing computation on general divisors over hyperelliptic curves y2=xp-x+d
Journal of Symbolic Computation
Explicit Formulas for Real Hyperelliptic Curves of Genus 2 in Affine Representation
WAIFI '07 Proceedings of the 1st international workshop on Arithmetic of Finite Fields
Threshold authenticated encryption scheme using labor-division signature
Computer Standards & Interfaces
An Algebraic Surface Cryptosystem
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Distributed signcryption scheme on hyperelliptic curve
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
Efficient and generalized pairing computation on Abelian varieties
IEEE Transactions on Information Theory
On the performance of hyperelliptic cryptosystems
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
An algorithm for solving the discrete log problem on hyperelliptic curves
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
A cryptanalysis of the double-round quadratic cryptosystem
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
Cryptanalysis of the TRMS signature scheme of PKC'05
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
A comparison of keying methods in the Hubenko architecture as applied to wireless sensor networks
International Journal of Autonomous and Adaptive Communications Systems
Cryptanalysis of the hidden matrix cryptosystem
LATINCRYPT'10 Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America
A Novel Combinatorial Public Key Cryptosystem
Informatica
Preimage attacks against variants of very smooth hash
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
Randomized Gandy-Păun-Rozenberg machines
CMC'10 Proceedings of the 11th international conference on Membrane computing
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
A new improvement of the ElGamal algorithm using hyperelliptic curves over a wireless channel
ICCOM'06 Proceedings of the 10th WSEAS international conference on Communications
A new public key cryptography algorithm using chaotic systems and hyperelliptic curves
ICS'06 Proceedings of the 10th WSEAS international conference on Systems
On applications of singular matrices over finite fields in cryptography
InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Superscalar coprocessor for high-speed curve-based cryptography
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Performance of algebraic graphs based stream-ciphers using large finite fields
Annales UMCS, Informatica - Cryptography and data protection
The implementation of cubic public keys based on a new family of algebraic graphs
Annales UMCS, Informatica - Cryptography and data protection
On the key exchange with new cubical maps based on graphs
Annales UMCS, Informatica
How to embed short cycles into large nonlinear feedback-shift registers
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Hyperelliptic curve coprocessors on a FPGA
WISA'04 Proceedings of the 5th international conference on Information Security Applications
CIMMACS'11/ISP'11 Proceedings of the 10th WSEAS international conference on Computational Intelligence, Man-Machine Systems and Cybernetics, and proceedings of the 10th WSEAS international conference on Information Security and Privacy
Algebraic curves and cryptography
Finite Fields and Their Applications
Editorial: A decade of Finite Fields and Their Applications
Finite Fields and Their Applications
The Multivariate Algorithmic Revolution and Beyond
Eta pairing computation on general divisors over hyperelliptic curves y2 = x7 - x ± 1
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
A pedagogical example of a stretched password-based key derivation function
Journal of Computing Sciences in Colleges
Hi-index | 0.07 |