A family of Jacobians suitable for discrete log cryptosystems
CRYPTO '88 Proceedings on Advances in cryptology
General public key residue cryptosystems and mental poker protocols
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
On the implementation of elliptic curve cryptosystems
CRYPTO '89 Proceedings on Advances in cryptology
CRYPTO '89 Proceedings on Advances in cryptology
ISSAC '92 Papers from the international symposium on Symbolic and algebraic computation
A new elliptic curve based analogue of RSA
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem
Designs, Codes and Cryptography - Special issue dedicated to Gustavus J. Simmons
On the importance of securing your bins: the garbage-man-in-the-middle attack
Proceedings of the 4th ACM conference on Computer and communications security
Authenticated group key agreement and friends
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Montgomery Multiplication in GF(2^k
Designs, Codes and Cryptography
IEEE Transactions on Computers
Rounding in lattices and its cryptographic applications
SODA '97 Proceedings of the eighth annual ACM-SIAM symposium on Discrete algorithms
Scalable multicast security in dynamic groups
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Complexity and Fast Algorithms for Multiexponentiations
IEEE Transactions on Computers
The State of Elliptic Curve Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Efficient Arithmetic on Koblitz Curves
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
A verifiable secret shuffle and its application to e-voting
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Securing wireless data: system architecture challenges
Proceedings of the 15th international symposium on System Synthesis
Cryptography, trusted third parties and escrow
BT Technology Journal
Efficient Rabin-type Digital Signature Scheme
Designs, Codes and Cryptography
Short Polynomial Representations for Square Roots Modulo p
Designs, Codes and Cryptography
A Java implementation of an elliptic curve cryptosystem
PPPJ '02/IRE '02 Proceedings of the inaugural conference on the Principles and Practice of programming, 2002 and Proceedings of the second workshop on Intermediate representation engineering for virtual machines, 2002
On weights in duadic Abelian codes
Discrete Mathematics
Curves with Many Points and Their Applications
AAECC-13 Proceedings of the 13th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Fail-Stop Threshold Signature Schemes Based on Elliptic Curves
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Note on Fast Computation of Secret RSA Exponents
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Secure PC-Franking for Everyone
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
Constructing Elliptic Curve Cryptosystems in Characteristic 2
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
New Public-Key Schemes Based on Elliptic Curves over the Ring Zn
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
CM-Curves with Good Cryptographic Properties
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
An Efficient Digital Signature Scheme Based on an Elliptic Curve Over the Ring Zn
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Speeding up Elliptic Cryptosystems by Using a Signed Binary Window Method
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
SOFSEM '98 Proceedings of the 25th Conference on Current Trends in Theory and Practice of Informatics: Theory and Practice of Informatics
Modular Multiplication in GF(pk) Using Lagrange Representation
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Montgomery's Multiplication Technique: How to Make It Smaller and Faster
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Low Complexity Multiplication in a Finite Field Using Ring Representation
IEEE Transactions on Computers
Do the arithmetic operations really execute in constant time?
ACM SIGCSE Bulletin
Embedding Security in Wireless Embedded Systems
VLSID '03 Proceedings of the 16th International Conference on VLSI Design
Methods to reduce test application time for accumulator-based self-test
VTS '97 Proceedings of the 15th IEEE VLSI Test Symposium
One-way trap door functions based on the Boolean satisfiability problem
ICCC '02 Proceedings of the 15th international conference on Computer communication
Discrete Applied Mathematics - Special issue: International workshop on coding and cryptography (WCC 2001)
Hardware architectures for public key cryptography
Integration, the VLSI Journal
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Computer algebra handbook
Protecting digital archives at the Greek Orthodox Archdiocese of America
Proceedings of the 3rd ACM workshop on Digital rights management
Breaking and repairing optimistic fair exchange from PODC 2003
Proceedings of the 3rd ACM workshop on Digital rights management
A Java API for polynomial arithmetic
PPPJ '03 Proceedings of the 2nd international conference on Principles and practice of programming in Java
On the Computation of Square Roots in Finite Fields
Designs, Codes and Cryptography
An FPGA implementation of an elliptic curve processor GF(2m)
Proceedings of the 14th ACM Great Lakes symposium on VLSI
The internet public key infrastructure
IBM Systems Journal - End-to-end security
Comments on "A Practical (t,n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem'
IEEE Transactions on Knowledge and Data Engineering
Teaching bit-level algorithm analysis to the undergraduates in computer science
ACM SIGCSE Bulletin
Pseudoirreducible Polynomials: Probabilistic Irreducibility Testing
Cybernetics and Systems Analysis
Efficient data mappings for parity-declustered data layouts
Theoretical Computer Science - Special papers from: COCOON 2003
An architecture for elliptic curve cryptograph computation
ACM SIGARCH Computer Architecture News - Special issue: Workshop on architectural support for security and anti-virus (WASSA)
Elliptic curve cryptography: Java implementation
Proceedings of the 1st annual conference on Information security curriculum development
An Identity Based Encryption system
Proceedings of the 3rd international symposium on Principles and practice of programming in Java
Speeding up Exponentiation using an Untrusted Computational Resource
Designs, Codes and Cryptography
A mathematical framework for the semantics of symbolic languages representing periodic time
Annals of Mathematics and Artificial Intelligence
Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring
Theoretical Computer Science
Safe Credential-Based Trust Protocols: A Framework
WI '06 Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence
Addressing Credential Revocation in Grid Environments
GRID '05 Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing
Elliptic curve DSA (ECSDA): an enhanced DSA
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
New algorithms and protocols for information authentication in automatic control systems
Automation and Remote Control
Database encryption using enhanced affine block cipher algorithm
MMACTEE'08 Proceedings of the 10th WSEAS International Conference on Mathematical Methods and Computational Techniques in Electrical Engineering
Graphstega: Graph Steganography Methodology
Journal of Digital Forensic Practice
Safer parameters for the Chor-Rivest cryptosystem
Computers & Mathematics with Applications
Methods of finding multiplicative inverses in GF(28)
Computer Communications
An identity-based key infrastructure suitable for messaging and its application to e-mail
Proceedings of the 4th international conference on Security and privacy in communication netowrks
A matricial public key cryptosystem with digital signature
WSEAS Transactions on Mathematics
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Analysis and design of a secure key exchange scheme
Information Sciences: an International Journal
A Non-abelian Group Based on Block Upper Triangular Matrices with Cryptographic Applications
AAECC-18 '09 Proceedings of the 18th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
IEEE Transactions on Wireless Communications
Integration of a secure mobile payment system in a GSM/UMTS SIM smart card
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
KSSL: experiments in wireless internet security
KSSL: experiments in wireless internet security
Noninteractive self-certification for long-lived mobile ad hoc networks
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
A new sequential multi-signature scheme with signers' intentions
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
On the complexity of hyperelliptic discrete logarithm problem
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Dickson pseudoprimes and primality testing
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Public-key cryptosystems with very small key lengths
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Relationships among the computational powers of breaking discrete log cryptosystems
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Efficient mappings for parity-declustered data layouts
COCOON'03 Proceedings of the 9th annual international conference on Computing and combinatorics
A cryptographic method for secure watermark detection
IH'06 Proceedings of the 8th international conference on Information hiding
Efficient hardware multiplicative inverters
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
A result on the distribution of quadratic residues with applications to elliptic curve cryptography
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
Algorithms for sensor and ad hoc networks: advanced lectures
Algorithms for sensor and ad hoc networks: advanced lectures
Elliptic curves cryptosystems for ecommerce applications
MCBE'10/MCBC'10 Proceedings of the 11th WSEAS international conference on mathematics and computers in business and economics and 11th WSEAS international conference on Biology and chemistry
WISM'10 Proceedings of the 2010 international conference on Web information systems and mining
A novel deniable authentication protocol based on Diffie-Hellman algorithm using pairing technique
Proceedings of the 2011 International Conference on Communication, Computing & Security
A new public key cryptosystem based on matrices
ISP'07 Proceedings of the 6th WSEAS international conference on Information security and privacy
Fast parallel DNA-based algorithms for molecular computation: discrete logarithm
The Journal of Supercomputing
Shor's discrete logarithm quantum algorithm for elliptic curves
Quantum Information & Computation
A grid authentication system with revocation guarantees
HiPC'05 Proceedings of the 12th international conference on High Performance Computing
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV
A novel hierarchical key management scheme based on quadratic residues
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
Cramer-Damgård signatures revisited: efficient flat-tree signatures based on factoring
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Performance of algebraic graphs based stream-ciphers using large finite fields
Annales UMCS, Informatica - Cryptography and data protection
ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (i)
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Secure overlay for service centric wireless sensor networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
On a fast version of a pseudorandom generator
General Theory of Information Transfer and Combinatorics
Pairing-Based cryptography at high security levels
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Information protection systems based on universal knapsack problem
Proceedings of the 6th International Conference on Security of Information and Networks
On the subfield subcodes of Hermitian codes
Designs, Codes and Cryptography
Hi-index | 0.01 |