Complexity and Fast Algorithms for Multiexponentiations
IEEE Transactions on Computers
Efficient Arithmetic on Koblitz Curves
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Some remarks on parallel exponentiation (extended abstract)
ISSAC '00 Proceedings of the 2000 international symposium on Symbolic and algebraic computation
Optimal Left-to-Right Binary Signed-Digit Recoding
IEEE Transactions on Computers - Special issue on computer arithmetic
Efficient parallel exponentiation in GF(2n) using normal basis representations
Proceedings of the thirteenth annual ACM symposium on Parallel algorithms and architectures
IEEE Transactions on Computers
Reconfigurable Implementation of Elliptic Curve Crypto Algorithms
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
Speeding up the Arithmetic on Koblitz Curves of Genus Two
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
On the Power of Multidoubling in Speeding Up Elliptic Scalar Multiplication
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
On the Insecurity of a Server-Aided RSA Protocol
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Elliptic Curve Public-Key Cryptosystems - An Introduction
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
New Minimal Modified Radix-r Representation with Applications to Smart Cards
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
Efficient 1-Out-n Oblivious Transfer Schemes
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
Fast Implementation of Public-Key Cryptography ona DSP TMS320C6201
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Elliptic Curve Scalar Multiplier Design Using FPGAs
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
An Energy Efficient Reconfigurable Public-Key Cryptograhpy Processor Architecture
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
Software Implementation of Elliptic Curve Cryptography over Binary Fields
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
Protections against Differential Analysis for Elliptic Curve Cryptography
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Preventing Differential Analysis in GLV Elliptic Curve Scalar Multiplication
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
The Montgomery Powering Ladder
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Cryptographic Applications of Sparse Polynomials over Finite Rings
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Hardware architectures for public key cryptography
Integration, the VLSI Journal
Random small hamming weight products with applications to cryptography
Discrete Applied Mathematics - Special issue on the 2000 com2MaC workshop on cryptography
Efficient 1-Out-of-n Oblivious Transfer Schemes with Universally Usable Parameters
IEEE Transactions on Computers
On the Computation of Square Roots in Finite Fields
Designs, Codes and Cryptography
Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity
IEEE Transactions on Computers
Elliptic and hyperelliptic curves on embedded μP
ACM Transactions on Embedded Computing Systems (TECS)
Security on FPGAs: State-of-the-art implementations and attacks
ACM Transactions on Embedded Computing Systems (TECS)
Parallel Cryptographic Arithmetic Using a Redundant Montgomery Representation
IEEE Transactions on Computers
An Improved Algorithm for uP + vQ on a Family of Elliptic Curves
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
Efficient parallel exponentiation in GF(qn) using normal basis representations
Journal of Algorithms
IEEE Transactions on Computers
Analysis of linear combination algorithms in cryptography
ACM Transactions on Algorithms (TALG)
A New Minimal Average Weight Representation for Left-to-Right Point Multiplication Methods
IEEE Transactions on Computers
Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems
IEEE Transactions on Computers
A-Codes from Rational Functions over Galois Rings
Designs, Codes and Cryptography
On the Number of Optimal Base 2 Representations of Integers
Designs, Codes and Cryptography
Improved generalized Atkin algorithm for computing square roots in finite fields
Information Processing Letters
Secure evolvable hardware for public-key cryptosystems
New Generation Computing - Evolutionary computation
Fast Multicomputation with Asynchronous Strategy
IEEE Transactions on Computers
High-speed hardware implementations of Elliptic Curve Cryptography: A survey
Journal of Systems Architecture: the EUROMICRO Journal
Double Point Compression with Applications to Speeding Up Random Point Multiplication
IEEE Transactions on Computers
On Τ-adic representations of integers
Designs, Codes and Cryptography
Should one always use repeated squaring for modular exponentiation?
Information Processing Letters
Implementing public-key infrastructure for sensor networks
ACM Transactions on Sensor Networks (TOSN)
Fast exponentiation based on common-multiplicand-multiplication and minimal-signed-digit techniques
International Journal of Computer Mathematics
International Journal of Information and Computer Security
Highly Regular Right-to-Left Algorithms for Scalar Multiplication
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Fast Point Decompression for Standard Elliptic Curves
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
Fast Point Multiplication on Elliptic Curves without Precomputation
WAIFI '08 Proceedings of the 2nd international workshop on Arithmetic of Finite Fields
Faster Multi-exponentiation through Caching: Accelerating (EC)DSA Signature Verification
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
A matricial public key cryptosystem with digital signature
WSEAS Transactions on Mathematics
Information Sciences: an International Journal
New left-to-right minimal weight signed-digit radix-r representation
Computers and Electrical Engineering
Method for Detecting Vulnerability to Doubling Attacks
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Elliptic Curve Cryptography on FPGA for Low-Power Applications
ACM Transactions on Reconfigurable Technology and Systems (TRETS)
A low-complexity LUT-based squaring algorithm
Computers & Mathematics with Applications
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
A Non-abelian Group Based on Block Upper Triangular Matrices with Cryptographic Applications
AAECC-18 '09 Proceedings of the 18th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Exponent Recoding and Regular Exponentiation Algorithms
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
CEC'09 Proceedings of the Eleventh conference on Congress on Evolutionary Computation
Finding Minimal Addition Chains with a Particle Swarm Optimization Algorithm
MICAI '09 Proceedings of the 8th Mexican International Conference on Artificial Intelligence
Improved generalized Atkin algorithm for computing square roots in finite fields
Information Processing Letters
Efficient parallel exponentiation in GF(qn) using normal basis representations
Journal of Algorithms
Improved techniques for fast exponentiation
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Improved algorithms for efficient arithmetic on elliptic curves using fast endomorphisms
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
VECPAR'02 Proceedings of the 5th international conference on High performance computing for computational science
Two efficient and provably secure schemes for server-assisted threshold signatures
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
New left-to-right radix-r signed-digit recoding algorithm for pairing-based cryptosystems
TAMC'07 Proceedings of the 4th international conference on Theory and applications of models of computation
Speeding up scalar multiplication using a new signed binary representation for integers
MCAM'07 Proceedings of the 2007 international conference on Multimedia content analysis and mining
Solving discrete logarithms from partial knowledge of the key
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
Efficient 15,360-bit RSA using woop-optimised montgomery arithmetic
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
IITA'09 Proceedings of the 3rd international conference on Intelligent information technology application
New fault attacks using Jacobi symbol and application to regular right-to-left algorithms
Information Processing Letters
Fast scalar multiplication for ECC over GF(p) using division chains
WISA'10 Proceedings of the 11th international conference on Information security applications
A new public key cryptosystem based on matrices
ISP'07 Proceedings of the 6th WSEAS international conference on Information security and privacy
A high performance ROM-based structure for modular exponentiation
Computers and Electrical Engineering
A simulated annealing algorithm for the problem of minimal addition chains
EPIA'11 Proceedings of the 15th Portugese conference on Progress in artificial intelligence
Binary addition chain on EREW PRAM
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part II
A note on the signed sliding window integer recoding and a left-to-right analogue
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Fast irreducibility testing for XTR using a gaussian normal basis of low complexity
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
A parallel modular exponentiation scheme for transformed exponents
APPT'05 Proceedings of the 6th international conference on Advanced Parallel Processing Technologies
Finding optimal addition chains using a genetic algorithm approach
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I
An advanced method for joint scalar multiplications on memory constraint devices
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
A loopless gray code for minimal signed-binary representations
ESA'05 Proceedings of the 13th annual European conference on Algorithms
A note on signed binary window algorithm for elliptic curve cryptosystems
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Efficient exponentiation in GF(pm) using the Frobenius map
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Fast multi-computations with integer similarity strategy
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
New minimal weight representations for left-to-right window methods
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Interactive visualization applets for modular exponentiation using addition chains
HAIS'10 Proceedings of the 5th international conference on Hybrid Artificial Intelligence Systems - Volume Part II
Advances in alternative non-adjacent form representations
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Fractional windows revisited: improved signed-digit representations for efficient exponentiation
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Relative doubling attack against montgomery ladder
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
A duality in space usage between left-to-right and right-to-left exponentiation
CT-RSA'12 Proceedings of the 12th conference on Topics in Cryptology
Fast and scalable parallel processing of scalar multiplication in elliptic curve cryptosystems
Security and Communication Networks
Computationally-Fair group and identity-based key-exchange
TAMC'12 Proceedings of the 9th Annual international conference on Theory and Applications of Models of Computation
Improved fixed-base comb method for fast scalar multiplication
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
A note on asynchronous multi-exponentiation algorithm using binary representation
Information Processing Letters
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Efficient negative databases from cryptographic hash functions
ISC'07 Proceedings of the 10th international conference on Information Security
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
OAKE: a new family of implicitly authenticated diffie-hellman protocols
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Efficient leakage-resilient public key encryption from DDH assumption
Cluster Computing
Hi-index | 0.04 |