Designs, Codes and Cryptography
Satoh's algorithm in characteristic 2
Mathematics of Computation
Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
On p-adic Point Counting Algorithms for Elliptic Curves over Finite Fields
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Oblivious Transfer Using Elliptic Curves
Cryptologia
Pseudo-Randomness of Discrete-Log Sequences from Elliptic Curves
Information Security and Cryptology
On the Connection between Kloosterman Sums and Elliptic Curves
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
Designs, Codes and Cryptography
Construction of pseudo-random binary sequences from elliptic curves by using discrete logarithm
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
Binary kloosterman sums with value 4
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
Editorial: A decade of Finite Fields and Their Applications
Finite Fields and Their Applications
On divisibility of exponential sums of polynomials of special type over fields of characteristic 2
Designs, Codes and Cryptography
Hi-index | 0.00 |