On the importance of securing your bins: the garbage-man-in-the-middle attack
Proceedings of the 4th ACM conference on Computer and communications security
Montgomery Multiplication in GF(2^k
Designs, Codes and Cryptography
Mastrovito Multiplier for All Trinomials
IEEE Transactions on Computers
Fast Arithmetic for Public-Key Algorithms in Galois Fields with Composite Exponents
IEEE Transactions on Computers
Mastrovito Multiplier for General Irreducible Polynomials
IEEE Transactions on Computers
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
The State of Elliptic Curve Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
The Montgomery Modular Inverse-Revisited
IEEE Transactions on Computers - Special issue on computer arithmetic
Parallel Multiplication in GF(2^k) usingPolynomial Residue Arithmetic
Designs, Codes and Cryptography
Efficient finite field digital-serial multiplier architecture for cryptography applications
Proceedings of the conference on Design, automation and test in Europe
On the Use of RSA as a Secret Key Cryptosystem
Designs, Codes and Cryptography
Analysis of the Xedni Calculus Attack
Designs, Codes and Cryptography
IEEE Transactions on Computers
How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves
Designs, Codes and Cryptography
New Parallel Architecture for Modular Multiplication and Squaring Based on Cellular Automata
PARA '02 Proceedings of the 6th International Conference on Applied Parallel Computing Advanced Scientific Computing
Mastrovito Multiplier for General Irreducible Polynomials
AAECC-13 Proceedings of the 13th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Curves with Many Points and Their Applications
AAECC-13 Proceedings of the 13th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Generalised Cycling Attacks on RSA and Strong RSA Primes
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Fail-Stop Threshold Signature Schemes Based on Elliptic Curves
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Isomorphism Classes of Hyperelliptic Curves of Genus 2 over Fq
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Generalization of Elliptic Curve Digital Signature Schemes
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Elliptic Curves and Resilient Functions
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Improved Algorithms for Elliptic Curve Arithmetic in GF(2n)
SAC '98 Proceedings of the Selected Areas in Cryptography
Storage-Efficient Finite Field Basis Conversion
SAC '98 Proceedings of the Selected Areas in Cryptography
Elliptic Curve Pseudorandom Sequence Generators
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
An Improved Implementation of Elliptic Curves over GF(2) when Using Projective Point Arithmetic
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Some Parallel Algorithms for Integer Factorisation
Euro-Par '99 Proceedings of the 5th International Euro-Par Conference on Parallel Processing
Efficient Power-Sum Systolic Architectures for Public-Key Cryptosystems in GF(2m)
COCOON '02 Proceedings of the 8th Annual International Conference on Computing and Combinatorics
Differential Fault Attacks on Elliptic Curve Cryptosystems
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Algorithms
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Design of Elliptic Curves with Controllable Lower Boundary of Extension Degree for Reduction Attacks
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
Finding Secure Curves with the Satoh-FGH Algorithm and an Early-Abort Strategy
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Efficient Implementation of Schoof's Algorithm
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Self-Blindable Credential Certificates from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Computation of Discrete Logarithms in F2607
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Infranet: Circumventing Web Censorship and Surveillance
Proceedings of the 11th USENIX Security Symposium
Informatics - 10 Years Back. 10 Years Ahead.
Elliptic Curve Public-Key Cryptosystems - An Introduction
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Cryptographic Primitives for Information Authentication - State of the Art
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Efficient Implementation of Elliptic Curve Cryptosystems on an ARM7 with Hardware Accelerator
ISC '01 Proceedings of the 4th International Conference on Information Security
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
An Identity-Based Signature from Gap Diffie-Hellman Groups
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Validation of Elliptic Curve Public Keys
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Fast Elliptic Curve Point Counting Using Gaussian Normal Basis
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
A Scalable Architecture for Montgomery Multiplication
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
A Scalable and Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m)
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
Protections against Differential Analysis for Elliptic Curve Cryptography
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m)
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
New Algorithm for Classical Modular Inverse
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2n)
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
The GH Public-Key Cryptosystem
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Fast Key Exchange with Elliptic Curve Systems
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Postal Revenue Collection in the Digital Age
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2m) on an FPGA
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
Achieving NTRU with Montgomery Multiplication
IEEE Transactions on Computers
RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis
IEEE Transactions on Computers
Computer Standards & Interfaces
A Super-Serial Galois Fields Multiplier for FPGAs and its Application to Public-Key Algorithms
FCCM '99 Proceedings of the Seventh Annual IEEE Symposium on Field-Programmable Custom Computing Machines
FPGA Implementation of a Microcoded Elliptic Curve Cryptographic Processor
FCCM '00 Proceedings of the 2000 IEEE Symposium on Field-Programmable Custom Computing Machines
Hardware architectures for public key cryptography
Integration, the VLSI Journal
Efficient revocation and threshold pairing based cryptosystems
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Payment technologies for E-commerce
Computer algebra handbook
A Scalable Architecture for Modular Multiplication Based on Montgomery's Algorithm
IEEE Transactions on Computers
Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure
ACM Transactions on Information and System Security (TISSEC)
An FPGA implementation of an elliptic curve processor GF(2m)
Proceedings of the 14th ACM Great Lakes symposium on VLSI
On the complexity of the discrete logarithm and Diffie-Hellman problems
Journal of Complexity - Special issue on coding and cryptography
FPGA based hardware acceleration for elliptic curve public key cryptosystems
Journal of Systems and Software - Special issue: Rapid system prototyping
Security in embedded systems: Design challenges
ACM Transactions on Embedded Computing Systems (TECS)
A workload characterization of elliptic curve cryptography methods in embedded environments
MEDEA '03 Proceedings of the 2003 workshop on MEmory performance: DEaling with Applications , systems and architecture
Efficient Implementation of Elliptic Curve Cryptography (ECC) for Personal Digital Assistants (PDAs)
Wireless Personal Communications: An International Journal
Left-to-Right Optimal Signed-Binary Representation of a Pair of Integers
IEEE Transactions on Computers
A Novel Unified Architecture for Public-Key Cryptography
Proceedings of the conference on Design, Automation and Test in Europe - Volume 3
Generic Groups, Collision Resistance, and ECDSA
Designs, Codes and Cryptography
Elliptic curve cryptography: Java implementation
Proceedings of the 1st annual conference on Information security curriculum development
Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults
Designs, Codes and Cryptography
Subtraction-free almost montgomery inverse algorithm
Information Processing Letters
A Carry-Free Architecture for Montgomery Inversion
IEEE Transactions on Computers
Generating More MNT Elliptic Curves
Designs, Codes and Cryptography
Partial known plaintext attack on Koyama scheme
Information Processing Letters
Efficient pre-processing for large window-based modular exponentiation using genetic algorithms
IEA/AIE'2003 Proceedings of the 16th international conference on Developments in applied artificial intelligence
Location privacy in wireless personal area networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Hardware acceleration of the Tate pairing on a genus 2 hyperelliptic curve
Journal of Systems Architecture: the EUROMICRO Journal
Versatile hardware architectures for GF(pm) arithmetic in public key cryptography
Integration, the VLSI Journal - Special issue: Embedded cryptographic hardware
LFSR multipliers over GF(2m) defined by all-one polynomial
Integration, the VLSI Journal
Journal of VLSI Signal Processing Systems
Elliptic curve DSA (ECSDA): an enhanced DSA
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Isogeny cordillera algorithm to obtain cryptographically good elliptic curves
ACSW '07 Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
An efficient CSA architecture for montgomery modular multiplication
Microprocessors & Microsystems
A unified and reconfigurable Montgomery Multiplier architecture without four-to-two CSA
Proceedings of the 20th annual conference on Integrated circuits and systems design
A Novel Architecture for Galois Fields GF(2^m) Multipliers Based on Mastrovito Scheme
IEEE Transactions on Computers
New and improved architectures for Montgomery modular multiplication
Mobile Networks and Applications
Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings
Computers and Electrical Engineering
Load-balanced key establishment methodologies in wireless sensor networks
International Journal of Security and Networks
New schemes for sharing points on an elliptic curve
Computers & Mathematics with Applications
Collision Search for Elliptic Curve Discrete Logarithm over GF(2m) with FPGA
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Semi-systolic Modular Multiplier over GF(2m)
ICCSA '08 Proceedings of the international conference on Computational Science and Its Applications, Part II
Cryptography Adapted to the New European Area of Higher Education
ICCS '08 Proceedings of the 8th international conference on Computational Science, Part II
Interpolation of the Double Discrete Logarithm
WAIFI '08 Proceedings of the 2nd international workshop on Arithmetic of Finite Fields
On the Connection between Kloosterman Sums and Elliptic Curves
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
Optimization Algorithm for Scalar Multiplication in the Elliptic Curve Cryptography over Prime Field
ICIC '08 Proceedings of the 4th international conference on Intelligent Computing: Advanced Intelligent Computing Theories and Applications - with Aspects of Theoretical and Methodological Issues
Elliptic curve based hardware architecture using cellular automata
Mathematics and Computers in Simulation
New stream ciphers based on elliptic curve point multiplication
Computer Communications
Implementation and analysis of stream ciphers based on the elliptic curves
Computers and Electrical Engineering
On the application of pairing based cryptography to wireless sensor networks
Proceedings of the second ACM conference on Wireless network security
The Diffie---Hellman problem and generalization of Verheul's theorem
Designs, Codes and Cryptography
Fast Hashing to G2 on Pairing-Friendly Curves
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
An efficient authentication scheme for access control in mobile pay-TV systems
IEEE Transactions on Multimedia
Secure hierarchical data aggregation in wireless sensor networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
International Journal of Security and Networks
On Cryptographic Schemes Based on Discrete Logarithms and Factoring
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Partial known plaintext attack on Koyama scheme
Information Processing Letters
Subtraction-free Almost Montgomery Inverse algorithm
Information Processing Letters
A public key cryptosystem based on elliptic curves over Z/nZ equivalent to factoring
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Fast arithmetic architectures for public-key algorithms over Galois fields GF((2n)m)
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Finding good random elliptic curves for cryptosystems defined over IF2n
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Counting the number of points on elliptic curves over finite fields: strategies and performances
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Fast RSA-type schemes based on singular cubic curves y2 + axy ≡ x3 (mod n)
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Comparing the MOV and FR reductions in elliptic curve cryptography
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
A compact and fast division architecture for a finite field GF(2m)
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartI
Time-space efficient exponentiation over GF(2m)
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartI
Computational algorithm and architecture for AB2 multiplication in finite fields
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartI
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Fast exponentiaion over GF(2m) based on cellular automata
ICCS'03 Proceedings of the 2003 international conference on Computational science: PartII
New Frobenius expansions for elliptic curves with efficient endomorphisms
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Efficient computations of the Tate pairing for the large MOV degrees
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
A WTLS handshake protocol with user anonymity and forward secrecy
CIC'02 Proceedings of the 7th CDMA international conference on Mobile communications
Encapsulated scalar multiplications and line functions in the computation of Tate pairing
TAMC'07 Proceedings of the 4th international conference on Theory and applications of models of computation
Improving e-payment security using Elliptic Curve Cryptosystem
Electronic Commerce Research
A result on the distribution of quadratic residues with applications to elliptic curve cryptography
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
An efficient key establishment scheme for self-organizing sensor networks
ICDCN'08 Proceedings of the 9th international conference on Distributed computing and networking
An analysis of the vector decomposition problem
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
IITA'09 Proceedings of the 3rd international conference on Intelligent information technology application
Finite field arithmetic for cryptography
IEEE Circuits and Systems Magazine
Certificateless authenticated group key agreement protocol for unbalanced wireless mobile networks
WSEAS TRANSACTIONS on COMMUNICATIONS
FPGA based implementation of parallel ECC processor
Proceedings of the 2011 International Conference on Communication, Computing & Security
ISPACT'10 Proceedings of the 9th WSEAS international conference on Advances in e-activities, information security and privacy
ICCOM'06 Proceedings of the 10th WSEAS international conference on Communications
Managed Ecosystems of Networked Objects
Wireless Personal Communications: An International Journal
Shor's discrete logarithm quantum algorithm for elliptic curves
Quantum Information & Computation
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Public communication based on russian cards protocol: a case study
COCOA'11 Proceedings of the 5th international conference on Combinatorial optimization and applications
Extending scalar multiplication using double bases
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Efficient short signcryption scheme with public verifiability
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Improved pairing protocol for bluetooth
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
An optimizing authenticated key exchange protocol for self-organizing sensor networks
UCS'06 Proceedings of the Third international conference on Ubiquitous Computing Systems
An analysis of double base number systems and a sublinear scalar multiplication algorithm
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
SPA-resistant simultaneous scalar multiplication
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
A novel arithmetic unit over GF(2m) for low cost cryptographic applications
HPCC'05 Proceedings of the First international conference on High Performance Computing and Communications
Implementing cryptographic pairings on smartcards
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Efficient tate pairing computation for elliptic curves over binary fields
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
A complete divisor class halving algorithm for hyperelliptic curve cryptosystems of genus two
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Cellular automata architecture for elliptic curve cryptographic hardware
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part III
Modular divider for elliptic curve cryptographic hardware based on programmable CA
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part IV
Faster pairings using an elliptic curve with an efficient endomorphism
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
A remark on implementing the weil pairing
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Low complexity systolic architecture for modular multiplication over GF(2m)
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part I
Hardware for modular exponentiation suitable for smart cards
ICESS'04 Proceedings of the First international conference on Embedded Software and Systems
A novel hierarchical key management scheme based on quadratic residues
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
Evolutionary hardware architecture for division in elliptic curve cryptosystems over GF(2n)
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part III
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
A provably secure elliptic curve scheme with fast encryption
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Efficient computation of tate pairing in projective coordinate over general characteristic fields
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
VLSI performance evaluation and analysis of systolic and semisystolic finite field multipliers
ACSAC'05 Proceedings of the 10th Asia-Pacific conference on Advances in Computer Systems Architecture
Side channel attacks and countermeasures on pairing based cryptosystems over binary fields
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Secure delegation of elliptic-curve pairing
CARDIS'10 Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application
Pairing-Based cryptography at high security levels
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Efficient countermeasures for thwarting the SCA attacks on the frobenius based methods
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Preserving query privacy in urban sensing systems
ICDCN'12 Proceedings of the 13th international conference on Distributed Computing and Networking
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
Editorial: A decade of Finite Fields and Their Applications
Finite Fields and Their Applications
Implementing cryptographic pairings
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Electronic payment scheme using identity-based cryptography
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Key establishment scheme for sensor networks with low communication cost
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Securing pairing-based cryptography on smartcards
International Journal of Information and Computer Security
Limitations of generating a secret key using wireless fading under active adversary
IEEE/ACM Transactions on Networking (TON)
On divisibility of exponential sums of polynomials of special type over fields of characteristic 2
Designs, Codes and Cryptography
Low-Cost countermeasure against RPA
CARDIS'12 Proceedings of the 11th international conference on Smart Card Research and Advanced Applications
Improved migration for mobile computing in distributed networks
Computer Standards & Interfaces
Hi-index | 0.03 |