A Cyclic Window Algorithm for ECC Defined over Extension Fields
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Fast Simultaneous Scalar Multiplication on Elliptic Curve with Montgomery Form
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Efficient Implementation of Elliptic Curve Cryptosystems on an ARM7 with Hardware Accelerator
ISC '01 Proceedings of the 4th International Conference on Information Security
A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks
ISC '02 Proceedings of the 5th International Conference on Information Security
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Fast Implementation of Elliptic Curve Defined over GF(pm) on CalmRISC with MAC2424 Coprocessor
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Hardware acceleration of the Tate pairing on a genus 2 hyperelliptic curve
Journal of Systems Architecture: the EUROMICRO Journal
Highly Regular Right-to-Left Algorithms for Scalar Multiplication
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist SPA
Information Security and Cryptology
Novel Precomputation Schemes for Elliptic Curve Cryptosystems
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
An alternative class of irreducible polynomials for optimal extension fields
Designs, Codes and Cryptography
Faster explicit formulas for computing pairings over ordinary curves
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
Memory-constrained implementations of elliptic curve cryptography in co-Z coordinate representation
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
A reconfigurable implementation of the tate pairing computation over GF(2m)*
ARC'10 Proceedings of the 6th international conference on Reconfigurable Computing: architectures, Tools and Applications
Efficient hardware implementation of elliptic curve cryptography over GF(pm)
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Implementing cryptographic pairings
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
On efficient pairings on elliptic curves over extension fields
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
Hi-index | 0.00 |