SIMATH—a computer algebra system for number theoretic applications
ISSAC '97 Proceedings of the 1997 international symposium on Symbolic and algebraic computation
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
The State of Elliptic Curve Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Efficient Construction of Cryptographically Strong Elliptic Curves
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Efficient Implementation of Schoof's Algorithm
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Efficient Computation of Singular Moduli with Application in Cryptography
FCT '01 Proceedings of the 13th International Symposium on Fundamentals of Computation Theory
Generating Elliptic Curves of Prime Order
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
Fast Key Exchange with Elliptic Curve Systems
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Computer algebra handbook
Finding good random elliptic curves for cryptosystems defined over IF2n
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Counting the number of points on elliptic curves over finite fields: strategies and performances
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Ramanujan's class invariants and their use in elliptic curve cryptography
Computers & Mathematics with Applications
Constructing elliptic curves with prescribed embedding degrees
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
Elliptic curve for data protection
Proceedings of the 2011 Information Security Curriculum Development Conference
Spreading alerts quietly and the subgroup escape problem
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Generating prime order elliptic curves: difficulties and efficiency considerations
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Pairing-Friendly elliptic curves of prime order
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Hi-index | 0.00 |