The parallelized Pollard kangaroo method in real Quadratic function fields
Mathematics of Computation
Constructing hyperelliptic curves of genus 2 suitable for cryptography
Mathematics of Computation
Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Computing Zeta Functions of Hyperelliptic Curves over Finite Fields of Characteristic 2
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
An Extension of Kedlaya's Point-Counting Algorithm to Superelliptic Curves
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
An Extension of Kedlaya's Algorithm to Artin-Schreier Curves in Characteristic 2
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
On p-adic Point Counting Algorithms for Elliptic Curves over Finite Fields
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Two Topics in Hyperelliptic Cryptography
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Computing zeta functions for ordinary formal groups over finite fields
Discrete Applied Mathematics - Special issue on the 2000 com2MaC workshop on cryptography
On counting and generating curves over small finite fields
Journal of Complexity - Special issue on coding and cryptography
Elliptic and hyperelliptic curves on embedded μP
ACM Transactions on Embedded Computing Systems (TECS)
IEEE Transactions on Computers
A new scalar multiplication method suitable for hyperelliptic curve cryptosystems
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3
Fast computation of special resultants
Journal of Symbolic Computation
Towards minimizing memory requirement for implementation of hyperelliptic curve cryptosystems
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
A complete divisor class halving algorithm for hyperelliptic curve cryptosystems of genus two
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Abelian varieties and cryptography
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Efficient doubling on genus 3 curves over binary fields
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Hyperelliptic curve coprocessors on a FPGA
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Genus 2 point counting over prime fields
Journal of Symbolic Computation
Using equivalence classes to accelerate solving the discrete logarithm problem in a short interval
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
A general methodology for pipelining the point multiplication operation in curve based cryptography
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Group law computations on jacobians of hyperelliptic curves
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
Explicit bounds of polynomial coefficients and counting points on Picard curves over finite fields
Mathematical and Computer Modelling: An International Journal
Generating pairing-friendly parameters for the CM construction of genus 2 curves over prime fields
Designs, Codes and Cryptography
Hi-index | 0.00 |