A family of Jacobians suitable for discrete log cryptosystems
CRYPTO '88 Proceedings on Advances in cryptology
Efficient Multiplier Architectures for Galois Fields GF(24n)
IEEE Transactions on Computers
Fast Arithmetic for Public-Key Algorithms in Galois Fields with Composite Exponents
IEEE Transactions on Computers
Information Security, Mathematics, and Public-Key Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
The State of Elliptic Curve Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Cryptography in Quadratic Function Fields
Designs, Codes and Cryptography
Computing discrete logarithms in high-genus hyperelliptic Jacobians in provably subexponential time
Mathematics of Computation
Explict bounds and heuristics on class numbers in hyperelliptic function fields
Mathematics of Computation
Designs, Codes and Cryptography
Itoh-Tsujii Inversion in Standard Basis and Its Application in Cryptography and Codes
Designs, Codes and Cryptography
Constructing hyperelliptic curves of genus 2 suitable for cryptography
Mathematics of Computation
New Public-Key Cryptosystem Using Divisor Class Groups
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Isomorphism Classes of Hyperelliptic Curves of Genus 2 over Fq
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Speeding up the Arithmetic on Koblitz Curves of Genus Two
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
Computing Zeta Functions of Hyperelliptic Curves over Finite Fields of Characteristic 2
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Constructing Elliptic Curve Cryptosystems in Characteristic 2
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Efficient Multiplication on Certain Nonsupersingular Elliptic Curves
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
How Secure Are Elliptic Curves over Composite Extension Fields?
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Speeding up the Scalar Multiplication in the Jacobians of Hyperelliptic Curves Using Frobenius Map
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2n
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Supersingular Curves in Cryptography
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Computation of Discrete Logarithms in F2607
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
An Extension of Kedlaya's Point-Counting Algorithm to Superelliptic Curves
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Computational Aspects of NUCOMP
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
An Extension of Kedlaya's Algorithm to Artin-Schreier Curves in Characteristic 2
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Genus Two Hyperelliptic Curve Coprocessor
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Two Topics in Hyperelliptic Cryptography
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Selection of secure hyperelliptic curves of g = 2 based on a subfield
Journal of Computer Science and Technology
A Super-Serial Galois Fields Multiplier for FPGAs and its Application to Public-Key Algorithms
FCCM '99 Proceedings of the Seventh Annual IEEE Symposium on Field-Programmable Custom Computing Machines
Discrete Applied Mathematics - Special issue: International workshop on coding and cryptography (WCC 2001)
An addition algorithm in Jacobian of Cab curves
Discrete Applied Mathematics - Special issue on the 2000 com2MaC workshop on cryptography
Computing zeta functions of Artin-Schreier curves over finite fields II
Journal of Complexity - Special issue on coding and cryptography
Elliptic and hyperelliptic curves on embedded μP
ACM Transactions on Embedded Computing Systems (TECS)
IEEE Transactions on Computers
Efficient pairing computation on supersingular Abelian varieties
Designs, Codes and Cryptography
Double Point Compression with Applications to Speeding Up Random Point Multiplication
IEEE Transactions on Computers
European Journal of Combinatorics
A new cryptography algorithm using cab curves an LDPC for wireless communication systems
MATH'06 Proceedings of the 10th WSEAS International Conference on APPLIED MATHEMATICS
Explicit Formulas for Real Hyperelliptic Curves of Genus 2 in Affine Representation
WAIFI '07 Proceedings of the 1st international workshop on Arithmetic of Finite Fields
Extractors for Jacobians of Binary Genus-2 Hyperelliptic Curves
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Generators for the l-Torsion Subgroup of Jacobians of Genus Two Curves
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Improving secure long-term archival of digitally signed documents
Proceedings of the 4th ACM international workshop on Storage security and survivability
Skew-Frobenius Maps on Hyperelliptic Curves
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Distributed signcryption scheme on hyperelliptic curve
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
A new scalar multiplication method suitable for hyperelliptic curve cryptosystems
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3
Fast arithmetic architectures for public-key algorithms over Galois fields GF((2n)m)
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
On the complexity of hyperelliptic discrete logarithm problem
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
How intractable is the discrete logarithm for a general finite group?
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
On the performance of hyperelliptic cryptosystems
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
An algorithm for solving the discrete log problem on hyperelliptic curves
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Delaying and merging operations in scalar multiplication: applications to curve-based cryptosystems
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Towards minimizing memory requirement for implementation of hyperelliptic curve cryptosystems
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Public-key cryptosystems based on class semigroups of imaginary quadratic non-maximal orders
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Hardware performance characterization of block cipher structures
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Extractors for Jacobian of hyperelliptic curves of genus 2 in odd characteristic
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
Compiler assisted elliptic curve cryptography
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
On rationality of the intersection points of a line with a plane quartic
WAIFI'10 Proceedings of the Third international conference on Arithmetic of finite fields
Faster pairing computation on genus 2 hyperelliptic curves
Information Processing Letters
A new public key cryptography algorithm using chaotic systems and hyperelliptic curves
ICS'06 Proceedings of the 10th WSEAS international conference on Systems
On the distribution of the coefficients of normal forms for Frobenius expansions
Designs, Codes and Cryptography
On randomness extraction in elliptic curves
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
A note on the signed sliding window integer recoding and a left-to-right analogue
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Efficient doubling on genus two curves over binary fields
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Extended double-base number system with applications to elliptic curve cryptography
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
A complete divisor class halving algorithm for hyperelliptic curve cryptosystems of genus two
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Efficient doubling on genus 3 curves over binary fields
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Arithmetic of generalized jacobians
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
Fast bilinear maps from the tate-lichtenbaum pairing on hyperelliptic curves
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
Evolution of hyperelliptic curve cryptosystems
ICDCIT'10 Proceedings of the 6th international conference on Distributed Computing and Internet Technology
Novel efficient implementations of hyperelliptic curve cryptosystems using degenerate divisors
WISA'04 Proceedings of the 5th international conference on Information Security Applications
New families of hyperelliptic curves with efficient gallant-lambert-vanstone method
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Some improved algorithms for hyperelliptic curve cryptosystems using degenerate divisors
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
A general methodology for pipelining the point multiplication operation in curve based cryptography
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Correspondences on hyperelliptic curves and applications to the discrete logarithm
SIIS'11 Proceedings of the 2011 international conference on Security and Intelligent Information Systems
Group law computations on jacobians of hyperelliptic curves
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
Counting points on Cab curves using Monsky--Washnitzer cohomology
Finite Fields and Their Applications
Isomorphism classes of hyperelliptic curves of genus 3 over finite fields
Finite Fields and Their Applications
Hyperelliptic curves of genus three over finite fields of even characteristic
Finite Fields and Their Applications
Isomorphism classes of elliptic and hyperelliptic curves over finite fields F(2g+1)n
Finite Fields and Their Applications
On Supersingular Abelian Varieties of Dimension Two over Finite Fields
Finite Fields and Their Applications
Finite Fields and Their Applications
Algebraic curves and cryptography
Finite Fields and Their Applications
International Journal of Applied Cryptography
Zero-value point attacks on kummer-based cryptosystem
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
Hi-index | 0.01 |