Transformation-free proxy cryptosystems and their applications to electronic commerce
InfoSecu '04 Proceedings of the 3rd international conference on Information security
An Identity Based Encryption system
Proceedings of the 3rd international symposium on Principles and practice of programming in Java
New infinite families of 3-designs from algebraic curves over Fq
European Journal of Combinatorics
Versatile multiplier architectures in GF(2k) fields using the Montgomery multiplication algorithm
Integration, the VLSI Journal
A Tree-Based Approach for Computing Double-Base Chains
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Double-Base Number System for Multi-scalar Multiplications
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Optimal Randomness Extraction from a Diffie-Hellman Element
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Efficient message authentication protocol for WSN
WSEAS Transactions on Computers
ShortPK: A short-term public key scheme for broadcast authentication in sensor networks
ACM Transactions on Sensor Networks (TOSN)
Efficient arithmetic on subfield elliptic curves over small finite fields of odd characteristic
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Efficient architectures for elliptic curve cryptography processors for RFID
ICCD'09 Proceedings of the 2009 IEEE international conference on Computer design
Elliptic Gauss sums and applications to point counting
Journal of Symbolic Computation
Algorithms and theory of computation handbook
On the elliptic curves y2=x3-c with embedding degree one
Journal of Computational and Applied Mathematics
ID-Based series-parallel multisignature schemes for multi-messages from bilinear maps
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
Twisted jacobi intersections curves
TAMC'10 Proceedings of the 7th annual conference on Theory and Applications of Models of Computation
ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (i)
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps
Wireless Personal Communications: An International Journal
Efficient arithmetic on hessian curves
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
Improved multi-server authentication protocol
Security and Communication Networks
Algebraic curves and cryptography
Finite Fields and Their Applications
Editorial: A decade of Finite Fields and Their Applications
Finite Fields and Their Applications
Twisted Jacobi intersections curves
Theoretical Computer Science
An overview of trace based public key cryptography over finite fields
Journal of Computational and Applied Mathematics
Hi-index | 0.00 |