Author of the publication

Fast Elliptic Curve Point Counting Using Gaussian Normal Basis.

, , , , , and . ANTS, volume 2369 of Lecture Notes in Computer Science, page 292-307. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Forward Secure Signature Scheme., , and . IACR Cryptology ePrint Archive, (2004)Adaptive Preimage Resistance and Permutation-based Hash Functions., and . IACR Cryptology ePrint Archive, (2009)Cryptanalysis of Some Group-Oriented Proxy Signature Schemes., , and . WISA, volume 3786 of Lecture Notes in Computer Science, page 10-24. Springer, (2005)Security Analysis of the Certificateless Signature Scheme Proposed at SecUbiq 2006., and . EUC Workshops, volume 4809 of Lecture Notes in Computer Science, page 686-691. Springer, (2007)Comments on "Certificateless Short Aggregate Signature Scheme for Mobile Devices"., and . IEEE Access, (2024)Improved Impossible Differential Attacks on Large-Block Rijndael., , , , and . ISC, volume 5222 of Lecture Notes in Computer Science, page 298-315. Springer, (2008)Fast Elliptic Curve Point Counting Using Gaussian Normal Basis., , , , , and . ANTS, volume 2369 of Lecture Notes in Computer Science, page 292-307. Springer, (2002)Security of Lu et al.'s proxy-protected signature scheme., and . Appl. Math. Comput., 169 (2): 1010-1015 (2005)Efficient and Secure Authenticated Key Exchange Protocols in the eCK Model., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (1): 129-138 (2011)Complexity of the generalized conjugacy problem., , and . Discret. Appl. Math., 130 (1): 33-36 (2003)