Author of the publication

Efficient Scalar Multiplication on Koblitz Curves with Pre-computation.

, , and . ISC, volume 13640 of Lecture Notes in Computer Science, page 162-172. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ferrograph Analysis With Improved Particle Segmentation and Classification Methods., , , and . J. Comput. Inf. Sci. Eng., (2020)A New Measure for Determining the Equivalent Symmetry of Decomposed Subsystems from Large Complex Cyber-Physical Systems., , , and . Symmetry, 15 (1): 37 (2023)Speech Enhancement Model Synthesis Based on Federal Learning for Industrial CPS in Multiple Noise Conditions., , , and . Symmetry, 14 (11): 2285 (2022)Intrusion detection algorithom based on transfer extreme learning machine., , and . Intell. Data Anal., 27 (2): 463-482 (2023)Hashing into Generalized Huff Curves., , and . Inscrypt, volume 9589 of Lecture Notes in Computer Science, page 22-44. Springer, (2015)Implementation of Multi-continued Fraction Algorithm and Application to Multi-sequence Linear Synthesis., , and . SETA, volume 4086 of Lecture Notes in Computer Science, page 248-258. Springer, (2006)Mutual prediction learning and mixed viewpoints for unsupervised-domain adaptation person re-identification on blockchain., , , , and . Simul. Model. Pract. Theory, (2022)Verifiable Decryption for Fully Homomorphic Encryption., and . ISC, volume 11060 of Lecture Notes in Computer Science, page 347-365. Springer, (2018)Fully homomorphic encryption based on the ring learning with rounding problem., , , and . IET Inf. Secur., 13 (6): 639-648 (2019)A Robust Space Target Detection Algorithm Based on Target Characteristics., , , , , and . IEEE Geosci. Remote. Sens. Lett., (2022)