Author of the publication

Speeding Up Ate Pairing Computation in Affine Coordinates.

, and . ICISC, volume 7839 of Lecture Notes in Computer Science, page 262-277. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy-efficient and scalable group key agreement for large ad hoc networks., and . PE-WASUN, page 114-121. ACM, (2005)Signcryption Scheme in Multi-user Setting without Random Oracles.. IWSEC, volume 5312 of Lecture Notes in Computer Science, page 64-82. Springer, (2008)SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks., , , , , , and . AFRICACRYPT, volume 7374 of Lecture Notes in Computer Science, page 270-286. Springer, (2012)Key Recovery Attack on Rank Quasi-Cyclic Code-based Signature Scheme., and . CoRR, (2019)Certificateless Authenticated Two-Party Key Agreement Protocols., and . ASIAN, volume 4435 of Lecture Notes in Computer Science, page 37-44. Springer, (2006)Authenticated Group Key Agreement Against DoS in Heterogeneous Wireless Networks., , and . WCNC, page 3563-3568. IEEE, (2007)A note on the algebraic immunity of the Maiorana-McFarland class of bent functions., and . Inf. Process. Lett., 112 (22): 869-871 (2012)Analysis of improved signcryption scheme with key privacy.. Inf. Process. Lett., 99 (4): 135-138 (2006)Analysis and Enhancement of Random Number Generator in FPGA Based on Oscillator Rings., and . Int. J. Reconfigurable Comput., (2009)Denial-of-service attack resilience dynamic group key agreement for heterogeneous networks., , and . Telecommun. Syst., 35 (3-4): 141-160 (2007)