Author of the publication

Generating Prime Order Elliptic Curves: Difficulties and Efficiency Considerations.

, , , and . ICISC, volume 3506 of Lecture Notes in Computer Science, page 261-278. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Some remarks on the construction of class polynomials., and . Adv. Math. Commun., 5 (1): 109-118 (2011)Efficient Certification Path Discovery for MANET., , , , and . EURASIP J. Wireless Comm. and Networking, (2010)TNFS resistant families of pairing-friendly elliptic curves., and . Theor. Comput. Sci., (2019)Binary tree based public-key management for Mobile Ad Hoc Networks., , and . ISWCS, page 687-692. IEEE, (2008)"Trust Engineering: " From Requirements to System Design and Maintenance - A Working National Lottery System Experience., , , , and . ISC, volume 3650 of Lecture Notes in Computer Science, page 44-58. Springer, (2005)On the Construction of Prime Order Elliptic Curves., , and . INDOCRYPT, volume 2904 of Lecture Notes in Computer Science, page 309-322. Springer, (2003)A framework for identity privacy in SIP., , , and . J. Netw. Comput. Appl., 33 (1): 16-28 (2010)What is your "birthday elliptic curve"?, , , and . Finite Fields Their Appl., 18 (6): 1232-1241 (2012)On the Efficient Generation of Prime-Order Elliptic Curves., , , and . J. Cryptol., 23 (3): 477-503 (2010)Efficient cluster-based group key agreement protocols for wireless ad hoc networks.. J. Netw. Comput. Appl., 34 (1): 384-393 (2011)