Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lambda Coordinates for Binary Elliptic Curves., , , and . CHES, volume 8086 of Lecture Notes in Computer Science, page 311-330. Springer, (2013)The Montgomery ladder on binary elliptic curves., , and . J. Cryptogr. Eng., 8 (3): 241-258 (2018)Block Cipher Modes of Operation from a Hardware Implementation Perspective., and . Cryptographic Engineering, Springer, (2009)Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields., , , , , , and . IACR Cryptology ePrint Archive, (2016)High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves., , , , , and . Pairing, volume 6487 of Lecture Notes in Computer Science, page 21-39. Springer, (2010)A reconfigurable processor for high speed point multiplication in elliptic curves., , and . Int. J. Embed. Syst., 1 (3/4): 237-249 (2005)Extended supersingular isogeny Diffie-Hellman key exchange protocol: Revenge of the SIDH., , and . IET Inf. Secur., 15 (5): 364-374 (2021)On Instantiating Pairing-Based Protocols with Elliptic Curves of Embedding Degree One., , and . IEEE Trans. Computers, 66 (6): 1061-1070 (2017)A Pairing-Based Blind Signature E-Voting Scheme., , and . Comput. J., 57 (10): 1460-1471 (2014)A Fast Implementation of Multiplicative Inversion Over GF(2m)., , and . ITCC (1), page 574-579. IEEE Computer Society, (2005)