Author of the publication

Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance.

, and . ACISP, volume 1841 of Lecture Notes in Computer Science, page 59-73. Springer, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Comprehensive Security Analysis Checksheet for OpenFlow Networks., , , , , , and . BWCCA, volume 2 of Lecture Notes on Data Engineering and Communications Technologies, page 231-242. Springer, (2016)Image Splicing Verification Based on Pixel-Based Alignment Method., , and . IWDW, volume 7809 of Lecture Notes in Computer Science, page 198-212. Springer, (2012)A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy and Centroid Difference of Bit-Plane., , and . IWDW, volume 6526 of Lecture Notes in Computer Science, page 29-44. Springer, (2010)Securing Sensor Networks by Moderating Frequencies., , , and . SecureComm (2), volume 153 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 173-185. Springer, (2014)Detection of Privacy Sensitive Information Retrieval Using API Call Logging Mechanism within Android Framework., , , , and . J. Networks, 9 (11): 2905-2913 (2014)Analysis of Program Obfuscation Schemes with Variable Encoding Technique., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 91-A (1): 316-329 (2008)A new security middleware architecture based on fog computing and cloud to support IoT constrained devices., , and . IML, page 35:1-35:8. ACM, (2017)Proposal of multi-value cell structure for high-density two-dimensional codes and evaluation of readability using smartphones., and . NTMS, page 1-5. IEEE, (2015)How to sign multiple versions of digital documents., and . IWBIS, page 133-136. IEEE, (2017)Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters., , , , , and . ICITS, volume 10015 of Lecture Notes in Computer Science, page 3-23. (2016)