Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient and high-speed VLSI implementation of optimal normal basis multiplication over GF(2m)., , and . Integr., (2016)The Quadratic Extension Extractor for (Hyper)Elliptic Curves in Odd Characteristic., and . WAIFI, volume 4547 of Lecture Notes in Computer Science, page 219-236. Springer, (2007)Hashing into Hessian Curves.. AFRICACRYPT, volume 6737 of Lecture Notes in Computer Science, page 278-289. Springer, (2011)Differential Addition on Twisted Edwards Curves., and . ACISP (2), volume 10343 of Lecture Notes in Computer Science, page 366-378. Springer, (2017)Injective Encodings to Binary Ordinary Elliptic Curves., , and . SAC, volume 11349 of Lecture Notes in Computer Science, page 434-449. Springer, (2018)Binary Edwards Curves., , and . CHES, volume 5154 of Lecture Notes in Computer Science, page 244-265. Springer, (2008)Efficient Pseudorandom Generators Based on the DDH Assumption., , and . Public Key Cryptography, volume 4450 of Lecture Notes in Computer Science, page 426-441. Springer, (2007)Isomorphism classes of Edwards curves over finite fields., , and . IACR Cryptology ePrint Archive, (2011)Efficient Arithmetic on Hessian Curves over Fields of Characteristic Three., , and . IACR Cryptology ePrint Archive, (2012)Full-custom hardware implementation of point multiplication on binary Edwards curves for application-specific integrated circuit elliptic curve cryptosystem applications., , and . IET Circuits Devices Syst., 11 (6): 568-578 (2017)