Author of the publication

Efficient Finite Field Basis Conversion Involving Dual Bases.

, and . CHES, volume 1717 of Lecture Notes in Computer Science, page 135-143. Springer, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enrich-by-Need Protocol Analysis for Diffie-Hellman., , , , and . Foundations of Security, Protocols, and Equational Reasoning, volume 11565 of Lecture Notes in Computer Science, page 135-155. Springer, (2019)Amortized E-Cash., and . Financial Cryptography, volume 2339 of Lecture Notes in Computer Science, page 1-20. Springer, (2001)Fermat Primality Test.. Encyclopedia of Cryptography and Security, Springer, (2005)Time-Bounded Task-PIOAs: A Framework for Analyzing Security Protocols., , , , , , и . DISC, том 4167 из Lecture Notes in Computer Science, стр. 238-253. Springer, (2006)Formal Support for Standardizing Protocols with State., , , и . SSR, том 9497 из Lecture Notes in Computer Science, стр. 246-265. Springer, (2015)Plaintext Awareness via Key Registration., , и . CRYPTO, том 2729 из Lecture Notes in Computer Science, стр. 548-564. Springer, (2003)Mobile proactive secret sharing., , и . PODC, стр. 458. ACM, (2008)Modeling Diffie-Hellman Derivability for Automated Analysis., и . CSF, стр. 232-243. IEEE Computer Society, (2014)Mutually Independent Commitments., , , , и . ASIACRYPT, том 2248 из Lecture Notes in Computer Science, стр. 385-401. Springer, (2001)MPSS: Mobile Proactive Secret Sharing., , и . ACM Trans. Inf. Syst. Secur., 13 (4): 34:1-34:32 (2010)