Author of the publication

The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves.

, , , and . Int. J. Inf. Sec., 3 (2): 86-98 (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Password-Based Authenticator: Security Proof and Applications., , , , and . INDOCRYPT, volume 2904 of Lecture Notes in Computer Science, page 388-401. Springer, (2003)Tripartite Key Exchange in the Canetti-Krawczyk Proof Model., , and . INDOCRYPT, volume 3348 of Lecture Notes in Computer Science, page 17-32. Springer, (2004)Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols., and . ACISP, volume 3574 of Lecture Notes in Computer Science, page 429-442. Springer, (2005)Errors in Computational Complexity Proofs for Protocols., , and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 624-643. Springer, (2005)Examining Indistinguishability-Based Proof Models for Key Establishment Protocols., , and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 585-604. Springer, (2005)RAK factoring algorithm., , , , and . Australas. J Comb., (2005)Improvements to the RAK Factoring Algorithm., , , and . Cryptographic Algorithms and their Uses, page 152-. Queensland University of Technology, (2004)On Session Key Construction in Provably-Secure Key Establishment Protocols., , and . Mycrypt, volume 3715 of Lecture Notes in Computer Science, page 116-131. Springer, (2005)The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves., , , and . Int. J. Inf. Sec., 3 (2): 86-98 (2004)A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis., and . ACISP, volume 2384 of Lecture Notes in Computer Science, page 214-225. Springer, (2002)