Author of the publication

Randomizing Scalar Multiplication Using Exact Covering Systems of Congruences.

, , and . IACR Cryptology ePrint Archive, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Strictly chained (p,q)-ary partitions, and . CoRR, (2012)Randomizing Scalar Multiplication Using Exact Covering Systems of Congruences., , and . IACR Cryptology ePrint Archive, (2015)Breaking Randomized Mixed-Radix Scalar Multiplication Algorithms., and . LATINCRYPT, volume 11774 of Lecture Notes in Computer Science, page 24-39. Springer, (2019)Side-Channel Attacks on Blinded Scalar Multiplications Revisited., , and . CARDIS, volume 11833 of Lecture Notes in Computer Science, page 95-108. Springer, (2019)Faster Cofactorization with ECM Using Mixed Representations., and . Public Key Cryptography (2), volume 12111 of Lecture Notes in Computer Science, page 483-504. Springer, (2020)Arithmetic Operations in Finite Fields of Medium Prime Characteristic Using the Lagrange Representation., , and . IEEE Trans. Computers, 55 (9): 1167-1177 (2006)Hybrid Binary-Ternary Joint Sparse Form and its Application in Elliptic Curve Cryptography., , and . IACR Cryptology ePrint Archive, (2008)Encryption Switching Protocols Revisited: Switching Modulo p., , and . CRYPTO (1), volume 10401 of Lecture Notes in Computer Science, page 255-287. Springer, (2017)Practical Analysis of RSA Countermeasures Against Side-Channel Electromagnetic Attacks., , , and . CARDIS, volume 8419 of Lecture Notes in Computer Science, page 200-215. Springer, (2013)Randomized Mixed-Radix Scalar Multiplication., , and . IEEE Trans. Computers, 67 (3): 418-431 (2018)