Author of the publication

Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism.

, , and . Public Key Cryptography, volume 2947 of Lecture Notes in Computer Science, page 28-40. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generic Algorithms for Computing Discrete Logarithms.. Handbook of Elliptic and Hyperelliptic Curve Cryptography, Chapman and Hall/CRC, (2005)Another Look at Square Roots (and Other Less Common Operations) in Fields of Even Characteristic.. Selected Areas in Cryptography, volume 4876 of Lecture Notes in Computer Science, page 138-154. Springer, (2007)Extending Scalar Multiplication Using Double Bases., , , and . ASIACRYPT, volume 4284 of Lecture Notes in Computer Science, page 130-144. Springer, (2006)Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations.. CHES, volume 3156 of Lecture Notes in Computer Science, page 148-162. Springer, (2004)The Complexity of Certain Multi-Exponentiation Techniques in Cryptography.. J. Cryptology, 18 (4): 357-373 (2005)Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems., , , and . IACR Cryptology ePrint Archive, (2010)Redundant tau-adic Expansions I: Non-Adjacent Digit Sets and their Applications to Scalar Multiplication., , and . IACR Cryptology ePrint Archive, (2008)Generic Efficient Arithmetic Algorithms for PAFFs (Processor Adequate Finite Fields) and Related Algebraic Structures (Extended Abstract)., and . Selected Areas in Cryptography, volume 3006 of Lecture Notes in Computer Science, page 320-334. Springer, (2003)Faster and Lower Memory Scalar Multiplication on Supersingular Curves in Characteristic Three., and . Public Key Cryptography, volume 6571 of Lecture Notes in Computer Science, page 109-127. Springer, (2011)Countermeasures against Differential Power Analysis for Hyperelliptic Curve Cryptosystems.. CHES, volume 2779 of Lecture Notes in Computer Science, page 366-381. Springer, (2003)