Author of the publication

Speeding up Scalar Multiplication on Koblitz Curves Using _4 Coordinates.

, , , and . ACISP, volume 11547 of Lecture Notes in Computer Science, page 620-629. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Error-Resilient Arithmetic Coding Algorithm for Compressed Meshes., , , , , and . CW, page 455-460. IEEE Computer Society, (2008)Describing and Verifying Web Service Using CCS., , and . PDCAT, page 421-426. IEEE Computer Society, (2006)A Novel Pre-Computation Scheme of Window τNAF for Koblitz Curves., , , and . IACR Cryptology ePrint Archive, (2017)The numerical study on specialized treatment strategies of enhanced external counterpulsation for cardiovascular and cerebrovascular disease., , , , , , , and . Med. Biol. Engineering and Computing, 56 (11): 1959-1971 (2018)Describing and Verifying Web Service by CCS on a Case Study., , and . ICNSC, page 1571-1576. IEEE, (2008)Lossy Key Encapsulation Mechanism and Its Applications., , , and . ICISC, volume 10157 of Lecture Notes in Computer Science, page 126-144. (2016)Receiver Selective Opening Security from Indistinguishability Obfuscation., , and . INDOCRYPT, volume 10095 of Lecture Notes in Computer Science, page 393-410. (2016)About Hash into Montgomery Form Elliptic Curves., , , and . ISPEC, volume 7863 of Lecture Notes in Computer Science, page 147-159. Springer, (2013)Joint Triple-Base Number System for Multi-Scalar Multiplication., , , and . ISPEC, volume 7863 of Lecture Notes in Computer Science, page 160-173. Springer, (2013)Improving the Message-Ciphertext Rate of Lewko's Fully Secure IBE Scheme., , , and . ISPEC, volume 7863 of Lecture Notes in Computer Science, page 105-116. Springer, (2013)