Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Arithmetic on Elliptic Curves in Characteristic 2.. INDOCRYPT, volume 7668 of Lecture Notes in Computer Science, page 378-398. Springer, (2012)Arithmetic of Split Kummer Surfaces: Montgomery Endomorphism of Edwards Products.. IWCC, volume 6639 of Lecture Notes in Computer Science, page 238-245. Springer, (2011)Twisted Hessian Curves., , , and . LATINCRYPT, volume 9230 of Lecture Notes in Computer Science, page 269-294. Springer, (2015)Twisted μ4-Normal Form for Elliptic Curves.. EUROCRYPT (1), volume 10210 of Lecture Notes in Computer Science, page 659-678. (2017)On the quaternion ℓ-isogeny path problem., , , and . IACR Cryptology ePrint Archive, (2014)Split group codes., , and . IEEE Trans. Information Theory, 46 (2): 485-495 (2000)Counting Points on Genus 2 Curves with Real Multiplication., , and . ASIACRYPT, volume 7073 of Lecture Notes in Computer Science, page 504-519. Springer, (2011)Explicit Sequence Expansions., , and . SETA, page 308-317. Springer, (1998)Double-Base Number System for Multi-Scalar Multiplications., , and . IACR Cryptology ePrint Archive, (2008)Secret-sharing with a class of ternary codes., , and . Theor. Comput. Sci., 246 (1-2): 285-298 (2000)