Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Malan, D.J.
Welsh, M.
and
Smith, M.D.
2004.
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography.
p.
71.
Lange, Tanja
and
Mishra, Pradeep Kumar
2005.
Progress in Cryptology - INDOCRYPT 2005.
Vol. 3797,
Issue. ,
p.
403.
Dimitrov, Vassil
Imbert, Laurent
and
Mishra, Pradeep Kumar
2005.
Advances in Cryptology - ASIACRYPT 2005.
Vol. 3788,
Issue. ,
p.
59.
Crowe, F.
Daly, A.
and
Marnane, W.
2005.
A scalable dual mode arithmetic unit for public key cryptosystems.
p.
568.
Barreto, Paulo S. L. M.
and
Naehrig, Michael
2006.
Selected Areas in Cryptography.
Vol. 3897,
Issue. ,
p.
319.
Fournier, J.J.A.
and
Moore, S.
2006.
Hardware-Software Codesign of a Vector Co-processor for Public Key Cryptography.
p.
439.
Akishita, Toru
and
Takagi, Tsuyoshi
2006.
Smart Card Research and Advanced Applications.
Vol. 3928,
Issue. ,
p.
151.
Batina, L.
Mentens, N.
Preneel, B.
and
Verbauwhede, I.
2006.
Flexible Hardware Architectures for Curve-based Cryptography.
p.
4839.
Doche, Christophe
and
Imbert, Laurent
2006.
Progress in Cryptology - INDOCRYPT 2006.
Vol. 4329,
Issue. ,
p.
335.
Dent, Alexander W.
and
Galbraith, Steven D.
2006.
Algorithmic Number Theory.
Vol. 4076,
Issue. ,
p.
436.
de Mulder, E.
Ors, S. B.
Preneel, B.
and
Verbauwhede, I.
2006.
Differential Electromagnetic Attack on an FPGA Implementation of Elliptic Curve Cryptosystems.
p.
1.
Murty, Ram
and
Shparlinski, Igor
2006.
Topics in Geometry, Coding Theory and Cryptography.
Vol. 6,
Issue. ,
p.
167.
Al-Riyami, S. S.
Malone-Lee, J.
and
Smart, N. P.
2006.
Escrow-free encryption supporting cryptographic workflow.
International Journal of Information Security,
Vol. 5,
Issue. 4,
p.
217.
Kamala, R.V.
and
Srinivas, M.B.
2006.
Modified Montgomery Modular Inversion with Reduced Number of Multiplications.
p.
1.
Shin, Seonghan
Kobara, Kazukuni
and
Imai, Hideki
2006.
Elliptic Curve based Authenticated Key Agreement Protocol for Wireless Security.
p.
1096.
Cilardo, A.
Coppolino, L.
Mazzocca, N.
and
Romano, L.
2006.
Elliptic Curve Cryptography Engineering.
Proceedings of the IEEE,
Vol. 94,
Issue. 2,
p.
395.
Barreto, Paulo S. L. M.
Galbraith, Steven D.
hÉigeartaigh, Colm Ó’
and
Scott, Michael
2007.
Efficient pairing computation on supersingular Abelian varieties.
Designs, Codes and Cryptography,
Vol. 42,
Issue. 3,
p.
239.
Alrimeih, Hamad
and
Rakhmatov, Daler
2007.
Security-Performance Trade-offs in Embedded Systems Using Flexible ECC Hardware.
IEEE Design & Test of Computers,
Vol. 24,
Issue. 6,
p.
556.
Ronan, Robert
hÉigeartaigh, Colm ó
Murphy, Colin
Scott, Michael
and
Kerins, Tim
2007.
Hardware acceleration of the Tate pairing on a genus 2 hyperelliptic curve.
Journal of Systems Architecture,
Vol. 53,
Issue. 2-3,
p.
85.
Batina, Lejla
Mentens, Nele
Sakiyama, Kazuo
Preneel, Bart
and
Verbauwhede, Ingrid
2007.
Public-Key Cryptography on the Top of a Needle.
p.
1831.