Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Galbraith, Steven D.
Hess, Florian
and
Smart, Nigel P.
2002.
Advances in Cryptology — EUROCRYPT 2002.
Vol. 2332,
Issue. ,
p.
29.
Maurer, Markus
Menezes, Alfred
and
Teske, Edlyn
2002.
Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree.
LMS Journal of Computation and Mathematics,
Vol. 5,
Issue. ,
p.
127.
Galbraith, Steven D.
and
Rotger, Victor
2004.
Easy Decision Diffie-Hellman Groups.
LMS Journal of Computation and Mathematics,
Vol. 7,
Issue. ,
p.
201.
Menezes, Alfred
Teske, Edlyn
and
Weng, Annegret
2004.
Topics in Cryptology – CT-RSA 2004.
Vol. 2964,
Issue. ,
p.
366.
Galbraith, Steven
and
Menezes, Alfred
2005.
Algebraic curves and cryptography.
Finite Fields and Their Applications,
Vol. 11,
Issue. 3,
p.
544.
Jao, David
Miller, Stephen D.
and
Venkatesan, Ramarathnam
2005.
Advances in Cryptology - ASIACRYPT 2005.
Vol. 3788,
Issue. ,
p.
21.
Menezes, Alfred
and
Teske, Edlyn
2006.
Cryptographic implications of Hess' generalized GHS attack.
Applicable Algebra in Engineering, Communication and Computing,
Vol. 16,
Issue. 6,
p.
439.
Jetchev, Dimitar
and
Venkatesan, Ramarathnam
2008.
Advances in Cryptology – CRYPTO 2008.
Vol. 5157,
Issue. ,
p.
75.
Hankerson, Darrel
Karabina, Koray
and
Menezes, Alfred
2009.
Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields.
IEEE Transactions on Computers,
Vol. 58,
Issue. 10,
p.
1411.
Jao, David
Miller, Stephen D.
and
Venkatesan, Ramarathnam
2009.
Expander graphs based on GRH with an application to elliptic curve cryptography.
Journal of Number Theory,
Vol. 129,
Issue. 6,
p.
1491.
Jao, David
and
Soukharev, Vladimir
2010.
Algorithmic Number Theory.
Vol. 6197,
Issue. ,
p.
219.
Koblitz, Ann Hibner
Koblitz, Neal
and
Menezes, Alfred
2011.
Elliptic curve cryptography: The serpentine course of a paradigm shift.
Journal of Number Theory,
Vol. 131,
Issue. 5,
p.
781.
Jao, David
and
De Feo, Luca
2011.
Post-Quantum Cryptography.
Vol. 7071,
Issue. ,
p.
19.
Moody, Dustin
2012.
Computing isogeny volcanoes of composite degree.
Applied Mathematics and Computation,
Vol. 218,
Issue. 9,
p.
5249.
Galbraith, Steven
and
Stolbunov, Anton
2013.
Improved algorithm for the isogeny problem for ordinary elliptic curves.
Applicable Algebra in Engineering, Communication and Computing,
Vol. 24,
Issue. 2,
p.
107.
Sutherland, Andrew
2013.
Isogeny volcanoes.
The Open Book Series,
Vol. 1,
Issue. 1,
p.
507.
Jao, David
and
Soukharev, Vladimir
2014.
Post-Quantum Cryptography.
Vol. 8772,
Issue. ,
p.
160.
Biasse, Jean-François
Jao, David
and
Sankar, Anirudh
2014.
Progress in Cryptology -- INDOCRYPT 2014.
Vol. 8885,
Issue. ,
p.
428.
Delfs, Christina
and
Galbraith, Steven D.
2016.
Computing isogenies between supersingular elliptic curves over $${\mathbb {F}}_p$$ F p.
Designs, Codes and Cryptography,
Vol. 78,
Issue. 2,
p.
425.
Galbraith, Steven D.
Petit, Christophe
Shani, Barak
and
Ti, Yan Bo
2016.
Advances in Cryptology – ASIACRYPT 2016.
Vol. 10031,
Issue. ,
p.
63.