Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
YOSHIDA, Reo
and
TAKASHIMA, Katsuyuki
2013.
Computing a Sequence of 2-Isogenies on Supersingular Elliptic Curves.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,
Vol. E96.A,
Issue. 1,
p.
158.
Sutherland, Andrew
2013.
On the evaluation of modular polynomials.
The Open Book Series,
Vol. 1,
Issue. 1,
p.
531.
Sutherland, Andrew
2013.
Isogeny volcanoes.
The Open Book Series,
Vol. 1,
Issue. 1,
p.
507.
Shparlinski, Igor E.
and
Sutherland, Andrew V.
2014.
On the Distribution of Atkin and Elkies Primes.
Foundations of Computational Mathematics,
Vol. 14,
Issue. 2,
p.
285.
Shparlinski, Igor E.
and
Sutherland, Andrew V.
2015.
On the distribution of Atkin and Elkies primes for reductions of elliptic curves on average.
LMS Journal of Computation and Mathematics,
Vol. 18,
Issue. 1,
p.
308.
Costello, Craig
Longa, Patrick
and
Naehrig, Michael
2016.
Advances in Cryptology – CRYPTO 2016.
Vol. 9814,
Issue. ,
p.
572.
Morain, François
Scribot, Charlotte
and
Smith, Benjamin
2016.
Computing cardinalities of -curve reductions over finite fields.
LMS Journal of Computation and Mathematics,
Vol. 19,
Issue. A,
p.
115.
Takashima, Katsuyuki
2018.
Mathematical Modelling for Next-Generation Cryptography.
Vol. 29,
Issue. ,
p.
97.
Castryck, Wouter
Lange, Tanja
Martindale, Chloe
Panny, Lorenz
and
Renes, Joost
2018.
Advances in Cryptology – ASIACRYPT 2018.
Vol. 11274,
Issue. ,
p.
395.
Doliskani, Javad
2018.
On division polynomial PIT and supersingularity.
Applicable Algebra in Engineering, Communication and Computing,
Vol. 29,
Issue. 5,
p.
393.
Fujioka, Atsushi
Takashima, Katsuyuki
Terada, Shintaro
and
Yoneyama, Kazuki
2019.
Information Security and Cryptology – ICISC 2018.
Vol. 11396,
Issue. ,
p.
177.
Costello, Craig
and
Smith, Benjamin
2020.
Post-Quantum Cryptography.
Vol. 12100,
Issue. ,
p.
151.
Hashimoto, Yuji
and
Takashima, Katsuyuki
2021.
Improved supersingularity testing of elliptic curves.
JSIAM Letters,
Vol. 13,
Issue. 0,
p.
29.
Takashima, Katsuyuki
2021.
International Symposium on Mathematics, Quantum Theory, and Cryptography.
Vol. 33,
Issue. ,
p.
251.
Hashimoto, Yuji
and
Nuida, Koji
2021.
Computer Algebra in Scientific Computing.
Vol. 12865,
Issue. ,
p.
121.
Florit, Enric
and
Smith, Benjamin
2022.
Arithmetic, Geometry, Cryptography, and Coding Theory 2021.
Vol. 779,
Issue. ,
p.
103.
Lemnouar, Noui
2022.
Security limitations of Shamir’s secret sharing.
Journal of Discrete Mathematical Sciences and Cryptography,
p.
1.
Rouse, Jeremy
Sutherland, Andrew V.
and
Zureick-Brown, David
2022.
-adic images of Galois for elliptic curves over (and an appendix with John Voight).
Forum of Mathematics, Sigma,
Vol. 10,
Issue. ,
HASHIMOTO, Yuji
and
NUIDA, Koji
2023.
Efficient Supersingularity Testing of Elliptic Curves Using Legendre Curves.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,
Vol. E106.A,
Issue. 9,
p.
1119.
Reijnders, Krijn
2023.
Progress in Cryptology – LATINCRYPT 2023.
Vol. 14168,
Issue. ,
p.
109.