Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Malan, D.J.
Welsh, M.
and
Smith, M.D.
2004.
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography.
p.
71.
Lange, Tanja
and
Mishra, Pradeep Kumar
2005.
Progress in Cryptology - INDOCRYPT 2005.
Vol. 3797,
Issue. ,
p.
403.
Crowe, F.
Daly, A.
and
Marnane, W.
2005.
A scalable dual mode arithmetic unit for public key cryptosystems.
p.
568.
Dimitrov, Vassil
Imbert, Laurent
and
Mishra, Pradeep Kumar
2005.
Advances in Cryptology - ASIACRYPT 2005.
Vol. 3788,
Issue. ,
p.
59.
Batina, L.
Mentens, N.
Preneel, B.
and
Verbauwhede, I.
2006.
Flexible Hardware Architectures for Curve-based Cryptography.
p.
4839.
Akishita, Toru
and
Takagi, Tsuyoshi
2006.
Smart Card Research and Advanced Applications.
Vol. 3928,
Issue. ,
p.
151.
Al-Riyami, S. S.
Malone-Lee, J.
and
Smart, N. P.
2006.
Escrow-free encryption supporting cryptographic workflow.
International Journal of Information Security,
Vol. 5,
Issue. 4,
p.
217.
Fournier, J.J.A.
and
Moore, S.
2006.
Hardware-Software Codesign of a Vector Co-processor for Public Key Cryptography.
p.
439.
Doche, Christophe
and
Imbert, Laurent
2006.
Progress in Cryptology - INDOCRYPT 2006.
Vol. 4329,
Issue. ,
p.
335.
de Mulder, E.
Ors, S. B.
Preneel, B.
and
Verbauwhede, I.
2006.
Differential Electromagnetic Attack on an FPGA Implementation of Elliptic Curve Cryptosystems.
p.
1.
Murty, Ram
and
Shparlinski, Igor
2006.
Topics in Geometry, Coding Theory and Cryptography.
Vol. 6,
Issue. ,
p.
167.
Kamala, R.V.
and
Srinivas, M.B.
2006.
Modified Montgomery Modular Inversion with Reduced Number of Multiplications.
p.
1.
Shin, Seonghan
Kobara, Kazukuni
and
Imai, Hideki
2006.
Elliptic Curve based Authenticated Key Agreement Protocol for Wireless Security.
p.
1096.
Barreto, Paulo S. L. M.
and
Naehrig, Michael
2006.
Selected Areas in Cryptography.
Vol. 3897,
Issue. ,
p.
319.
Dent, Alexander W.
and
Galbraith, Steven D.
2006.
Algorithmic Number Theory.
Vol. 4076,
Issue. ,
p.
436.
Cilardo, A.
Coppolino, L.
Mazzocca, N.
and
Romano, L.
2006.
Elliptic Curve Cryptography Engineering.
Proceedings of the IEEE,
Vol. 94,
Issue. 2,
p.
395.
Batina, Lejla
Mentens, Nele
Sakiyama, Kazuo
Preneel, Bart
and
Verbauwhede, Ingrid
2007.
Public-Key Cryptography on the Top of a Needle.
p.
1831.
Comuta, Aya
Kawazoe, Mitsuru
and
Takahashi, Tetsuya
2007.
Information Security and Cryptology - ICISC 2007.
Vol. 4817,
Issue. ,
p.
297.
Alrimeih, Hamad
and
Rakhmatov, Daler
2007.
Security-Performance Trade-offs in Embedded Systems Using Flexible ECC Hardware.
IEEE Design & Test of Computers,
Vol. 24,
Issue. 6,
p.
556.
Kate, Aniket
Zaverucha, Greg
and
Goldberg, Ian
2007.
Privacy Enhancing Technologies.
Vol. 4776,
Issue. ,
p.
95.