Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Malan, D.J.
Welsh, M.
and
Smith, M.D.
2004.
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography.
p.
71.
Crowe, F.
Daly, A.
and
Marnane, W.
2005.
A scalable dual mode arithmetic unit for public key cryptosystems.
p.
568.
Lange, Tanja
and
Mishra, Pradeep Kumar
2005.
Progress in Cryptology - INDOCRYPT 2005.
Vol. 3797,
Issue. ,
p.
403.
Dimitrov, Vassil
Imbert, Laurent
and
Mishra, Pradeep Kumar
2005.
Advances in Cryptology - ASIACRYPT 2005.
Vol. 3788,
Issue. ,
p.
59.
Shin, Seonghan
Kobara, Kazukuni
and
Imai, Hideki
2006.
Elliptic Curve based Authenticated Key Agreement Protocol for Wireless Security.
p.
1096.
de Mulder, E.
Ors, S. B.
Preneel, B.
and
Verbauwhede, I.
2006.
Differential Electromagnetic Attack on an FPGA Implementation of Elliptic Curve Cryptosystems.
p.
1.
Dent, Alexander W.
and
Galbraith, Steven D.
2006.
Algorithmic Number Theory.
Vol. 4076,
Issue. ,
p.
436.
Al-Riyami, S. S.
Malone-Lee, J.
and
Smart, N. P.
2006.
Escrow-free encryption supporting cryptographic workflow.
International Journal of Information Security,
Vol. 5,
Issue. 4,
p.
217.
Doche, Christophe
and
Imbert, Laurent
2006.
Progress in Cryptology - INDOCRYPT 2006.
Vol. 4329,
Issue. ,
p.
335.
Fournier, J.J.A.
and
Moore, S.
2006.
Hardware-Software Codesign of a Vector Co-processor for Public Key Cryptography.
p.
439.
Batina, L.
Mentens, N.
Preneel, B.
and
Verbauwhede, I.
2006.
Flexible Hardware Architectures for Curve-based Cryptography.
p.
4839.
Murty, Ram
and
Shparlinski, Igor
2006.
Topics in Geometry, Coding Theory and Cryptography.
Vol. 6,
Issue. ,
p.
167.
Kamala, R.V.
and
Srinivas, M.B.
2006.
Modified Montgomery Modular Inversion with Reduced Number of Multiplications.
p.
1.
Akishita, Toru
and
Takagi, Tsuyoshi
2006.
Smart Card Research and Advanced Applications.
Vol. 3928,
Issue. ,
p.
151.
Cilardo, A.
Coppolino, L.
Mazzocca, N.
and
Romano, L.
2006.
Elliptic Curve Cryptography Engineering.
Proceedings of the IEEE,
Vol. 94,
Issue. 2,
p.
395.
Barreto, Paulo S. L. M.
and
Naehrig, Michael
2006.
Selected Areas in Cryptography.
Vol. 3897,
Issue. ,
p.
319.
Batina, Lejla
Mentens, Nele
Sakiyama, Kazuo
Preneel, Bart
and
Verbauwhede, Ingrid
2007.
Public-Key Cryptography on the Top of a Needle.
p.
1831.
Barreto, Paulo S. L. M.
Galbraith, Steven D.
hÉigeartaigh, Colm Ó’
and
Scott, Michael
2007.
Efficient pairing computation on supersingular Abelian varieties.
Designs, Codes and Cryptography,
Vol. 42,
Issue. 3,
p.
239.
Ó hÉigeartaigh, Colm
and
Scott, Michael
2007.
Selected Areas in Cryptography.
Vol. 4356,
Issue. ,
p.
302.
Zhang, Xing
Zhou, Ming
Zhuang, Jun-Xi
and
Li, Jian
2007.
Implementation of ECC-Based Trusted Platform Module.
p.
2168.