Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Koblitz, Neal
and
Menezes, Alfred J.
2004.
A Survey of Public-Key Cryptosystems.
SIAM Review,
Vol. 46,
Issue. 4,
p.
599.
Menezes, Alfred
Teske, Edlyn
and
Weng, Annegret
2004.
Topics in Cryptology – CT-RSA 2004.
Vol. 2964,
Issue. ,
p.
366.
Galbraith, Steven
and
Menezes, Alfred
2005.
Algebraic curves and cryptography.
Finite Fields and Their Applications,
Vol. 11,
Issue. 3,
p.
544.
Reyhani-Masoleh, A.
and
Hasan, M.A.
2005.
Low complexity word-level sequential normal basis multipliers.
IEEE Transactions on Computers,
Vol. 54,
Issue. 2,
p.
98.
Menezes, Alfred
and
Teske, Edlyn
2006.
Cryptographic implications of Hess' generalized GHS attack.
Applicable Algebra in Engineering, Communication and Computing,
Vol. 16,
Issue. 6,
p.
439.
Dahab, R.
Hankerson, D.
Hu, F.
Long, M.
Lopez, J.
and
Menezes, A.
2006.
Software multiplication using Gaussian normal bases.
IEEE Transactions on Computers,
Vol. 55,
Issue. 8,
p.
974.
Batina, Lejla
Guajardo, Jorge
Preneel, Bart
Tuyls, Pim
and
Verbauwhede, Ingrid
2008.
RFID Security.
p.
317.
Farashahi, Reza Rezaeian
Pellikaan, Ruud
and
Sidorenko, Andrey
2008.
Extractors for binary elliptic curves.
Designs, Codes and Cryptography,
Vol. 49,
Issue. 1-3,
p.
171.
Hankerson, Darrel
Karabina, Koray
and
Menezes, Alfred
2009.
Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields.
IEEE Transactions on Computers,
Vol. 58,
Issue. 10,
p.
1411.
Gaudry, Pierrick
2009.
Index calculus for abelian varieties of small dimension and the elliptic curve discrete logarithm problem.
Journal of Symbolic Computation,
Vol. 44,
Issue. 12,
p.
1690.
Karabina, Koray
Menezes, Alfred
Pomerance, Carl
and
Shparlinski, Igor E.
2010.
On the asymptotic effectiveness of Weil descent attacks.
Journal of Mathematical Cryptology,
Vol. 4,
Issue. 2,
Dominguez-Oviedo, Agustin
Hasan, M. Anwar
and
Ansari, Bijan
2011.
Fault-Based Attack on Montgomery’s Ladder Algorithm.
Journal of Cryptology,
Vol. 24,
Issue. 2,
p.
346.
Hankerson, Darrel
and
Menezes, Alfred
2011.
Encyclopedia of Cryptography and Security.
p.
397.
Kumar, D. Sravana
Suneetha, C. H.
and
Sirisha, P.
2019.
Emerging Research in Computing, Information, Communication and Applications.
Vol. 906,
Issue. ,
p.
199.
Hankerson, Darrel
and
Menezes, Alfred
2021.
Encyclopedia of Cryptography, Security and Privacy.
p.
1.