Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Malan, D.J.
Welsh, M.
and
Smith, M.D.
2004.
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography.
p.
71.
Lange, Tanja
and
Mishra, Pradeep Kumar
2005.
Progress in Cryptology - INDOCRYPT 2005.
Vol. 3797,
Issue. ,
p.
403.
Crowe, F.
Daly, A.
and
Marnane, W.
2005.
A scalable dual mode arithmetic unit for public key cryptosystems.
p.
568.
Dimitrov, Vassil
Imbert, Laurent
and
Mishra, Pradeep Kumar
2005.
Advances in Cryptology - ASIACRYPT 2005.
Vol. 3788,
Issue. ,
p.
59.
Murty, Ram
and
Shparlinski, Igor
2006.
Topics in Geometry, Coding Theory and Cryptography.
Vol. 6,
Issue. ,
p.
167.
Barreto, Paulo S. L. M.
and
Naehrig, Michael
2006.
Selected Areas in Cryptography.
Vol. 3897,
Issue. ,
p.
319.
Shin, Seonghan
Kobara, Kazukuni
and
Imai, Hideki
2006.
Elliptic Curve based Authenticated Key Agreement Protocol for Wireless Security.
p.
1096.
Kamala, R.V.
and
Srinivas, M.B.
2006.
Modified Montgomery Modular Inversion with Reduced Number of Multiplications.
p.
1.
Doche, Christophe
and
Imbert, Laurent
2006.
Progress in Cryptology - INDOCRYPT 2006.
Vol. 4329,
Issue. ,
p.
335.
Cilardo, A.
Coppolino, L.
Mazzocca, N.
and
Romano, L.
2006.
Elliptic Curve Cryptography Engineering.
Proceedings of the IEEE,
Vol. 94,
Issue. 2,
p.
395.
Akishita, Toru
and
Takagi, Tsuyoshi
2006.
Smart Card Research and Advanced Applications.
Vol. 3928,
Issue. ,
p.
151.
Al-Riyami, S. S.
Malone-Lee, J.
and
Smart, N. P.
2006.
Escrow-free encryption supporting cryptographic workflow.
International Journal of Information Security,
Vol. 5,
Issue. 4,
p.
217.
Dent, Alexander W.
and
Galbraith, Steven D.
2006.
Algorithmic Number Theory.
Vol. 4076,
Issue. ,
p.
436.
Fournier, J.J.A.
and
Moore, S.
2006.
Hardware-Software Codesign of a Vector Co-processor for Public Key Cryptography.
p.
439.
Batina, L.
Mentens, N.
Preneel, B.
and
Verbauwhede, I.
2006.
Flexible Hardware Architectures for Curve-based Cryptography.
p.
4839.
de Mulder, E.
Ors, S. B.
Preneel, B.
and
Verbauwhede, I.
2006.
Differential Electromagnetic Attack on an FPGA Implementation of Elliptic Curve Cryptosystems.
p.
1.
Joye, Marc
2007.
Cryptographic Hardware and Embedded Systems - CHES 2007.
Vol. 4727,
Issue. ,
p.
135.
Batina, Lejla
Mentens, Nele
Sakiyama, Kazuo
Preneel, Bart
and
Verbauwhede, Ingrid
2007.
Public-Key Cryptography on the Top of a Needle.
p.
1831.
Ó hÉigeartaigh, Colm
and
Scott, Michael
2007.
Selected Areas in Cryptography.
Vol. 4356,
Issue. ,
p.
302.
Kate, Aniket
Zaverucha, Greg
and
Goldberg, Ian
2007.
Privacy Enhancing Technologies.
Vol. 4776,
Issue. ,
p.
95.