Author of the publication

Counting Points for Hyperelliptic Curves of Type y2= x5 + ax over Finite Prime Fields.

, , and . Selected Areas in Cryptography, volume 3006 of Lecture Notes in Computer Science, page 26-41. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intelligent Editor for Authoring Educational Materials in Mathematics e-Learning Systems., , , , , , , and . ICMS, volume 10931 of Lecture Notes in Computer Science, page 431-437. Springer, (2018)Comparison Between XL and Gröbner Basis Algorithms., , , , and . ASIACRYPT, volume 3329 of Lecture Notes in Computer Science, page 338-353. Springer, (2004)Gröbner Basis Based Cryptanalysis of SHA-1., , and . IACR Cryptology ePrint Archive, (2006)Construction of Pairing-Friendly Hyperelliptic Curves Based on the Closed Formulae of the Order of the Jacobian Group., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (6): 1132-1139 (2010)Analysis of Teachers' Tacit Knowledge-based Evaluation of Learner Competencies Using Machine Learning Approach., , and . IIAI-AAI, page 713-714. IEEE, (2023)Suitable Curves for Genus-4 HCC over Prime Fields: Point Counting Formulae for Hyperelliptic Curves of Type y2=x2k+1+ax., , and . ICALP, volume 3580 of Lecture Notes in Computer Science, page 539-550. Springer, (2005)Relation between the XL Algorithm and Gröbner Basis Algorithms., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 89-A (1): 11-18 (2006)Suitable Curves for Genus-4 HCC over Prime Fields: Point Counting Formulae for Hyperelliptic Curves of type y2=x2k+1+ax., , and . IACR Cryptol. ePrint Arch., (2004)Counting Points for Hyperelliptic Curves of type y2x5+ax over Finite Prime Fields., , and . IACR Cryptol. ePrint Arch., (2002)Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon's Algorithm., , and . ICISC, volume 4817 of Lecture Notes in Computer Science, page 297-308. Springer, (2007)