Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Montgomery ladder on binary elliptic curves., , and . J. Cryptogr. Eng., 8 (3): 241-258 (2018)TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks., , , , , , and . Comput. Commun., 34 (3): 485-493 (2011)Efficient software implementation of public-key cryptography on sensor networks using the MSP430X microcontroller., , and . J. Cryptogr. Eng., 2 (1): 19-29 (2012)Secure-TWS: Authenticating Node to Multi-user Communication in Shared Sensor Networks., , , , , , , and . Comput. J., 55 (4): 384-396 (2012)Lambda Coordinates for Binary Elliptic Curves., , , and . CHES, volume 8086 of Lecture Notes in Computer Science, page 311-330. Springer, (2013)Materialized community ground models for large-scale earthquake simulation., , , , , and . SC, page 54. IEEE/ACM, (2008)SoK: A Performance Evaluation of Cryptographic Instruction Sets on Modern Architectures., , and . APKC@AsiaCCS, page 9-18. ACM, (2018)Isogeny formulas for Jacobi intersection and twisted hessian curves., , and . Adv. Math. Commun., 14 (3): 507-523 (2020)An Improvement of the Guajardo-Paar Method for Multiplication on Non-Supersingular Elliptic Curves., and . SCCC, page 91-95. IEEE Computer Society, (1998)Implementing GCM on ARMv8., and . CT-RSA, volume 9048 of Lecture Notes in Computer Science, page 167-180. Springer, (2015)