Author of the publication

Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields.

, , , , , , and . Adv. in Math. of Comm., 12 (4): 741-759 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and implementation of a constant-time FPGA accelerator for fast elliptic curve cryptography., , , and . ReConFig, page 1-8. IEEE, (2016)A reconfigurable processor for high speed point multiplication in elliptic curves., , and . Int. J. Embed. Syst., 1 (3/4): 237-249 (2005)Extended supersingular isogeny Diffie-Hellman key exchange protocol: Revenge of the SIDH., , and . IET Inf. Secur., 15 (5): 364-374 (2021)A Pairing-Based Blind Signature E-Voting Scheme., , and . Comput. J., 57 (10): 1460-1471 (2014)Polynomial Time Cryptanalytic Extraction of Neural Network Models., , , , , and . IACR Cryptol. ePrint Arch., (2023)Efficient Hardware Implementations of BRW Polynomials and Tweakable Enciphering Schemes., , , and . IEEE Trans. Computers, 62 (2): 279-294 (2013)Post-Quantum Digital Signature for the Mexican Digital Invoices by Internet., and . Computación y Sistemas, (2021)On the Security of Mexican Digital Fiscal Documents., , and . Computación y Sistemas, (2008)Constant-time hardware computation of elliptic curve scalar multiplication around the 128 bit security level., , , , and . Microprocess. Microsystems, (2018)The Montgomery ladder on binary elliptic curves., , and . J. Cryptogr. Eng., 8 (3): 241-258 (2018)