From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Selecting elliptic curves for cryptography: an efficiency and security analysis., , , и . J. Cryptogr. Eng., 6 (4): 259-286 (2016)Fast Cryptography in Genus 2., , , и . J. Cryptol., 29 (1): 28-60 (2016)FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime., и . IACR Cryptology ePrint Archive, (2015)Faster Compact Diffie-Hellman: Endomorphisms on the x-line., , и . IACR Cryptology ePrint Archive, (2013)Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem., , и . IACR Cryptol. ePrint Arch., (2020)Sieving for Twin Smooth Integers with Solutions to the Prouhet-Tarry-Escott Problem., , и . EUROCRYPT (1), том 12696 из Lecture Notes in Computer Science, стр. 272-301. Springer, (2021)High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS Decomposition., , , и . CHES, том 8086 из Lecture Notes in Computer Science, стр. 331-348. Springer, (2013)Computing Supersingular Isogenies on Kummer Surfaces.. ASIACRYPT (3), том 11274 из Lecture Notes in Computer Science, стр. 428-456. Springer, (2018)Avoiding Full Extension Field Arithmetic in Pairing Computations., , , и . AFRICACRYPT, том 6055 из Lecture Notes in Computer Science, стр. 203-224. Springer, (2010)Delaying Mismatched Field Multiplications in Pairing Computations., , , и . WAIFI, том 6087 из Lecture Notes in Computer Science, стр. 196-214. Springer, (2010)