Author of the publication

Explicit Formulas for Real Hyperelliptic Curves of Genus 2 in Affine Representation.

, , , , and . WAIFI, volume 4547 of Lecture Notes in Computer Science, page 202-218. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting., , and . IEEE Trans. Dependable Secur. Comput., 5 (2): 65-70 (2008)A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model., , , and . IEEE Trans. Inf. Forensics Secur., 8 (6): 949-962 (2013)A machine learning based golden-free detection method for command-activated hardware Trojan., , , , , and . Inf. Sci., (2020)Power Analysis and Protection on SPECK and Its Application in IoT., , , , , and . SecureComm (2), volume 305 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 350-362. Springer, (2019)Efficient privacy preserving content based publish subscribe systems., , and . SACMAT, page 133-144. ACM, (2012)The Applicability of an EHR Phenotype for Cohort Identification., , , and . CRI, AMIA, (2016)A case study evaluating the portability of an executable computable phenotype algorithm across multiple institutions and electronic health record environments., , , , , , , , , and 14 other author(s). J. Am. Medical Informatics Assoc., 25 (11): 1540-1546 (2018)A graph-based method for reconstructing entities from coordination ellipsis in medical text., , , , , and . J. Am. Medical Informatics Assoc., 27 (9): 1364-1373 (2020)LongRoPE: Extending LLM Context Window Beyond 2 Million Tokens., , , , , , , and . CoRR, (2024)Transaction Deanonymization in Large-Scale Bitcoin Systems via Propagation Pattern Analysis., , , and . SPDE, volume 1268 of Communications in Computer and Information Science, page 661-675. Springer, (2020)