Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient modular operations using the adapted modular number system., , and . J. Cryptogr. Eng., 10 (2): 111-133 (2020)Random Euclidean Addition Chain Generation and Its Application to Point Multiplication., , , , and . INDOCRYPT, volume 6498 of Lecture Notes in Computer Science, page 238-261. Springer, (2010)Code Based Cryptography and Steganography.. CAI, volume 8080 of Lecture Notes in Computer Science, page 9-46. Springer, (2013)Randomization of Arithmetic Over Polynomial Modular Number System., , , , and . ARITH, page 199-206. IEEE, (2019)PMNS for efficient arithmetic and small memory cost., , and . ARITH, page 84. IEEE, (2022)Improved identification schemes based on error-correcting codes.. Appl. Algebra Eng. Commun. Comput., 8 (1): 57-69 (1996)Cache timing attacks countermeasures and error detection in Euclidean addition chains based scalar multiplication algorithm for elliptic curves., and . IOLTS, page 163-168. IEEE, (2017)A Public Key Cryptosystem Based upon Euclidean Addition Chains., and . SETA, volume 6338 of Lecture Notes in Computer Science, page 284-297. Springer, (2010)Cryptanalysis of Harari's Identification Scheme.. IMACC, volume 1025 of Lecture Notes in Computer Science, page 264-269. Springer, (1995)Compact Variable-base ECC Scalar Multiplication using Euclidean Addition Chains., , and . SECRYPT, page 531-539. SCITEPRESS, (2021)