Author of the publication

The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders.

. ACISP, volume 3108 of Lecture Notes in Computer Science, page 149-156. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Empirical optimization of divisor arithmetic on hyperelliptic curves over F2m., and . Adv. in Math. of Comm., 7 (4): 485-502 (2013)Provably Sublinear Point Multiplication on Koblitz Curves and its Hardware Implementation., , , , and . IACR Cryptology ePrint Archive, (2006)Explicit Formulas for Real Hyperelliptic Curves of Genus 2 in Affine Representation., , and . IACR Cryptology ePrint Archive, (2011)Comparison of scalar multiplication on real hyperelliptic curves., , and . Adv. Math. Commun., 8 (4): 389-406 (2014)Performance modelling of anonymity protocols., , , and . Perform. Evaluation, 69 (12): 643-661 (2012)Computational Aspects of NUCOMP., and . ANTS, volume 2369 of Lecture Notes in Computer Science, page 120-133. Springer, (2002)Analysis of the Xedni Calculus Attack., , , , and . Des. Codes Cryptogr., 20 (1): 1-64 (2000)Computing discrete logarithms in the Jacobian of high-genus hyperelliptic curves over even characteristic finite fields., , and . Math. Comput., 83 (286): 935-963 (2014)A Note on the Security of CSIDH., , and . INDOCRYPT, volume 11356 of Lecture Notes in Computer Science, page 153-168. Springer, (2018)Explicit Formulas for Real Hyperelliptic Curves of Genus 2 in Affine Representation., , , , and . WAIFI, volume 4547 of Lecture Notes in Computer Science, page 202-218. Springer, (2007)