Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DEADLOCK AVOIDANCE ALGORITHMS AND IMPLEMENTATION: A MATRIX-BASED APPROACH, , , and . page 183--232. (2005)Efficient Hyperelliptic Arithmetic Using Balanced Representation for Divisors., , and . ANTS, volume 5011 of Lecture Notes in Computer Science, page 342-356. Springer, (2008)Pairings on Hyperelliptic Curves with a Real Model., , and . Pairing, volume 5209 of Lecture Notes in Computer Science, page 265-281. Springer, (2008)An analysis of the infrastructure in real function fields.. IACR Cryptology ePrint Archive, (2008)Cheon's algorithm, pairing inversion and the discrete logarithm problem.. IACR Cryptology ePrint Archive, (2008)An attack on disguised elliptic curves.. J. Math. Cryptol., 2 (1): 1-8 (2008)