The Citing articles tool gives a list of articles citing the current article. The citing articles come from EDP Sciences database, as well as other publishers participating in CrossRef Cited-by Linking Program. You can set up your personal account to receive an email alert each time this article is cited by a new article (see the menu on the right-hand side of the abstract page).
Birkhoff spectrum for diagonally self-affine sets and digit frequencies for GLS systems with redundancy
Jonny Imbierski, Charlene Kalle and Reza Mohammadpour Proceedings of the Royal Society of Edinburgh: Section A Mathematics 1 (2024) https://doi.org/10.1017/prm.2024.113
Optimal binary signed-digit representations of integers and the Stern polynomial
Comparison of scalar point multiplication algorithms in a low resource device
Mohamed Ramdani, Mohamed Benmohammed and Nadjia Benblidia Journal of King Saud University - Computer and Information Sciences 32(4) 425 (2020) https://doi.org/10.1016/j.jksuci.2019.07.013
On the minimal Hamming weight of a multi-base representation
Abhraneel Dutta, Aaron Hutchinson and Koray Karabina Lecture Notes in Computer Science, Progress in Cryptology – INDOCRYPT 2020 12578 248 (2020) https://doi.org/10.1007/978-3-030-65277-7_11
Proceedings of the Third International Conference on Microelectronics, Computing and Communication Systems
Anil Pinapati and R. Padmavathy Lecture Notes in Electrical Engineering, Proceedings of the Third International Conference on Microelectronics, Computing and Communication Systems 556 9 (2019) https://doi.org/10.1007/978-981-13-7091-5_2
Arithmetic Considerations for Isogeny-Based Cryptography
Flexible Architectures for Cryptographic Algorithms — A Systematic Literature Review
Muhammad Rashid, Malik Imran, Atif Raza Jafri and Turki F. Al-Somani Journal of Circuits, Systems and Computers 28(03) 1930003 (2019) https://doi.org/10.1142/S0218126619300034
On Bellman’s and Knuth’s Problems and their Generalizations
Iterative sliding window method for shorter number of operations in modular exponentiation and scalar multiplication
Adamu Muhammad Noma, Abdullah Muhammed, Zuriati Ahmad Zukarnain, Muhammad Afendee Mohamed and Duc Pham Cogent Engineering 4(1) 1304499 (2017) https://doi.org/10.1080/23311916.2017.1304499
Accelerated precomputation points–based scalar reduction on elliptic curve cryptography for wireless sensor networks
Youssou Faye, Hervé Guyennet, Shou Yanbo and Ibrahima Niang International Journal of Communication Systems 30(16) (2017) https://doi.org/10.1002/dac.3327
An Improved Signed Digit Representation of Integers
Joppe W. Bos, Craig Costello, Huseyin Hisil and Kristin Lauter Lecture Notes in Computer Science, Advances in Cryptology – EUROCRYPT 2013 7881 194 (2013) https://doi.org/10.1007/978-3-642-38348-9_12
Progress in Cryptology - AFRICACRYPT 2012
Nashwa A. F. Mohamed, Mohsin H. A. Hashim and Michael Hutter Lecture Notes in Computer Science, Progress in Cryptology - AFRICACRYPT 2012 7374 342 (2012) https://doi.org/10.1007/978-3-642-31410-0_21
An Innovative Scalar Multiplication Method Based on Improved m-ary
Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmetic
Raveen R. Goundar, Marc Joye, Atsuko Miyaji, Matthieu Rivain and Alexandre Venelli Journal of Cryptographic Engineering 1(2) 161 (2011) https://doi.org/10.1007/s13389-011-0012-0
Hybrid Binary-Ternary Number System for Elliptic Curve Cryptosystems
Katsuyuki Okeya, Hidehiro Kato and Yasuyuki Nogami Lecture Notes in Computer Science, Information Security, Practice and Experience 6047 67 (2010) https://doi.org/10.1007/978-3-642-12827-1_6
An Improved Binary Method for Scalar Multiplication in Elliptic Curve Cryptography
Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation
Maurice Keller and William Marnane Lecture Notes in Computer Science, Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation 4644 310 (2007) https://doi.org/10.1007/978-3-540-74442-9_30
Stochastic Algorithms: Foundations and Applications
David Jao, S. Ramesh Raju and Ramarathnam Venkatesan Lecture Notes in Computer Science, Stochastic Algorithms: Foundations and Applications 4665 105 (2007) https://doi.org/10.1007/978-3-540-74871-7_10
Elliptic curve scalar multiplication algorithm using complementary recoding
Johannes Blömer, Martin Otto and Jean-Pierre Seifert Lecture Notes in Computer Science, Fault Diagnosis and Tolerance in Cryptography 4236 36 (2006) https://doi.org/10.1007/11889700_4
Christophe Doche, Thomas Icart and David R. Kohel Lecture Notes in Computer Science, Public Key Cryptography - PKC 2006 3958 191 (2006) https://doi.org/10.1007/11745853_13
Cryptology and Network Security
Fanyu Kong and Daxing Li Lecture Notes in Computer Science, Cryptology and Network Security 3810 223 (2005) https://doi.org/10.1007/11599371_19
Security and Privacy in Ad-hoc and Sensor Networks
Erik Dahmen, Katsuyuki Okeya and Tsuyoshi Takagi Lecture Notes in Computer Science, Security and Privacy in Ad-hoc and Sensor Networks 3813 189 (2005) https://doi.org/10.1007/11601494_16
Runhua Shi and Jiaxing Cheng Lecture Notes in Computer Science, Networking and Mobile Computing 3619 462 (2005) https://doi.org/10.1007/11534310_50
Progress in Cryptology – Mycrypt 2005
Mathieu Ciet and Francesco Sica Lecture Notes in Computer Science, Progress in Cryptology – Mycrypt 2005 3715 171 (2005) https://doi.org/10.1007/11554868_12
Analysis of linear combination algorithms in cryptography
Peter J. Grabner, Clemens Heuberger, Helmut Prodinger and Jörg M. Thuswaldner ACM Transactions on Algorithms 1(1) 123 (2005) https://doi.org/10.1145/1077464.1077473
Alternative Digit Sets for Nonadjacent Representations
Cryptographic Hardware and Embedded Systems - CHES 2004
Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle and Sheueling Chang Shantz Lecture Notes in Computer Science, Cryptographic Hardware and Embedded Systems - CHES 2004 3156 119 (2004) https://doi.org/10.1007/978-3-540-28632-5_9
Progress in Cryptology - INDOCRYPT 2004
Gildas Avoine, Jean Monnerat and Thomas Peyrin Lecture Notes in Computer Science, Progress in Cryptology - INDOCRYPT 2004 3348 260 (2004) https://doi.org/10.1007/978-3-540-30556-9_21
Elliptic and hyperelliptic curves on embedded μP
Thomas Wollinger, Jan Pelzl, Volker Wittelsberger, et al. ACM Transactions on Embedded Computing Systems 3(3) 509 (2004) https://doi.org/10.1145/1015047.1015051
Distribution results for low-weight binary representations for pairs of integers
Tae-Jun Park, Mun-Kyu Lee and Kunsoo Park Lecture Notes in Computer Science, Information Security and Cryptology — ICISC 2002 2587 264 (2003) https://doi.org/10.1007/3-540-36552-4_19
Cryptographic Hardware and Embedded Systems - CHES 2002
Jae Cheol Ha and Sang Jae Moon Lecture Notes in Computer Science, Cryptographic Hardware and Embedded Systems - CHES 2002 2523 551 (2003) https://doi.org/10.1007/3-540-36400-5_40
Cryptographic Hardware and Embedded Systems - CHES 2002
Katsuyuki Okeya and Kouichi Sakurai Lecture Notes in Computer Science, Cryptographic Hardware and Embedded Systems - CHES 2002 2523 564 (2003) https://doi.org/10.1007/3-540-36400-5_41
Cryptographic Hardware and Embedded Systems - CHES 2003
Pierre-Alain Fouque and Frederic Valette Lecture Notes in Computer Science, Cryptographic Hardware and Embedded Systems - CHES 2003 2779 269 (2003) https://doi.org/10.1007/978-3-540-45238-6_22
Advances in Cryptology — EUROCRYPT 2003
Mathieu Ciet, Tanja Lange, Francesco Sica and Jean-Jacques Quisquater Lecture Notes in Computer Science, Advances in Cryptology — EUROCRYPT 2003 2656 388 (2003) https://doi.org/10.1007/3-540-39200-9_24