The Citing articles tool gives a list of articles citing the current article. The citing articles come from EDP Sciences database, as well as other publishers participating in CrossRef Cited-by Linking Program. You can set up your personal account to receive an email alert each time this article is cited by a new article (see the menu on the right-hand side of the abstract page).
Birkhoff spectrum for diagonally self-affine sets and digit frequencies for GLS systems with redundancy
Jonny Imbierski, Charlene Kalle and Reza Mohammadpour Proceedings of the Royal Society of Edinburgh: Section A Mathematics 1 (2024) https://doi.org/10.1017/prm.2024.113
On the Construction of Short Addition-Subtraction Chains and their Applications
Comparison of scalar point multiplication algorithms in a low resource device
Mohamed Ramdani, Mohamed Benmohammed and Nadjia Benblidia Journal of King Saud University - Computer and Information Sciences 32(4) 425 (2020) https://doi.org/10.1016/j.jksuci.2019.07.013
Progress in Cryptology – INDOCRYPT 2020
Abhraneel Dutta, Aaron Hutchinson and Koray Karabina Lecture Notes in Computer Science, Progress in Cryptology – INDOCRYPT 2020 12578 248 (2020) https://doi.org/10.1007/978-3-030-65277-7_11
Proceedings of the Third International Conference on Microelectronics, Computing and Communication Systems
Anil Pinapati and R. Padmavathy Lecture Notes in Electrical Engineering, Proceedings of the Third International Conference on Microelectronics, Computing and Communication Systems 556 9 (2019) https://doi.org/10.1007/978-981-13-7091-5_2
Flexible Architectures for Cryptographic Algorithms — A Systematic Literature Review
Muhammad Rashid, Malik Imran, Atif Raza Jafri and Turki F. Al-Somani Journal of Circuits, Systems and Computers 28(03) 1930003 (2019) https://doi.org/10.1142/S0218126619300034
Arithmetic Considerations for Isogeny-Based Cryptography
Accelerated precomputation points–based scalar reduction on elliptic curve cryptography for wireless sensor networks
Youssou Faye, Hervé Guyennet, Shou Yanbo and Ibrahima Niang International Journal of Communication Systems 30(16) (2017) https://doi.org/10.1002/dac.3327
An Improved Signed Digit Representation of Integers
Iterative sliding window method for shorter number of operations in modular exponentiation and scalar multiplication
Adamu Muhammad Noma, Abdullah Muhammed, Zuriati Ahmad Zukarnain, Muhammad Afendee Mohamed and Duc Pham Cogent Engineering 4(1) 1304499 (2017) https://doi.org/10.1080/23311916.2017.1304499
Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmetic
Raveen R. Goundar, Marc Joye, Atsuko Miyaji, Matthieu Rivain and Alexandre Venelli Journal of Cryptographic Engineering 1(2) 161 (2011) https://doi.org/10.1007/s13389-011-0012-0
Shorter addition chain for smooth integers using decomposition method
M. A. Mohamed, M. R. Md Said, K. A. Mohd Atan and Z. Ahmad Zulkarnain International Journal of Computer Mathematics 88(11) 2222 (2011) https://doi.org/10.1080/00207160.2010.543456
Hybrid Binary-Ternary Number System for Elliptic Curve Cryptosystems
Katsuyuki Okeya, Hidehiro Kato and Yasuyuki Nogami Lecture Notes in Computer Science, Information Security, Practice and Experience 6047 67 (2010) https://doi.org/10.1007/978-3-642-12827-1_6
Modified Lim-Lee Combing Using Signed Window and Direct Doublings
Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation
Maurice Keller and William Marnane Lecture Notes in Computer Science, Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation 4644 310 (2007) https://doi.org/10.1007/978-3-540-74442-9_30
Minimal weight and colexicographically minimal integer representations
Stochastic Algorithms: Foundations and Applications
David Jao, S. Ramesh Raju and Ramarathnam Venkatesan Lecture Notes in Computer Science, Stochastic Algorithms: Foundations and Applications 4665 105 (2007) https://doi.org/10.1007/978-3-540-74871-7_10
Analysis of fractional window recoding methods and their application to elliptic curve cryptosystems
Johannes Blömer, Martin Otto and Jean-Pierre Seifert Lecture Notes in Computer Science, Fault Diagnosis and Tolerance in Cryptography 4236 36 (2006) https://doi.org/10.1007/11889700_4
Christophe Doche, Thomas Icart and David R. Kohel Lecture Notes in Computer Science, Public Key Cryptography - PKC 2006 3958 191 (2006) https://doi.org/10.1007/11745853_13
Fast elliptic scalar multiplication using new double-base chain and point halving
Haodong Wang and Qun Li Lecture Notes in Computer Science, Information and Communications Security 4307 519 (2006) https://doi.org/10.1007/11935308_37
Cryptology and Network Security
Fanyu Kong and Daxing Li Lecture Notes in Computer Science, Cryptology and Network Security 3810 223 (2005) https://doi.org/10.1007/11599371_19
Progress in Cryptology – Mycrypt 2005
Mathieu Ciet and Francesco Sica Lecture Notes in Computer Science, Progress in Cryptology – Mycrypt 2005 3715 171 (2005) https://doi.org/10.1007/11554868_12
Networking and Mobile Computing
Runhua Shi and Jiaxing Cheng Lecture Notes in Computer Science, Networking and Mobile Computing 3619 462 (2005) https://doi.org/10.1007/11534310_50
Analysis of linear combination algorithms in cryptography
Peter J. Grabner, Clemens Heuberger, Helmut Prodinger and Jörg M. Thuswaldner ACM Transactions on Algorithms 1(1) 123 (2005) https://doi.org/10.1145/1077464.1077473
Efficient algorithms for speeding up the computations of elliptic curve cryptosystems
Security and Privacy in Ad-hoc and Sensor Networks
Erik Dahmen, Katsuyuki Okeya and Tsuyoshi Takagi Lecture Notes in Computer Science, Security and Privacy in Ad-hoc and Sensor Networks 3813 189 (2005) https://doi.org/10.1007/11601494_16
Alternative Digit Sets for Nonadjacent Representations
Thomas Wollinger, Jan Pelzl, Volker Wittelsberger, et al. ACM Transactions on Embedded Computing Systems 3(3) 509 (2004) https://doi.org/10.1145/1015047.1015051
Distribution results for low-weight binary representations for pairs of integers
BaiJie Kuang, YueFei Zhu and YaJuan Zhang Lecture Notes in Computer Science, Applied Cryptography and Network Security 3089 467 (2004) https://doi.org/10.1007/978-3-540-24852-1_34
Progress in Cryptology - INDOCRYPT 2004
Gildas Avoine, Jean Monnerat and Thomas Peyrin Lecture Notes in Computer Science, Progress in Cryptology - INDOCRYPT 2004 3348 260 (2004) https://doi.org/10.1007/978-3-540-30556-9_21
Cryptographic Hardware and Embedded Systems - CHES 2004
Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle and Sheueling Chang Shantz Lecture Notes in Computer Science, Cryptographic Hardware and Embedded Systems - CHES 2004 3156 119 (2004) https://doi.org/10.1007/978-3-540-28632-5_9
Cryptographic Hardware and Embedded Systems - CHES 2004
Pierre-Alain Fouque, Frédéric Muller, Guillaume Poupard and Frédéric Valette Lecture Notes in Computer Science, Cryptographic Hardware and Embedded Systems - CHES 2004 3156 312 (2004) https://doi.org/10.1007/978-3-540-28632-5_23
Cryptographic Hardware and Embedded Systems - CHES 2002
Elisabeth Oswald Lecture Notes in Computer Science, Cryptographic Hardware and Embedded Systems - CHES 2002 2523 82 (2003) https://doi.org/10.1007/3-540-36400-5_8
Hardware architectures for public key cryptography
Cryptographic Hardware and Embedded Systems - CHES 2002
Jae Cheol Ha and Sang Jae Moon Lecture Notes in Computer Science, Cryptographic Hardware and Embedded Systems - CHES 2002 2523 551 (2003) https://doi.org/10.1007/3-540-36400-5_40
Cryptographic Hardware and Embedded Systems - CHES 2003
Pierre-Alain Fouque and Frederic Valette Lecture Notes in Computer Science, Cryptographic Hardware and Embedded Systems - CHES 2003 2779 269 (2003) https://doi.org/10.1007/978-3-540-45238-6_22
Cryptographic Hardware and Embedded Systems - CHES 2002
Katsuyuki Okeya and Kouichi Sakurai Lecture Notes in Computer Science, Cryptographic Hardware and Embedded Systems - CHES 2002 2523 564 (2003) https://doi.org/10.1007/3-540-36400-5_41
Information Security and Cryptology — ICISC 2002
Tae-Jun Park, Mun-Kyu Lee and Kunsoo Park Lecture Notes in Computer Science, Information Security and Cryptology — ICISC 2002 2587 264 (2003) https://doi.org/10.1007/3-540-36552-4_19
Advances in Cryptology — EUROCRYPT 2003
Mathieu Ciet, Tanja Lange, Francesco Sica and Jean-Jacques Quisquater Lecture Notes in Computer Science, Advances in Cryptology — EUROCRYPT 2003 2656 388 (2003) https://doi.org/10.1007/3-540-39200-9_24