The Citing articles tool gives a list of articles citing the current article. The citing articles come from EDP Sciences database, as well as other publishers participating in CrossRef Cited-by Linking Program. You can set up your personal account to receive an email alert each time this article is cited by a new article (see the menu on the right-hand side of the abstract page).
Birkhoff spectrum for diagonally self-affine sets and digit frequencies for GLS systems with redundancy
Jonny Imbierski, Charlene Kalle and Reza Mohammadpour Proceedings of the Royal Society of Edinburgh: Section A Mathematics 1 (2024) https://doi.org/10.1017/prm.2024.113
Lookup Table-Based Design of Scalar Multiplication for Elliptic Curve Cryptography
Comparison of scalar point multiplication algorithms in a low resource device
Mohamed Ramdani, Mohamed Benmohammed and Nadjia Benblidia Journal of King Saud University - Computer and Information Sciences 32(4) 425 (2020) https://doi.org/10.1016/j.jksuci.2019.07.013
Progress in Cryptology – INDOCRYPT 2020
Abhraneel Dutta, Aaron Hutchinson and Koray Karabina Lecture Notes in Computer Science, Progress in Cryptology – INDOCRYPT 2020 12578 248 (2020) https://doi.org/10.1007/978-3-030-65277-7_11
Flexible Architectures for Cryptographic Algorithms — A Systematic Literature Review
Muhammad Rashid, Malik Imran, Atif Raza Jafri and Turki F. Al-Somani Journal of Circuits, Systems and Computers 28(03) 1930003 (2019) https://doi.org/10.1142/S0218126619300034
Proceedings of the Third International Conference on Microelectronics, Computing and Communication Systems
Anil Pinapati and R. Padmavathy Lecture Notes in Electrical Engineering, Proceedings of the Third International Conference on Microelectronics, Computing and Communication Systems 556 9 (2019) https://doi.org/10.1007/978-981-13-7091-5_2
Arithmetic Considerations for Isogeny-Based Cryptography
Iterative sliding window method for shorter number of operations in modular exponentiation and scalar multiplication
Adamu Muhammad Noma, Abdullah Muhammed, Zuriati Ahmad Zukarnain, Muhammad Afendee Mohamed and Duc Pham Cogent Engineering 4(1) 1304499 (2017) https://doi.org/10.1080/23311916.2017.1304499
An Improved Signed Digit Representation of Integers
Accelerated precomputation points–based scalar reduction on elliptic curve cryptography for wireless sensor networks
Youssou Faye, Hervé Guyennet, Shou Yanbo and Ibrahima Niang International Journal of Communication Systems 30(16) (2017) https://doi.org/10.1002/dac.3327
Joppe W. Bos, Craig Costello, Huseyin Hisil and Kristin Lauter Lecture Notes in Computer Science, Advances in Cryptology – EUROCRYPT 2013 7881 194 (2013) https://doi.org/10.1007/978-3-642-38348-9_12
Progress in Cryptology - AFRICACRYPT 2012
Nashwa A. F. Mohamed, Mohsin H. A. Hashim and Michael Hutter Lecture Notes in Computer Science, Progress in Cryptology - AFRICACRYPT 2012 7374 342 (2012) https://doi.org/10.1007/978-3-642-31410-0_21
An Innovative Scalar Multiplication Method Based on Improved m-ary
Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmetic
Raveen R. Goundar, Marc Joye, Atsuko Miyaji, Matthieu Rivain and Alexandre Venelli Journal of Cryptographic Engineering 1(2) 161 (2011) https://doi.org/10.1007/s13389-011-0012-0
Katsuyuki Okeya, Hidehiro Kato and Yasuyuki Nogami Lecture Notes in Computer Science, Information Security, Practice and Experience 6047 67 (2010) https://doi.org/10.1007/978-3-642-12827-1_6
Redundant τ-Adic Expansions II: Non-Optimality and Chaotic Behaviour
Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation
Maurice Keller and William Marnane Lecture Notes in Computer Science, Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation 4644 310 (2007) https://doi.org/10.1007/978-3-540-74442-9_30
Stochastic Algorithms: Foundations and Applications
David Jao, S. Ramesh Raju and Ramarathnam Venkatesan Lecture Notes in Computer Science, Stochastic Algorithms: Foundations and Applications 4665 105 (2007) https://doi.org/10.1007/978-3-540-74871-7_10
Christophe Doche, Thomas Icart and David R. Kohel Lecture Notes in Computer Science, Public Key Cryptography - PKC 2006 3958 191 (2006) https://doi.org/10.1007/11745853_13
Christophe Doche and Laurent Imbert Lecture Notes in Computer Science, Progress in Cryptology - INDOCRYPT 2006 4329 335 (2006) https://doi.org/10.1007/11941378_24
Security and Privacy in Ad-hoc and Sensor Networks
Erik Dahmen, Katsuyuki Okeya and Tsuyoshi Takagi Lecture Notes in Computer Science, Security and Privacy in Ad-hoc and Sensor Networks 3813 189 (2005) https://doi.org/10.1007/11601494_16
Cryptology and Network Security
Fanyu Kong and Daxing Li Lecture Notes in Computer Science, Cryptology and Network Security 3810 223 (2005) https://doi.org/10.1007/11599371_19
Progress in Cryptology – Mycrypt 2005
Mathieu Ciet and Francesco Sica Lecture Notes in Computer Science, Progress in Cryptology – Mycrypt 2005 3715 171 (2005) https://doi.org/10.1007/11554868_12
Efficient algorithms for speeding up the computations of elliptic curve cryptosystems
Analysis of linear combination algorithms in cryptography
Peter J. Grabner, Clemens Heuberger, Helmut Prodinger and Jörg M. Thuswaldner ACM Transactions on Algorithms 1(1) 123 (2005) https://doi.org/10.1145/1077464.1077473
Runhua Shi and Jiaxing Cheng Lecture Notes in Computer Science, Networking and Mobile Computing 3619 462 (2005) https://doi.org/10.1007/11534310_50
Cryptographic Hardware and Embedded Systems - CHES 2004
Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle and Sheueling Chang Shantz Lecture Notes in Computer Science, Cryptographic Hardware and Embedded Systems - CHES 2004 3156 119 (2004) https://doi.org/10.1007/978-3-540-28632-5_9
Progress in Cryptology - INDOCRYPT 2004
Gildas Avoine, Jean Monnerat and Thomas Peyrin Lecture Notes in Computer Science, Progress in Cryptology - INDOCRYPT 2004 3348 260 (2004) https://doi.org/10.1007/978-3-540-30556-9_21
Elliptic and hyperelliptic curves on embedded μP
Thomas Wollinger, Jan Pelzl, Volker Wittelsberger, et al. ACM Transactions on Embedded Computing Systems 3(3) 509 (2004) https://doi.org/10.1145/1015047.1015051
Distribution results for low-weight binary representations for pairs of integers
BaiJie Kuang, YueFei Zhu and YaJuan Zhang Lecture Notes in Computer Science, Applied Cryptography and Network Security 3089 467 (2004) https://doi.org/10.1007/978-3-540-24852-1_34
Information Security and Cryptology — ICISC 2002
Tae-Jun Park, Mun-Kyu Lee and Kunsoo Park Lecture Notes in Computer Science, Information Security and Cryptology — ICISC 2002 2587 264 (2003) https://doi.org/10.1007/3-540-36552-4_19
Cryptographic Hardware and Embedded Systems - CHES 2002
Jae Cheol Ha and Sang Jae Moon Lecture Notes in Computer Science, Cryptographic Hardware and Embedded Systems - CHES 2002 2523 551 (2003) https://doi.org/10.1007/3-540-36400-5_40
Cryptographic Hardware and Embedded Systems - CHES 2003
Pierre-Alain Fouque and Frederic Valette Lecture Notes in Computer Science, Cryptographic Hardware and Embedded Systems - CHES 2003 2779 269 (2003) https://doi.org/10.1007/978-3-540-45238-6_22
Cryptographic Hardware and Embedded Systems - CHES 2002
Katsuyuki Okeya and Kouichi Sakurai Lecture Notes in Computer Science, Cryptographic Hardware and Embedded Systems - CHES 2002 2523 564 (2003) https://doi.org/10.1007/3-540-36400-5_41
Hardware architectures for public key cryptography
Dong-Guk Han, Nam Su Chang, Seok Won Jung, et al. Lecture Notes in Computer Science, Information Security and Privacy 2727 67 (2003) https://doi.org/10.1007/3-540-45067-X_7