The Citing articles tool gives a list of articles citing the current article. The citing articles come from EDP Sciences database, as well as other publishers participating in CrossRef Cited-by Linking Program. You can set up your personal account to receive an email alert each time this article is cited by a new article (see the menu on the right-hand side of the abstract page).
This article has been cited by the following article(s):
Birkhoff spectrum for diagonally self-affine sets and digit frequencies for GLS systems with redundancy
Jonny Imbierski, Charlene Kalle and Reza Mohammadpour Proceedings of the Royal Society of Edinburgh: Section A Mathematics 1 (2024) https://doi.org/10.1017/prm.2024.113
Lookup Table-Based Design of Scalar Multiplication for Elliptic Curve Cryptography
Abhraneel Dutta, Aaron Hutchinson and Koray Karabina Lecture Notes in Computer Science, Progress in Cryptology – INDOCRYPT 2020 12578 248 (2020) https://doi.org/10.1007/978-3-030-65277-7_11
Comparison of scalar point multiplication algorithms in a low resource device
Mohamed Ramdani, Mohamed Benmohammed and Nadjia Benblidia Journal of King Saud University - Computer and Information Sciences 32(4) 425 (2020) https://doi.org/10.1016/j.jksuci.2019.07.013
On the minimal Hamming weight of a multi-base representation
Proceedings of the Third International Conference on Microelectronics, Computing and Communication Systems
Anil Pinapati and R. Padmavathy Lecture Notes in Electrical Engineering, Proceedings of the Third International Conference on Microelectronics, Computing and Communication Systems 556 9 (2019) https://doi.org/10.1007/978-981-13-7091-5_2
Flexible Architectures for Cryptographic Algorithms — A Systematic Literature Review
Muhammad Rashid, Malik Imran, Atif Raza Jafri and Turki F. Al-Somani Journal of Circuits, Systems and Computers 28(03) 1930003 (2019) https://doi.org/10.1142/S0218126619300034
Arithmetic Considerations for Isogeny-Based Cryptography
Iterative sliding window method for shorter number of operations in modular exponentiation and scalar multiplication
Adamu Muhammad Noma, Abdullah Muhammed, Zuriati Ahmad Zukarnain, Muhammad Afendee Mohamed and Duc Pham Cogent Engineering 4(1) 1304499 (2017) https://doi.org/10.1080/23311916.2017.1304499
Accelerated precomputation points–based scalar reduction on elliptic curve cryptography for wireless sensor networks
Youssou Faye, Hervé Guyennet, Shou Yanbo and Ibrahima Niang International Journal of Communication Systems 30(16) (2017) https://doi.org/10.1002/dac.3327
An Improved Signed Digit Representation of Integers
Nashwa A. F. Mohamed, Mohsin H. A. Hashim and Michael Hutter Lecture Notes in Computer Science, Progress in Cryptology - AFRICACRYPT 2012 7374 342 (2012) https://doi.org/10.1007/978-3-642-31410-0_21
An Innovative Scalar Multiplication Method Based on Improved m-ary
Shorter addition chain for smooth integers using decomposition method
M. A. Mohamed, M. R. Md Said, K. A. Mohd Atan and Z. Ahmad Zulkarnain International Journal of Computer Mathematics 88(11) 2222 (2011) https://doi.org/10.1080/00207160.2010.543456
Hybrid Binary-Ternary Number System for Elliptic Curve Cryptosystems
Katsuyuki Okeya, Hidehiro Kato and Yasuyuki Nogami Lecture Notes in Computer Science, Information Security, Practice and Experience 6047 67 (2010) https://doi.org/10.1007/978-3-642-12827-1_6
Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation
Maurice Keller and William Marnane Lecture Notes in Computer Science, Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation 4644 310 (2007) https://doi.org/10.1007/978-3-540-74442-9_30
Stochastic Algorithms: Foundations and Applications
David Jao, S. Ramesh Raju and Ramarathnam Venkatesan Lecture Notes in Computer Science, Stochastic Algorithms: Foundations and Applications 4665 105 (2007) https://doi.org/10.1007/978-3-540-74871-7_10
Johannes Blömer, Martin Otto and Jean-Pierre Seifert Lecture Notes in Computer Science, Fault Diagnosis and Tolerance in Cryptography 4236 36 (2006) https://doi.org/10.1007/11889700_4
Progress in Cryptology - INDOCRYPT 2006
Christophe Doche and Laurent Imbert Lecture Notes in Computer Science, Progress in Cryptology - INDOCRYPT 2006 4329 335 (2006) https://doi.org/10.1007/11941378_24
Analysis of fractional window recoding methods and their application to elliptic curve cryptosystems
Christophe Doche, Thomas Icart and David R. Kohel Lecture Notes in Computer Science, Public Key Cryptography - PKC 2006 3958 191 (2006) https://doi.org/10.1007/11745853_13
Analysis of linear combination algorithms in cryptography
Peter J. Grabner, Clemens Heuberger, Helmut Prodinger and Jörg M. Thuswaldner ACM Transactions on Algorithms 1(1) 123 (2005) https://doi.org/10.1145/1077464.1077473
Security and Privacy in Ad-hoc and Sensor Networks
Erik Dahmen, Katsuyuki Okeya and Tsuyoshi Takagi Lecture Notes in Computer Science, Security and Privacy in Ad-hoc and Sensor Networks 3813 189 (2005) https://doi.org/10.1007/11601494_16
Efficient algorithms for speeding up the computations of elliptic curve cryptosystems
Runhua Shi and Jiaxing Cheng Lecture Notes in Computer Science, Networking and Mobile Computing 3619 462 (2005) https://doi.org/10.1007/11534310_50
Progress in Cryptology – Mycrypt 2005
Mathieu Ciet and Francesco Sica Lecture Notes in Computer Science, Progress in Cryptology – Mycrypt 2005 3715 171 (2005) https://doi.org/10.1007/11554868_12
Algorithms – ESA 2005
Gurmeet Singh Manku and Joe Sawada Lecture Notes in Computer Science, Algorithms – ESA 2005 3669 438 (2005) https://doi.org/10.1007/11561071_40
Alternative Digit Sets for Nonadjacent Representations
Gildas Avoine, Jean Monnerat and Thomas Peyrin Lecture Notes in Computer Science, Progress in Cryptology - INDOCRYPT 2004 3348 260 (2004) https://doi.org/10.1007/978-3-540-30556-9_21
Elliptic and hyperelliptic curves on embedded μP
Thomas Wollinger, Jan Pelzl, Volker Wittelsberger, et al. ACM Transactions on Embedded Computing Systems 3(3) 509 (2004) https://doi.org/10.1145/1015047.1015051
Cryptographic Hardware and Embedded Systems - CHES 2004
Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle and Sheueling Chang Shantz Lecture Notes in Computer Science, Cryptographic Hardware and Embedded Systems - CHES 2004 3156 119 (2004) https://doi.org/10.1007/978-3-540-28632-5_9
Cryptographic Hardware and Embedded Systems - CHES 2004
Pierre-Alain Fouque, Frédéric Muller, Guillaume Poupard and Frédéric Valette Lecture Notes in Computer Science, Cryptographic Hardware and Embedded Systems - CHES 2004 3156 312 (2004) https://doi.org/10.1007/978-3-540-28632-5_23
Applied Cryptography and Network Security
BaiJie Kuang, YueFei Zhu and YaJuan Zhang Lecture Notes in Computer Science, Applied Cryptography and Network Security 3089 467 (2004) https://doi.org/10.1007/978-3-540-24852-1_34
Minimal expansions in redundant number systems: Fibonacci bases and Greedy algorithms
Dong-Guk Han, Nam Su Chang, Seok Won Jung, et al. Lecture Notes in Computer Science, Information Security and Privacy 2727 67 (2003) https://doi.org/10.1007/3-540-45067-X_7
Advances in Cryptology — EUROCRYPT 2003
Mathieu Ciet, Tanja Lange, Francesco Sica and Jean-Jacques Quisquater Lecture Notes in Computer Science, Advances in Cryptology — EUROCRYPT 2003 2656 388 (2003) https://doi.org/10.1007/3-540-39200-9_24
Cryptographic Hardware and Embedded Systems - CHES 2003
Pierre-Alain Fouque and Frederic Valette Lecture Notes in Computer Science, Cryptographic Hardware and Embedded Systems - CHES 2003 2779 269 (2003) https://doi.org/10.1007/978-3-540-45238-6_22
Cryptographic Hardware and Embedded Systems - CHES 2002
Elisabeth Oswald Lecture Notes in Computer Science, Cryptographic Hardware and Embedded Systems - CHES 2002 2523 82 (2003) https://doi.org/10.1007/3-540-36400-5_8
Cryptographic Hardware and Embedded Systems - CHES 2002
Jae Cheol Ha and Sang Jae Moon Lecture Notes in Computer Science, Cryptographic Hardware and Embedded Systems - CHES 2002 2523 551 (2003) https://doi.org/10.1007/3-540-36400-5_40
Hardware architectures for public key cryptography
Tae-Jun Park, Mun-Kyu Lee and Kunsoo Park Lecture Notes in Computer Science, Information Security and Cryptology — ICISC 2002 2587 264 (2003) https://doi.org/10.1007/3-540-36552-4_19