The Citing articles tool gives a list of articles citing the current article. The citing articles come from EDP Sciences database, as well as other publishers participating in CrossRef Cited-by Linking Program. You can set up your personal account to receive an email alert each time this article is cited by a new article (see the menu on the right-hand side of the abstract page).
Comparison of scalar point multiplication algorithms in a low resource device
Mohamed Ramdani, Mohamed Benmohammed and Nadjia Benblidia Journal of King Saud University - Computer and Information Sciences 32(4) 425 (2020) https://doi.org/10.1016/j.jksuci.2019.07.013
Progress in Cryptology – INDOCRYPT 2020
Abhraneel Dutta, Aaron Hutchinson and Koray Karabina Lecture Notes in Computer Science, Progress in Cryptology – INDOCRYPT 2020 12578 248 (2020) https://doi.org/10.1007/978-3-030-65277-7_11
On the minimal Hamming weight of a multi-base representation
Flexible Architectures for Cryptographic Algorithms — A Systematic Literature Review
Muhammad Rashid, Malik Imran, Atif Raza Jafri and Turki F. Al-Somani Journal of Circuits, Systems and Computers 28(03) 1930003 (2019) https://doi.org/10.1142/S0218126619300034
Proceedings of the Third International Conference on Microelectronics, Computing and Communication Systems
Anil Pinapati and R. Padmavathy Lecture Notes in Electrical Engineering, Proceedings of the Third International Conference on Microelectronics, Computing and Communication Systems 556 9 (2019) https://doi.org/10.1007/978-981-13-7091-5_2
Arithmetic Considerations for Isogeny-Based Cryptography
Iterative sliding window method for shorter number of operations in modular exponentiation and scalar multiplication
Adamu Muhammad Noma, Abdullah Muhammed, Zuriati Ahmad Zukarnain, Muhammad Afendee Mohamed and Duc Pham Cogent Engineering 4(1) 1304499 (2017) https://doi.org/10.1080/23311916.2017.1304499
An Improved Signed Digit Representation of Integers
Accelerated precomputation points–based scalar reduction on elliptic curve cryptography for wireless sensor networks
Youssou Faye, Hervé Guyennet, Shou Yanbo and Ibrahima Niang International Journal of Communication Systems 30(16) (2017) https://doi.org/10.1002/dac.3327
Nashwa A. F. Mohamed, Mohsin H. A. Hashim and Michael Hutter Lecture Notes in Computer Science, Progress in Cryptology - AFRICACRYPT 2012 7374 342 (2012) https://doi.org/10.1007/978-3-642-31410-0_21
An Innovative Scalar Multiplication Method Based on Improved m-ary
Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmetic
Raveen R. Goundar, Marc Joye, Atsuko Miyaji, Matthieu Rivain and Alexandre Venelli Journal of Cryptographic Engineering 1(2) 161 (2011) https://doi.org/10.1007/s13389-011-0012-0
Shorter addition chain for smooth integers using decomposition method
M. A. Mohamed, M. R. Md Said, K. A. Mohd Atan and Z. Ahmad Zulkarnain International Journal of Computer Mathematics 88(11) 2222 (2011) https://doi.org/10.1080/00207160.2010.543456
Katsuyuki Okeya, Hidehiro Kato and Yasuyuki Nogami Lecture Notes in Computer Science, Information Security, Practice and Experience 6047 67 (2010) https://doi.org/10.1007/978-3-642-12827-1_6
Unbalanced digit sets and the closest choice strategy for minimal weight integer representations
Stochastic Algorithms: Foundations and Applications
David Jao, S. Ramesh Raju and Ramarathnam Venkatesan Lecture Notes in Computer Science, Stochastic Algorithms: Foundations and Applications 4665 105 (2007) https://doi.org/10.1007/978-3-540-74871-7_10
Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation
Maurice Keller and William Marnane Lecture Notes in Computer Science, Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation 4644 310 (2007) https://doi.org/10.1007/978-3-540-74442-9_30
Johannes Blömer, Martin Otto and Jean-Pierre Seifert Lecture Notes in Computer Science, Fault Diagnosis and Tolerance in Cryptography 4236 36 (2006) https://doi.org/10.1007/11889700_4
Analysis of fractional window recoding methods and their application to elliptic curve cryptosystems
Christophe Doche, Thomas Icart and David R. Kohel Lecture Notes in Computer Science, Public Key Cryptography - PKC 2006 3958 191 (2006) https://doi.org/10.1007/11745853_13
Fast elliptic scalar multiplication using new double-base chain and point halving
Security and Privacy in Ad-hoc and Sensor Networks
Erik Dahmen, Katsuyuki Okeya and Tsuyoshi Takagi Lecture Notes in Computer Science, Security and Privacy in Ad-hoc and Sensor Networks 3813 189 (2005) https://doi.org/10.1007/11601494_16
Cryptology and Network Security
Fanyu Kong and Daxing Li Lecture Notes in Computer Science, Cryptology and Network Security 3810 223 (2005) https://doi.org/10.1007/11599371_19
Networking and Mobile Computing
Runhua Shi and Jiaxing Cheng Lecture Notes in Computer Science, Networking and Mobile Computing 3619 462 (2005) https://doi.org/10.1007/11534310_50
Analysis of linear combination algorithms in cryptography
Peter J. Grabner, Clemens Heuberger, Helmut Prodinger and Jörg M. Thuswaldner ACM Transactions on Algorithms 1(1) 123 (2005) https://doi.org/10.1145/1077464.1077473
Progress in Cryptology – Mycrypt 2005
Mathieu Ciet and Francesco Sica Lecture Notes in Computer Science, Progress in Cryptology – Mycrypt 2005 3715 171 (2005) https://doi.org/10.1007/11554868_12
Efficient algorithms for speeding up the computations of elliptic curve cryptosystems
Cryptographic Hardware and Embedded Systems - CHES 2004
Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle and Sheueling Chang Shantz Lecture Notes in Computer Science, Cryptographic Hardware and Embedded Systems - CHES 2004 3156 119 (2004) https://doi.org/10.1007/978-3-540-28632-5_9
Progress in Cryptology - INDOCRYPT 2004
Gildas Avoine, Jean Monnerat and Thomas Peyrin Lecture Notes in Computer Science, Progress in Cryptology - INDOCRYPT 2004 3348 260 (2004) https://doi.org/10.1007/978-3-540-30556-9_21
Applied Cryptography and Network Security
BaiJie Kuang, YueFei Zhu and YaJuan Zhang Lecture Notes in Computer Science, Applied Cryptography and Network Security 3089 467 (2004) https://doi.org/10.1007/978-3-540-24852-1_34
Minimal expansions in redundant number systems: Fibonacci bases and Greedy algorithms
Thomas Wollinger, Jan Pelzl, Volker Wittelsberger, et al. ACM Transactions on Embedded Computing Systems 3(3) 509 (2004) https://doi.org/10.1145/1015047.1015051
Distribution results for low-weight binary representations for pairs of integers
Cryptographic Hardware and Embedded Systems - CHES 2004
Pierre-Alain Fouque, Frédéric Muller, Guillaume Poupard and Frédéric Valette Lecture Notes in Computer Science, Cryptographic Hardware and Embedded Systems - CHES 2004 3156 312 (2004) https://doi.org/10.1007/978-3-540-28632-5_23
Information Security and Cryptology — ICISC 2002
Tae-Jun Park, Mun-Kyu Lee and Kunsoo Park Lecture Notes in Computer Science, Information Security and Cryptology — ICISC 2002 2587 264 (2003) https://doi.org/10.1007/3-540-36552-4_19
Cryptographic Hardware and Embedded Systems - CHES 2002
Elisabeth Oswald Lecture Notes in Computer Science, Cryptographic Hardware and Embedded Systems - CHES 2002 2523 82 (2003) https://doi.org/10.1007/3-540-36400-5_8
Information Security and Privacy
Dong-Guk Han, Nam Su Chang, Seok Won Jung, et al. Lecture Notes in Computer Science, Information Security and Privacy 2727 67 (2003) https://doi.org/10.1007/3-540-45067-X_7
Cryptographic Hardware and Embedded Systems - CHES 2002
Jae Cheol Ha and Sang Jae Moon Lecture Notes in Computer Science, Cryptographic Hardware and Embedded Systems - CHES 2002 2523 551 (2003) https://doi.org/10.1007/3-540-36400-5_40
Hardware architectures for public key cryptography