Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Malan, D.J.
Welsh, M.
and
Smith, M.D.
2004.
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography.
p.
71.
Lange, Tanja
and
Mishra, Pradeep Kumar
2005.
Progress in Cryptology - INDOCRYPT 2005.
Vol. 3797,
Issue. ,
p.
403.
Dimitrov, Vassil
Imbert, Laurent
and
Mishra, Pradeep Kumar
2005.
Advances in Cryptology - ASIACRYPT 2005.
Vol. 3788,
Issue. ,
p.
59.
Crowe, F.
Daly, A.
and
Marnane, W.
2005.
A scalable dual mode arithmetic unit for public key cryptosystems.
p.
568.
Murty, Ram
and
Shparlinski, Igor
2006.
Topics in Geometry, Coding Theory and Cryptography.
Vol. 6,
Issue. ,
p.
167.
Akishita, Toru
and
Takagi, Tsuyoshi
2006.
Smart Card Research and Advanced Applications.
Vol. 3928,
Issue. ,
p.
151.
de Mulder, E.
Ors, S. B.
Preneel, B.
and
Verbauwhede, I.
2006.
Differential Electromagnetic Attack on an FPGA Implementation of Elliptic Curve Cryptosystems.
p.
1.
Fournier, J.J.A.
and
Moore, S.
2006.
Hardware-Software Codesign of a Vector Co-processor for Public Key Cryptography.
p.
439.
Doche, Christophe
and
Imbert, Laurent
2006.
Progress in Cryptology - INDOCRYPT 2006.
Vol. 4329,
Issue. ,
p.
335.
Shin, Seonghan
Kobara, Kazukuni
and
Imai, Hideki
2006.
Elliptic Curve based Authenticated Key Agreement Protocol for Wireless Security.
p.
1096.
Al-Riyami, S. S.
Malone-Lee, J.
and
Smart, N. P.
2006.
Escrow-free encryption supporting cryptographic workflow.
International Journal of Information Security,
Vol. 5,
Issue. 4,
p.
217.
Kamala, R.V.
and
Srinivas, M.B.
2006.
Modified Montgomery Modular Inversion with Reduced Number of Multiplications.
p.
1.
Batina, L.
Mentens, N.
Preneel, B.
and
Verbauwhede, I.
2006.
Flexible Hardware Architectures for Curve-based Cryptography.
p.
4839.
Dent, Alexander W.
and
Galbraith, Steven D.
2006.
Algorithmic Number Theory.
Vol. 4076,
Issue. ,
p.
436.
Cilardo, A.
Coppolino, L.
Mazzocca, N.
and
Romano, L.
2006.
Elliptic Curve Cryptography Engineering.
Proceedings of the IEEE,
Vol. 94,
Issue. 2,
p.
395.
Barreto, Paulo S. L. M.
and
Naehrig, Michael
2006.
Selected Areas in Cryptography.
Vol. 3897,
Issue. ,
p.
319.
Benits Junior, Waldyr D.
and
Galbraith, Steven D.
2007.
Cryptography and Coding.
Vol. 4887,
Issue. ,
p.
336.
Ó hÉigeartaigh, Colm
and
Scott, Michael
2007.
Selected Areas in Cryptography.
Vol. 4356,
Issue. ,
p.
302.
Alrimeih, Hamad
and
Rakhmatov, Daler
2007.
Security-Performance Trade-offs in Embedded Systems Using Flexible ECC Hardware.
IEEE Design & Test of Computers,
Vol. 24,
Issue. 6,
p.
556.
Kate, Aniket
Zaverucha, Greg
and
Goldberg, Ian
2007.
Privacy Enhancing Technologies.
Vol. 4776,
Issue. ,
p.
95.