Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Sutherland, Andrew
2013.
On the evaluation of modular polynomials.
The Open Book Series,
Vol. 1,
Issue. 1,
p.
531.
Tian, Zhaofei
and
Qiao, Sanzheng
2013.
An enhanced Jacobi method for lattice-reduction-aided MIMO detection.
p.
39.
Hunt, Duane
and
Al-Hamdani, Wasim A.
2013.
Theoretical Analysis of using Identity Based PKI as the Authentication method in SQL.
p.
33.
Elia, Michele
and
Schipani, Davide
2013.
On the Rabin Signature.
Journal of Discrete Mathematical Sciences and Cryptography,
Vol. 16,
Issue. 6,
p.
367.
Kurosawa, Kaoru
and
Ueda, Takuma
2013.
Advances in Information and Computer Security.
Vol. 8231,
Issue. ,
p.
217.
Mazzocco, Marta
and
Vidunas, Raimundas
2013.
Cubic and Quartic Transformations of the Sixth Painlevé Equation in Terms of Riemann–Hilbert Correspondence.
Studies in Applied Mathematics,
Vol. 130,
Issue. 1,
p.
17.
Wu, Hongfeng
Li, Liangze
and
Zhang, Fan
2013.
The Pairing Computation on Edwards Curves.
Mathematical Problems in Engineering,
Vol. 2013,
Issue. ,
p.
1.
Blomer, Johannes
Gunther, Peter
and
Liske, Gennadij
2014.
Tampering Attacks in Pairing-Based Cryptography.
p.
1.
Sokouti, Massoud
Zakerolhosseini, Ali
and
Sokouti, Babak
2014.
Encyclopedia of Information Science and Technology, Third Edition.
p.
3404.
Li, Liangze
Wu, Hongfeng
and
Zhang, Fan
2014.
Information Security and Cryptology.
Vol. 8567,
Issue. ,
p.
185.
Bos, Joppe W.
Costello, Craig
and
Naehrig, Michael
2014.
Selected Areas in Cryptography -- SAC 2013.
Vol. 8282,
Issue. ,
p.
438.
Blomer, Johannes
Silva, Ricardo Gomes da
Gunther, Peter
Kramer, Juliane
and
Seifert, Jean-Pierre
2014.
A Practical Second-Order Fault Attack against a Real-World Pairing Implementation.
p.
123.
Blackburn, Simon R.
and
Scott, Sam
2014.
The discrete logarithm problem for exponents of bounded height.
LMS Journal of Computation and Mathematics,
Vol. 17,
Issue. A,
p.
148.
Shparlinski, Igor E.
and
Sutherland, Andrew V.
2014.
On the Distribution of Atkin and Elkies Primes.
Foundations of Computational Mathematics,
Vol. 14,
Issue. 2,
p.
285.
Bos, Joppe W.
Costello, Craig
and
Miele, Andrea
2014.
Public-Key Cryptography – PKC 2014.
Vol. 8383,
Issue. ,
p.
203.
Ko, Wen-Tsai
Chiou, Shin-Yan
Lu, Erl-Huei
and
Chang, Henry Ker-Chang
2014.
Modifying the ECC-Based Grouping-Proof RFID System to Increase Inpatient Medication Safety.
Journal of Medical Systems,
Vol. 38,
Issue. 9,
Costello, Craig
and
Longa, Patrick
2015.
Advances in Cryptology -- ASIACRYPT 2015.
Vol. 9452,
Issue. ,
p.
214.
Shparlinski, Igor E.
and
Sutherland, Andrew V.
2015.
On the distribution of Atkin and Elkies primes for reductions of elliptic curves on average.
LMS Journal of Computation and Mathematics,
Vol. 18,
Issue. 1,
p.
308.
Elia, Michele
Piva, Matteo
and
Schipani, Davide
2015.
The Rabin cryptosystem revisited.
Applicable Algebra in Engineering, Communication and Computing,
Vol. 26,
Issue. 3,
p.
251.
Chi, Jesús-Javier
and
Oliveira, Thomaz
2015.
Progress in Cryptology -- LATINCRYPT 2015.
Vol. 9230,
Issue. ,
p.
308.