Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Wu, Hongfeng
Li, Liangze
and
Zhang, Fan
2013.
The Pairing Computation on Edwards Curves.
Mathematical Problems in Engineering,
Vol. 2013,
Issue. ,
p.
1.
Hunt, Duane
and
Al-Hamdani, Wasim A.
2013.
Theoretical Analysis of using Identity Based PKI as the Authentication method in SQL.
p.
33.
Mazzocco, Marta
and
Vidunas, Raimundas
2013.
Cubic and Quartic Transformations of the Sixth Painlevé Equation in Terms of Riemann–Hilbert Correspondence.
Studies in Applied Mathematics,
Vol. 130,
Issue. 1,
p.
17.
Elia, Michele
and
Schipani, Davide
2013.
On the Rabin Signature.
Journal of Discrete Mathematical Sciences and Cryptography,
Vol. 16,
Issue. 6,
p.
367.
Kurosawa, Kaoru
and
Ueda, Takuma
2013.
Advances in Information and Computer Security.
Vol. 8231,
Issue. ,
p.
217.
Sutherland, Andrew
2013.
On the evaluation of modular polynomials.
The Open Book Series,
Vol. 1,
Issue. 1,
p.
531.
Tian, Zhaofei
and
Qiao, Sanzheng
2013.
An enhanced Jacobi method for lattice-reduction-aided MIMO detection.
p.
39.
Bos, Joppe W.
Costello, Craig
and
Naehrig, Michael
2014.
Selected Areas in Cryptography -- SAC 2013.
Vol. 8282,
Issue. ,
p.
438.
Blomer, Johannes
Gunther, Peter
and
Liske, Gennadij
2014.
Tampering Attacks in Pairing-Based Cryptography.
p.
1.
Blomer, Johannes
Silva, Ricardo Gomes da
Gunther, Peter
Kramer, Juliane
and
Seifert, Jean-Pierre
2014.
A Practical Second-Order Fault Attack against a Real-World Pairing Implementation.
p.
123.
Blackburn, Simon R.
and
Scott, Sam
2014.
The discrete logarithm problem for exponents of bounded height.
LMS Journal of Computation and Mathematics,
Vol. 17,
Issue. A,
p.
148.
Sokouti, Massoud
Zakerolhosseini, Ali
and
Sokouti, Babak
2014.
Encyclopedia of Information Science and Technology, Third Edition.
p.
3404.
Ko, Wen-Tsai
Chiou, Shin-Yan
Lu, Erl-Huei
and
Chang, Henry Ker-Chang
2014.
Modifying the ECC-Based Grouping-Proof RFID System to Increase Inpatient Medication Safety.
Journal of Medical Systems,
Vol. 38,
Issue. 9,
Shparlinski, Igor E.
and
Sutherland, Andrew V.
2014.
On the Distribution of Atkin and Elkies Primes.
Foundations of Computational Mathematics,
Vol. 14,
Issue. 2,
p.
285.
Bos, Joppe W.
Costello, Craig
and
Miele, Andrea
2014.
Public-Key Cryptography – PKC 2014.
Vol. 8383,
Issue. ,
p.
203.
Li, Liangze
Wu, Hongfeng
and
Zhang, Fan
2014.
Information Security and Cryptology.
Vol. 8567,
Issue. ,
p.
185.
Costello, Craig
and
Longa, Patrick
2015.
Advances in Cryptology -- ASIACRYPT 2015.
Vol. 9452,
Issue. ,
p.
214.
Howe, James
Pöppelmann, Thomas
O'neill, Máire
O'sullivan, Elizabeth
and
Güneysu, Tim
2015.
Practical Lattice-Based Digital Signature Schemes.
ACM Transactions on Embedded Computing Systems,
Vol. 14,
Issue. 3,
p.
1.
Chi, Jesús-Javier
and
Oliveira, Thomaz
2015.
Progress in Cryptology -- LATINCRYPT 2015.
Vol. 9230,
Issue. ,
p.
308.
Elia, Michele
Piva, Matteo
and
Schipani, Davide
2015.
The Rabin cryptosystem revisited.
Applicable Algebra in Engineering, Communication and Computing,
Vol. 26,
Issue. 3,
p.
251.