Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Sutherland, Andrew
2013.
On the evaluation of modular polynomials.
The Open Book Series,
Vol. 1,
Issue. 1,
p.
531.
Wu, Hongfeng
Li, Liangze
and
Zhang, Fan
2013.
The Pairing Computation on Edwards Curves.
Mathematical Problems in Engineering,
Vol. 2013,
Issue. ,
p.
1.
Tian, Zhaofei
and
Qiao, Sanzheng
2013.
An enhanced Jacobi method for lattice-reduction-aided MIMO detection.
p.
39.
Hunt, Duane
and
Al-Hamdani, Wasim A.
2013.
Theoretical Analysis of using Identity Based PKI as the Authentication method in SQL.
p.
33.
Mazzocco, Marta
and
Vidunas, Raimundas
2013.
Cubic and Quartic Transformations of the Sixth Painlevé Equation in Terms of Riemann–Hilbert Correspondence.
Studies in Applied Mathematics,
Vol. 130,
Issue. 1,
p.
17.
Kurosawa, Kaoru
and
Ueda, Takuma
2013.
Advances in Information and Computer Security.
Vol. 8231,
Issue. ,
p.
217.
Elia, Michele
and
Schipani, Davide
2013.
On the Rabin Signature.
Journal of Discrete Mathematical Sciences and Cryptography,
Vol. 16,
Issue. 6,
p.
367.
Bos, Joppe W.
Costello, Craig
and
Naehrig, Michael
2014.
Selected Areas in Cryptography -- SAC 2013.
Vol. 8282,
Issue. ,
p.
438.
Li, Liangze
Wu, Hongfeng
and
Zhang, Fan
2014.
Information Security and Cryptology.
Vol. 8567,
Issue. ,
p.
185.
Blackburn, Simon R.
and
Scott, Sam
2014.
The discrete logarithm problem for exponents of bounded height.
LMS Journal of Computation and Mathematics,
Vol. 17,
Issue. A,
p.
148.
Blomer, Johannes
Silva, Ricardo Gomes da
Gunther, Peter
Kramer, Juliane
and
Seifert, Jean-Pierre
2014.
A Practical Second-Order Fault Attack against a Real-World Pairing Implementation.
p.
123.
Shparlinski, Igor E.
and
Sutherland, Andrew V.
2014.
On the Distribution of Atkin and Elkies Primes.
Foundations of Computational Mathematics,
Vol. 14,
Issue. 2,
p.
285.
Bos, Joppe W.
Costello, Craig
and
Miele, Andrea
2014.
Public-Key Cryptography – PKC 2014.
Vol. 8383,
Issue. ,
p.
203.
Ko, Wen-Tsai
Chiou, Shin-Yan
Lu, Erl-Huei
and
Chang, Henry Ker-Chang
2014.
Modifying the ECC-Based Grouping-Proof RFID System to Increase Inpatient Medication Safety.
Journal of Medical Systems,
Vol. 38,
Issue. 9,
Sokouti, Massoud
Zakerolhosseini, Ali
and
Sokouti, Babak
2014.
Encyclopedia of Information Science and Technology, Third Edition.
p.
3404.
Blomer, Johannes
Gunther, Peter
and
Liske, Gennadij
2014.
Tampering Attacks in Pairing-Based Cryptography.
p.
1.
Shparlinski, Igor E.
and
Sutherland, Andrew V.
2015.
On the distribution of Atkin and Elkies primes for reductions of elliptic curves on average.
LMS Journal of Computation and Mathematics,
Vol. 18,
Issue. 1,
p.
308.
Costello, Craig
and
Longa, Patrick
2015.
Advances in Cryptology -- ASIACRYPT 2015.
Vol. 9452,
Issue. ,
p.
214.
Howe, James
Pöppelmann, Thomas
O'neill, Máire
O'sullivan, Elizabeth
and
Güneysu, Tim
2015.
Practical Lattice-Based Digital Signature Schemes.
ACM Transactions on Embedded Computing Systems,
Vol. 14,
Issue. 3,
p.
1.
Elia, Michele
Piva, Matteo
and
Schipani, Davide
2015.
The Rabin cryptosystem revisited.
Applicable Algebra in Engineering, Communication and Computing,
Vol. 26,
Issue. 3,
p.
251.