#### Filter Results:

- Full text PDF available (7)

#### Publication Year

1991

2018

- This year (0)
- Last 5 years (11)
- Last 10 years (17)

#### Publication Type

#### Co-author

#### Journals and Conferences

Learn More

A mathematical evaluation and comparison of the space-efficiency of various 2D graphical representations of tree structures is presented. As part of the evaluation, a novel metric called the mean… (More)

- Christophe Nègre, Jean-Marc Robert
- AFRICACRYPT
- 2013

A scalar multiplication over a binary elliptic curve consists in a sequence of hundreds of multiplications, squarings and additions. This sequence of field operations often involves a large amount of… (More)

- Jean-Marc Robert, Christophe Bidan
- HotWiSec '13
- 2013

In most networks, it is simple to find the identity of participants communicating with each other or to link packet flows together. Our objective is to develop a proactive routing protocol for ad hoc… (More)

- Christophe Nègre, Jean-Marc Robert
- IEEE Transactions on Computers
- 2015

We present two new strategies for parallel implementation of scalar multiplication over elliptic curves. We first introduce a Montgomery-halving algorithm which is a variation of the original… (More)

- Tiantian Chu, Evans Robert, Funderlicy, Jean-Marc Robert, PlemmonszFebruary
- 1998

This paper discusses two general procedures for constructing the nearest approximation of a given matrix by one with any lower rank and any linear structure. Nearness can be measured in any matrix… (More)

An ecological interface (EI) consists in a user interface (UI) displaying the constraints of a specific environment in order to support a user’s decision-making process. The design gap problem can be… (More)

- Christophe Nègre, Thomas Plantard, Jean-Marc Robert
- IEEE 22nd Symposium on Computer Arithmetic
- 2015

The main operation in RSA encryption/decryption is the modular exponentiation, which involves a long sequence of modular squarings and multiplications. In this paper, we propose to improve modular… (More)

- Luis Fernando U. Garcia, Jean-Marc Robert
- 8th IFIP Annual Mediterranean Ad Hoc Networking…
- 2009

Wormhole attacks in ad-hoc networks have been attracting much attention over the years. They consist in two malicious nodes tunneling traffic from one end of the network to the other. Several… (More)