# Jerome A. Solinas

- Publications
- Influence

Claim Your Author Page

Ensure your research is discoverable on Semantic Scholar. Claiming your author page allows you to personalize the information displayed and manage your publications. Semantic Scholar automatically creates author pages based on data aggregated from

**public sources and our publisher partners.**It has become increasingly common to implement discrete-logarithm based public-key protocols on elliptic curves over finite fields. The basic operation is scalar multiplication: taking a given… Expand

It has become increasingly common to implement discrete-logarithm based public-key protocols on elliptic curves over finite fields. The basic operation is scalar multiplication: taking a given… Expand

This paper proposes an efficient two-pass protocol for authenticated key agreement in the asymmetric (public-key) setting. The protocol is based on Diffie-Hellman key agreement and can be modified to… Expand

Shamir's method speeds up the computation of the product of powers of two elements of a group, a common object in public-key algorithms. Shamir's method is based on binary expansions and was designed… Expand

Let s(n) be the sum of the digits of n written to the base b. We determine the joint distribution (modulo m) of the sequences s(k1n), …, s(kln). In the case where m and b − 1 are relatively prime, we… Expand

Secure shell (SSH) is a secure remote-login protocol. SSH provides for
algorithms that provide authentication, key agreement,
confidentiality, and data-integrity services. The purpose of this… Expand

This document describes how the Elliptic Curve Digital Signature
Algorithm (ECDSA) may be used as the authentication method within the
Internet Key Exchange (IKE) and Internet Key Exchange version 2… Expand

This document proposes four optional cryptographic user interface
suites ("UI suites") for IPsec, similar to the two suites specified in
RFC 4308. The four new suites provide compatibility with the… Expand