Speeding up subgroup cryptosystems

@inproceedings{Stam2003SpeedingUS,
  title={Speeding up subgroup cryptosystems},
  author={Marinka M H Stam},
  year={2003}
}
• A submitted manuscript is the version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official published version of record. People interested in the research are advised to contact the author for the final version of the publication, or visit the DOI to the publisher's website. • The final author version and the galley proof are versions of the publication after peer review. • The final published version features… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 23 CITATIONS

A note on schoenmakers algorithm for multi exponentiation

  • 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE)
  • 2015
VIEW 4 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

High Security Pairing-Based Cryptography Revisited

  • IACR Cryptology ePrint Archive
  • 2006
VIEW 10 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

References

Publications referenced by this paper.
SHOWING 1-10 OF 174 REFERENCES

The XTR Public Key System

VIEW 14 EXCERPTS
HIGHLY INFLUENTIAL

Seminumerical Algorithms

D. E. Knuth
  • volume 2 of The Art of Computer Programming. Addison Wesley, 3 edition
  • 1997
VIEW 18 EXCERPTS
HIGHLY INFLUENTIAL

On the evaluation of powers and related problems

  • 17th Annual Symposium on Foundations of Computer Science (sfcs 1976)
  • 1976
VIEW 12 EXCERPTS
HIGHLY INFLUENTIAL

Pippenger's Exponentiation Algorithm

VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL