Skip to search formSkip to main content

You are currently offline. Some features of the site may not work correctly.

Semantic Scholar uses AI to extract papers important to this topic.

2013

2013

This paper presents the performance evaluation of asymmetric cryptographic algorithms oriented to embedded platforms used in… Expand

Is this relevant?

2011

2011

Depuis le milieu des annees 1980, les varietes abeliennes ont ete abondamment utilisees en cryptographie a cle publique: le… Expand

Is this relevant?

2007

2007

In this paper we provide explicit formulae to compute bilinear pairings in compressed form. We indicate families of curves where… Expand

Is this relevant?

Highly Cited

2006

Highly Cited

2006

Digit serial multipliers are used extensively in hardware implementations of elliptic and hyperelliptic curve cryptography. This… Expand

Is this relevant?

Highly Cited

2005

Highly Cited

2005

Preface Introduction to Public-Key Cryptography Mathematical Background Algebraic Background Background on p-adic Numbers… Expand

Is this relevant?

Highly Cited

2005

Highly Cited

2005

Fix a small, non-empty set of blockcipher keys K. We say a blockcipher-based hash function is highly-efficient if it makes… Expand

Is this relevant?

2005

2005

Implementing public-key cryptography on platforms with limited resources, such as microprocessors, is a challenging task… Expand

Is this relevant?

Highly Cited

2004

Highly Cited

2004

We present a general technique for the efficient computation of pairings on Jacobians of supersingular curves. This formulation… Expand

Is this relevant?

2004

2004

Cryptographic algorithms are used in a large variety of different applications to ensure security services. It is, thus, very… Expand

Is this relevant?

2002

2002

Hyperelliptic curve cryptography with genus larger than one has not been seriously considered for cryptographic purposes because… Expand

Is this relevant?