Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Galbraith, Steven D.
1999.
Constructing Isogenies between Elliptic Curves Over Finite Fields.
LMS Journal of Computation and Mathematics,
Vol. 2,
Issue. ,
p.
118.
Seroussi, G.
1999.
Elliptic curve cryptography.
p.
41.
Blake, Ian F.
1999.
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes.
Vol. 1719,
Issue. ,
p.
55.
López, Julio
and
Dahab, Ricardo
2000.
Progress in Cryptology —INDOCRYPT 2000.
Vol. 1977,
Issue. ,
p.
203.
Anwar Hasan, M.
2000.
Cryptographic Hardware and Embedded Systems — CHES 2000.
Vol. 1965,
Issue. ,
p.
93.
Buchmann, Johannes
and
Baier, Harald
2000.
Progress in Cryptology —INDOCRYPT 2000.
Vol. 1977,
Issue. ,
p.
191.
Okeya, Katsuyuki
and
Sakurai, Kouichi
2000.
Progress in Cryptology —INDOCRYPT 2000.
Vol. 1977,
Issue. ,
p.
178.
Okeya, Katsuyuki
Kurumatani, Hiroyuki
and
Sakurai, Kouichi
2000.
Public Key Cryptography.
Vol. 1751,
Issue. ,
p.
238.
Woodbury, Adam D.
Bailey, Daniel V.
and
Paar, Christof
2000.
Smart Card Research and Advanced Applications.
p.
71.
Aydos, M.
Yantk, T.
and
Koc, C.K.
2000.
A high-speed ECC-based wireless authentication on an ARM microprocessor.
p.
401.
Smart, N.P.
and
Muller, H.L.
2000.
A wearable public key infrastructure (WPKI).
p.
127.
Song, Boyeon
and
Kim, Kwangjo
2000.
Progress in Cryptology —INDOCRYPT 2000.
Vol. 1977,
Issue. ,
p.
237.
Orlando, Gerardo
and
Paar, Christof
2000.
Cryptographic Hardware and Embedded Systems — CHES 2000.
Vol. 1965,
Issue. ,
p.
41.
Smart, Nigel P.
2000.
Physical side-channel attacks on cryptographic systems.
Software Focus,
Vol. 1,
Issue. 2,
p.
6.
Leung, K.H.
Ma, K.W.
Wong, W.K.
and
Leong, P.H.W.
2000.
FPGA implementation of a microcoded elliptic curve cryptographic processor.
p.
68.
Liardet, P. -Y.
and
Smart, N. P.
2001.
Cryptographic Hardware and Embedded Systems — CHES 2001.
Vol. 2162,
Issue. ,
p.
391.
Boneh, Dan
and
Shparlinski, Igor E.
2001.
Advances in Cryptology — CRYPTO 2001.
Vol. 2139,
Issue. ,
p.
201.
Maurer, Markus
and
Müiler, Volker
2001.
Finding the Eigenvalue in Elkies' Algorithm.
Experimental Mathematics,
Vol. 10,
Issue. 2,
p.
275.
Lenstra, Arjen K.
2001.
Advances in Cryptology — ASIACRYPT 2001.
Vol. 2248,
Issue. ,
p.
67.
Taschwer, Mario
2001.
Kommunikationssicherheit im Zeichen des Internet.
p.
346.