Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Galbraith, Steven D.
1999.
Constructing Isogenies between Elliptic Curves Over Finite Fields.
LMS Journal of Computation and Mathematics,
Vol. 2,
Issue. ,
p.
118.
Blake, Ian F.
1999.
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes.
Vol. 1719,
Issue. ,
p.
55.
Seroussi, G.
1999.
Elliptic curve cryptography.
p.
41.
Aydos, M.
Yantk, T.
and
Koc, C.K.
2000.
A high-speed ECC-based wireless authentication on an ARM microprocessor.
p.
401.
Leung, K.H.
Ma, K.W.
Wong, W.K.
and
Leong, P.H.W.
2000.
FPGA implementation of a microcoded elliptic curve cryptographic processor.
p.
68.
Okeya, Katsuyuki
Kurumatani, Hiroyuki
and
Sakurai, Kouichi
2000.
Public Key Cryptography.
Vol. 1751,
Issue. ,
p.
238.
Okeya, Katsuyuki
and
Sakurai, Kouichi
2000.
Progress in Cryptology —INDOCRYPT 2000.
Vol. 1977,
Issue. ,
p.
178.
Buchmann, Johannes
and
Baier, Harald
2000.
Progress in Cryptology —INDOCRYPT 2000.
Vol. 1977,
Issue. ,
p.
191.
Song, Boyeon
and
Kim, Kwangjo
2000.
Progress in Cryptology —INDOCRYPT 2000.
Vol. 1977,
Issue. ,
p.
237.
Orlando, Gerardo
and
Paar, Christof
2000.
Cryptographic Hardware and Embedded Systems — CHES 2000.
Vol. 1965,
Issue. ,
p.
41.
Woodbury, Adam D.
Bailey, Daniel V.
and
Paar, Christof
2000.
Smart Card Research and Advanced Applications.
p.
71.
Smart, N.P.
and
Muller, H.L.
2000.
A wearable public key infrastructure (WPKI).
p.
127.
Anwar Hasan, M.
2000.
Cryptographic Hardware and Embedded Systems — CHES 2000.
Vol. 1965,
Issue. ,
p.
93.
Smart, Nigel P.
2000.
Physical side-channel attacks on cryptographic systems.
Software Focus,
Vol. 1,
Issue. 2,
p.
6.
López, Julio
and
Dahab, Ricardo
2000.
Progress in Cryptology —INDOCRYPT 2000.
Vol. 1977,
Issue. ,
p.
203.
Taschwer, Mario
2001.
Kommunikationssicherheit im Zeichen des Internet.
p.
346.
Baier, Harald
2001.
Progress in Cryptology — INDOCRYPT 2001.
Vol. 2247,
Issue. ,
p.
99.
Boneh, Dan
and
Shparlinski, Igor E.
2001.
Advances in Cryptology — CRYPTO 2001.
Vol. 2139,
Issue. ,
p.
201.
Liardet, P. -Y.
and
Smart, N. P.
2001.
Cryptographic Hardware and Embedded Systems — CHES 2001.
Vol. 2162,
Issue. ,
p.
391.
Maurer, Markus
and
Müiler, Volker
2001.
Finding the Eigenvalue in Elkies' Algorithm.
Experimental Mathematics,
Vol. 10,
Issue. 2,
p.
275.