Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Mazzocco, Marta
and
Vidunas, Raimundas
2013.
Cubic and Quartic Transformations of the Sixth Painlevé Equation in Terms of Riemann–Hilbert Correspondence.
Studies in Applied Mathematics,
Vol. 130,
Issue. 1,
p.
17.
Elia, Michele
and
Schipani, Davide
2013.
On the Rabin Signature.
Journal of Discrete Mathematical Sciences and Cryptography,
Vol. 16,
Issue. 6,
p.
367.
Sutherland, Andrew
2013.
On the evaluation of modular polynomials.
The Open Book Series,
Vol. 1,
Issue. 1,
p.
531.
Wu, Hongfeng
Li, Liangze
and
Zhang, Fan
2013.
The Pairing Computation on Edwards Curves.
Mathematical Problems in Engineering,
Vol. 2013,
Issue. ,
p.
1.
Hunt, Duane
and
Al-Hamdani, Wasim A.
2013.
Theoretical Analysis of using Identity Based PKI as the Authentication method in SQL.
p.
33.
Kurosawa, Kaoru
and
Ueda, Takuma
2013.
Advances in Information and Computer Security.
Vol. 8231,
Issue. ,
p.
217.
Tian, Zhaofei
and
Qiao, Sanzheng
2013.
An enhanced Jacobi method for lattice-reduction-aided MIMO detection.
p.
39.
Bos, Joppe W.
Costello, Craig
and
Miele, Andrea
2014.
Public-Key Cryptography – PKC 2014.
Vol. 8383,
Issue. ,
p.
203.
Blomer, Johannes
Gunther, Peter
and
Liske, Gennadij
2014.
Tampering Attacks in Pairing-Based Cryptography.
p.
1.
Ko, Wen-Tsai
Chiou, Shin-Yan
Lu, Erl-Huei
and
Chang, Henry Ker-Chang
2014.
Modifying the ECC-Based Grouping-Proof RFID System to Increase Inpatient Medication Safety.
Journal of Medical Systems,
Vol. 38,
Issue. 9,
Blackburn, Simon R.
and
Scott, Sam
2014.
The discrete logarithm problem for exponents of bounded height.
LMS Journal of Computation and Mathematics,
Vol. 17,
Issue. A,
p.
148.
Sokouti, Massoud
Zakerolhosseini, Ali
and
Sokouti, Babak
2014.
Encyclopedia of Information Science and Technology, Third Edition.
p.
3404.
Blomer, Johannes
Silva, Ricardo Gomes da
Gunther, Peter
Kramer, Juliane
and
Seifert, Jean-Pierre
2014.
A Practical Second-Order Fault Attack against a Real-World Pairing Implementation.
p.
123.
Shparlinski, Igor E.
and
Sutherland, Andrew V.
2014.
On the Distribution of Atkin and Elkies Primes.
Foundations of Computational Mathematics,
Vol. 14,
Issue. 2,
p.
285.
Li, Liangze
Wu, Hongfeng
and
Zhang, Fan
2014.
Information Security and Cryptology.
Vol. 8567,
Issue. ,
p.
185.
Bos, Joppe W.
Costello, Craig
and
Naehrig, Michael
2014.
Selected Areas in Cryptography -- SAC 2013.
Vol. 8282,
Issue. ,
p.
438.
Howe, James
Pöppelmann, Thomas
O'neill, Máire
O'sullivan, Elizabeth
and
Güneysu, Tim
2015.
Practical Lattice-Based Digital Signature Schemes.
ACM Transactions on Embedded Computing Systems,
Vol. 14,
Issue. 3,
p.
1.
To, Marco Antonio
Alvarez, Jose
Cano, Marcos
and
Maag, Stephane
2015.
Spanning Data Across Heterogeneous MANETs through Proactive Strip Interoperability.
p.
116.
Shparlinski, Igor E.
and
Sutherland, Andrew V.
2015.
On the distribution of Atkin and Elkies primes for reductions of elliptic curves on average.
LMS Journal of Computation and Mathematics,
Vol. 18,
Issue. 1,
p.
308.
Stanley, Kenneth O.
and
Lehman, Joel
2015.
Why Greatness Cannot Be Planned.
p.
79.