| Publication | Date of Publication | Type |
|---|
Linear systolic multiplier/squarer for fast exponentiation Information Processing Letters | 2016-06-16 | Paper |
Partitioned systolic architecture for modular multiplication in \(\mathrm{GF}(2^{m})\) Information Processing Letters | 2016-06-16 | Paper |
| scientific article; zbMATH DE number 6499844 (Why is no real title available?) | 2015-10-28 | Paper |
| scientific article; zbMATH DE number 6159487 (Why is no real title available?) | 2013-04-30 | Paper |
KCI-resilient anonymous wireless link-layer authentication protocols Mathematical and Computer Modelling | 2013-01-27 | Paper |
| An entire chaos-based biometric remote user authentication scheme on tokens without using password | 2011-11-17 | Paper |
Robust biometric-based three-party authenticated key establishment protocols International Journal of Computer Mathematics | 2011-04-21 | Paper |
Algorithms and Computation Lecture Notes in Computer Science | 2009-08-07 | Paper |
Montgomery exponent architecture based on programmable cellular automata Mathematics and Computers in Simulation | 2009-04-03 | Paper |
Elliptic curve based hardware architecture using cellular automata Mathematics and Computers in Simulation | 2009-04-03 | Paper |
| scientific article; zbMATH DE number 5507095 (Why is no real title available?) | 2009-02-12 | Paper |
| scientific article; zbMATH DE number 5506913 (Why is no real title available?) | 2009-02-12 | Paper |
An Improved Popescu’s Authenticated Key Agreement Protocol Computational Science and Its Applications - ICCSA 2006 | 2009-02-12 | Paper |
One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity Computational Science and Its Applications - ICCSA 2006 | 2009-02-12 | Paper |
Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure Networks Computational Science and Its Applications - ICCSA 2006 | 2009-01-27 | Paper |
Modular Divider for Elliptic Curve Cryptographic Hardware Based on Programmable CA Computational Science – ICCS 2006 | 2009-01-20 | Paper |
Cellular Automata Architecture for Elliptic Curve Cryptographic Hardware Computational Science – ICCS 2006 | 2009-01-13 | Paper |
Decision Algorithms for Cellular Automata States Based on Periodic Boundary Condition Lecture Notes in Computer Science | 2008-11-20 | Paper |
Authentication Based on Singular Cellular Automata Lecture Notes in Computer Science | 2008-11-20 | Paper |
Fast Exponentiaion over GF(2m) Based on Cellular Automata Lecture Notes in Computer Science | 2008-09-30 | Paper |
A novel approach for bit-serial \(AB^{2}\) multiplication in finite fields \(\mathrm{GF}(2^m)\) Computers & Mathematics with Applications | 2008-03-11 | Paper |
Parallel Processing and Applied Mathematics Lecture Notes in Computer Science | 2007-09-25 | Paper |
Computational Science and Its Applications – ICCSA 2004 Lecture Notes in Computer Science | 2007-07-19 | Paper |
Computational Science and Its Applications – ICCSA 2004 Lecture Notes in Computer Science | 2007-07-19 | Paper |
Computational Science and Its Applications – ICCSA 2004 Lecture Notes in Computer Science | 2007-07-19 | Paper |
Computational Science and Its Applications – ICCSA 2004 Lecture Notes in Computer Science | 2007-07-19 | Paper |
Computational Science and Its Applications – ICCSA 2004 Lecture Notes in Computer Science | 2007-07-19 | Paper |
Computational Science and Its Applications – ICCSA 2004 Lecture Notes in Computer Science | 2007-07-19 | Paper |
Computational Science and Its Applications – ICCSA 2004 Lecture Notes in Computer Science | 2007-07-19 | Paper |
Computational Science and Its Applications – ICCSA 2004 Lecture Notes in Computer Science | 2007-07-19 | Paper |
Role delegation on multiple-attractor cellular automata based on pseudo-exhaustive bit patterns Applied Mathematics and Computation | 2007-06-06 | Paper |
Programmable cellular automata based Montgomery hardware architecture Applied Mathematics and Computation | 2007-04-26 | Paper |
Cryptology and Network Security Lecture Notes in Computer Science | 2006-11-14 | Paper |
SOFSEM 2006: Theory and Practice of Computer Science Lecture Notes in Computer Science | 2006-11-14 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2006-10-24 | Paper |
Distributed Computing – IWDC 2005 Lecture Notes in Computer Science | 2006-10-10 | Paper |
On the security of efficient user identification scheme Applied Mathematics and Computation | 2006-05-18 | Paper |
Computing and Combinatorics Lecture Notes in Computer Science | 2006-01-11 | Paper |
Weakness and solution of Yang et al.'s protected password changing scheme Applied Mathematics and Computation | 2005-11-16 | Paper |
On the security of Wu-Lin's robust key authentication scheme Applied Mathematics and Computation | 2005-11-16 | Paper |
An improvement on Yang et al.'s password authentication schemes Applied Mathematics and Computation | 2005-11-14 | Paper |
Cryptanalysis of Zhang-Xiao's multisignature scheme for specified group of verifiers Applied Mathematics and Computation | 2005-11-14 | Paper |
Cryptanalysis and further improvement of Peinado's improved LHL-key authentication scheme Applied Mathematics and Computation | 2005-11-04 | Paper |
Efficient verifier-based key agreement protocol for three parties without server's public key Applied Mathematics and Computation | 2005-10-28 | Paper |
Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm Applied Mathematics and Computation | 2005-10-28 | Paper |
Improvement of Chien--Jan's authenticated multiple-key agreement protocol without using conventional one-way function Applied Mathematics and Computation | 2005-10-28 | Paper |
Security of Tseng--Jan's conference key distribution system Applied Mathematics and Computation | 2005-10-28 | Paper |
Efficient nonce-based remote user authentication scheme using smart cards Applied Mathematics and Computation | 2005-10-28 | Paper |
| scientific article; zbMATH DE number 2202170 (Why is no real title available?) | 2005-09-05 | Paper |
Fixing problems in Lin et al.'s OSPA protocol Applied Mathematics and Computation | 2005-08-05 | Paper |
Cryptanalysis of Lee-Lee authenticated key agreement scheme Applied Mathematics and Computation | 2005-05-04 | Paper |
Improvement of Lee and Lee's authenticated key agreement scheme Applied Mathematics and Computation | 2005-02-23 | Paper |
Improvement of HWWM-authenticated key agreement protocol Applied Mathematics and Computation | 2005-02-23 | Paper |
AOP arithmetic architectures over GF(2\(^m\)) Applied Mathematics and Computation | 2004-11-23 | Paper |
| scientific article; zbMATH DE number 2089170 (Why is no real title available?) | 2004-08-12 | Paper |
| scientific article; zbMATH DE number 2088416 (Why is no real title available?) | 2004-08-12 | Paper |
| scientific article; zbMATH DE number 2089169 (Why is no real title available?) | 2004-08-12 | Paper |
| scientific article; zbMATH DE number 2089179 (Why is no real title available?) | 2004-08-12 | Paper |
| scientific article; zbMATH DE number 2089970 (Why is no real title available?) | 2004-08-12 | Paper |
| scientific article; zbMATH DE number 1983211 (Why is no real title available?) | 2003-09-18 | Paper |
| scientific article; zbMATH DE number 1941246 (Why is no real title available?) | 2003-06-29 | Paper |
Systolic multiplier for Montgomery’s algorithm Integration | 2003-01-22 | Paper |
A New Undeniable Signature Scheme Using Smart Cards Cryptography and Coding | 2002-12-02 | Paper |
| scientific article; zbMATH DE number 1796971 (Why is no real title available?) | 2002-09-05 | Paper |
Digit-serial-in-serial-out systolic multiplier for Montgomery algorithm Information Processing Letters | 2002-07-14 | Paper |
Design of a linear systolic array for computing modular multiplication and squaring in \(\text{GF}(2^m)\) Computers & Mathematics with Applications | 2001-11-12 | Paper |