Laurent Imbert

From MaRDI portal
(Redirected from Person:380688)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
I want to ride my \texttt{BICYCL} : \texttt{BICYCL} implements cryptography in class groups
Journal of Cryptology
2023-07-05Paper
An alternative approach for SIDH arithmetic2021-12-21Paper
Faster cofactorization with ECM using mixed representations2021-12-01Paper
Breaking randomized mixed-radix scalar multiplication algorithms2020-01-14Paper
Randomized Mixed-Radix Scalar Multiplication
IEEE Transactions on Computers
2018-06-27Paper
Encryption switching protocols revisited: switching modulo \(p\)2017-11-03Paper
Fault-tolerant computations over replicated finite rings
IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications
2017-08-25Paper
Hybrid Binary-Ternary Number System for Elliptic Curve Cryptosystems
IEEE Transactions on Computers
2017-07-27Paper
Attacking randomized exponentiations using unsupervised learning
Constructive Side-Channel Analysis and Secure Design
2016-03-10Paper
Strictly chained \((p,q)\)-ary partitions
(available as arXiv preprint)
2015-07-24Paper
On the maximal weight of \((P,Q)\)-ary chain partitions with bounded parts
Integers
2014-10-23Paper
On the maximal weight of \((P,Q)\)-ary chain partitions with bounded parts
Integers
2014-10-23Paper
Empirical optimization of divisor arithmetic on hyperelliptic curves over \(\mathbb{F}_{2^m}\)
Advances in Mathematics of Communications
2013-11-14Paper
Fast ideal cubing in imaginary quadratic number and function fields
Advances in Mathematics of Communications
2011-06-03Paper
Diophantine approximation, Ostrowski numeration and the double-base number system2010-07-27Paper
Extended Double-Base Number System with Applications to Elliptic Curve Cryptography
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains
Lecture Notes in Computer Science
2008-03-18Paper
The double-base number system and its application to elliptic curve cryptography
Mathematics of Computation
2008-02-25Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2006-10-10Paper
Cryptographic Hardware and Embedded Systems - CHES 2004
Lecture Notes in Computer Science
2005-08-23Paper
scientific article; zbMATH DE number 1955798 (Why is no real title available?)2003-07-29Paper
A radix-10 BKM algorithm for computing transcendentals on pocket computers
Journal of VLSI signal processing systems for signal, image and video technology
2001-06-21Paper


Research outcomes over time


This page was built for person: Laurent Imbert