| Publication | Date of Publication | Type |
|---|
Solving LWR via BDD Strategy: Modulus Switching Approach Cryptology and Network Security | 2023-06-28 | Paper |
Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption Information Security Practice and Experience | 2022-12-09 | Paper |
Damaged composite structural strength enhancement under elevated thermal environment using shape memory alloy fiber Acta Mechanica | 2022-08-31 | Paper |
Thermal buckling strength of smart nanotube-reinforced doubly curved hybrid composite panels Computers & Mathematics with Applications | 2021-04-21 | Paper |
Efficient Secure Matrix Multiplication Over LWE-Based Homomorphic Encryption Tatra Mountains Mathematical Publications | 2017-03-29 | Paper |
A metric on the set of elliptic curves over \(\mathbb{F}_p\) Applied Mathematics Letters | 2010-02-12 | Paper |
Parallelizing explicit formula for arithmetic in the Jacobian of hyperelliptic curves Lecture Notes in Computer Science | 2010-01-05 | Paper |
Public Key Cryptography – PKC 2004 Lecture Notes in Computer Science | 2009-05-14 | Paper |
A combinatorial interpretation of double base number system and some consequences Advances in Mathematics of Communications | 2008-08-12 | Paper |
Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation Lecture Notes in Computer Science | 2008-06-24 | Paper |
A Graph Theoretic Analysis of Double Base Number Systems Lecture Notes in Computer Science | 2008-04-11 | Paper |
Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains Lecture Notes in Computer Science | 2008-03-18 | Paper |
SCA Resistant Parallel Explicit Formula for Addition and Doubling of Divisors in the Jacobian of Hyperelliptic Curves of Genus 2 Progress in Cryptology - INDOCRYPT 2005 | 2008-03-17 | Paper |
The double-base number system and its application to elliptic curve cryptography Mathematics of Computation | 2008-02-25 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2007-05-02 | Paper |
Information Security and Cryptology Lecture Notes in Computer Science | 2006-11-14 | Paper |
Cryptographic Hardware and Embedded Systems - CHES 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |
scientific article; zbMATH DE number 809246 (Why is no real title available?) | 1996-04-08 | Paper |
scientific article; zbMATH DE number 4211856 (Why is no real title available?) | 1988-01-01 | Paper |
scientific article; zbMATH DE number 4064817 (Why is no real title available?) | 1987-01-01 | Paper |
scientific article; zbMATH DE number 4168170 (Why is no real title available?) | 1985-01-01 | Paper |
scientific article; zbMATH DE number 3926704 (Why is no real title available?) | 1984-01-01 | Paper |
scientific article; zbMATH DE number 3858906 (Why is no real title available?) | 1983-01-01 | Paper |
scientific article; zbMATH DE number 3934830 (Why is no real title available?) | 1982-01-01 | Paper |
scientific article; zbMATH DE number 3965878 (Why is no real title available?) | 1981-01-01 | Paper |
scientific article; zbMATH DE number 3661308 (Why is no real title available?) | 1978-01-01 | Paper |