| Publication | Date of Publication | Type |
|---|
Short-Memory Scalar Multiplication for Koblitz Curves IEEE Transactions on Computers | 2017-11-10 | Paper |
Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations Smart Card Research and Advanced Applications | 2015-11-11 | Paper |
A more flexible countermeasure against side channel attacks using window method. Lecture Notes in Computer Science | 2010-03-09 | Paper |
Recursive Double-Size Modular Multiplications without Extra Cost for Their Quotients Topics in Cryptology – CT-RSA 2009 | 2009-04-29 | Paper |
Merkle Signatures with Virtually Unlimited Signature Capacity Applied Cryptography and Network Security | 2009-03-10 | Paper |
Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography Information Security and Privacy | 2009-03-06 | Paper |
Double-Size Bipartite Modular Multiplication Information Security and Privacy | 2009-03-06 | Paper |
Public Key Authentication with Memory Tokens Information Security Applications | 2009-02-24 | Paper |
Skew Frobenius Map and Efficient Scalar Multiplication for Pairing–Based Cryptography Cryptology and Network Security | 2009-01-09 | Paper |
All harmonic numbers less than \(10^{14}\) Japan Journal of Industrial and Applied Mathematics | 2008-12-01 | Paper |
Digital Signatures Out of Second-Preimage Resistant Hash Functions Post-Quantum Cryptography | 2008-11-11 | Paper |
An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions Lecture Notes in Computer Science | 2008-04-11 | Paper |
Progress in Cryptology - INDOCRYPT 2003 Lecture Notes in Computer Science | 2007-11-29 | Paper |
Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication Selected Areas in Cryptography | 2007-11-29 | Paper |
Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions Information Security and Privacy | 2007-09-07 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2007-05-02 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2006-06-22 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
Advances in Cryptology – CRYPTO 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |
scientific article; zbMATH DE number 1979310 (Why is no real title available?) | 2003-09-11 | Paper |
scientific article; zbMATH DE number 1962161 (Why is no real title available?) | 2003-08-10 | Paper |
scientific article; zbMATH DE number 1950359 (Why is no real title available?) | 2003-07-17 | Paper |
scientific article; zbMATH DE number 1941254 (Why is no real title available?) | 2003-06-29 | Paper |
scientific article; zbMATH DE number 1878328 (Why is no real title available?) | 2003-03-09 | Paper |
scientific article; zbMATH DE number 1759670 (Why is no real title available?) | 2002-11-23 | Paper |
scientific article; zbMATH DE number 1440061 (Why is no real title available?) | 2001-10-03 | Paper |
scientific article; zbMATH DE number 1583944 (Why is no real title available?) | 2001-04-03 | Paper |