Pradeep Kumar Mishra

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Solving LWR via BDD Strategy: Modulus Switching Approach
Cryptology and Network Security
2023-06-28Paper
Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption
Information Security Practice and Experience
2022-12-09Paper
Damaged composite structural strength enhancement under elevated thermal environment using shape memory alloy fiber
Acta Mechanica
2022-08-31Paper
Thermal buckling strength of smart nanotube-reinforced doubly curved hybrid composite panels
Computers & Mathematics with Applications
2021-04-21Paper
Efficient Secure Matrix Multiplication Over LWE-Based Homomorphic Encryption
Tatra Mountains Mathematical Publications
2017-03-29Paper
A metric on the set of elliptic curves over \(\mathbb{F}_p\)
Applied Mathematics Letters
2010-02-12Paper
Parallelizing explicit formula for arithmetic in the Jacobian of hyperelliptic curves
Lecture Notes in Computer Science
2010-01-05Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
A combinatorial interpretation of double base number system and some consequences
Advances in Mathematics of Communications
2008-08-12Paper
Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation
Lecture Notes in Computer Science
2008-06-24Paper
A Graph Theoretic Analysis of Double Base Number Systems
Lecture Notes in Computer Science
2008-04-11Paper
Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains
Lecture Notes in Computer Science
2008-03-18Paper
SCA Resistant Parallel Explicit Formula for Addition and Doubling of Divisors in the Jacobian of Hyperelliptic Curves of Genus 2
Progress in Cryptology - INDOCRYPT 2005
2008-03-17Paper
The double-base number system and its application to elliptic curve cryptography
Mathematics of Computation
2008-02-25Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2007-05-02Paper
Information Security and Cryptology
Lecture Notes in Computer Science
2006-11-14Paper
Cryptographic Hardware and Embedded Systems - CHES 2004
Lecture Notes in Computer Science
2005-08-23Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
scientific article; zbMATH DE number 809246 (Why is no real title available?)1996-04-08Paper
scientific article; zbMATH DE number 4211856 (Why is no real title available?)1988-01-01Paper
scientific article; zbMATH DE number 4064817 (Why is no real title available?)1987-01-01Paper
scientific article; zbMATH DE number 4168170 (Why is no real title available?)1985-01-01Paper
scientific article; zbMATH DE number 3926704 (Why is no real title available?)1984-01-01Paper
scientific article; zbMATH DE number 3858906 (Why is no real title available?)1983-01-01Paper
scientific article; zbMATH DE number 3934830 (Why is no real title available?)1982-01-01Paper
scientific article; zbMATH DE number 3965878 (Why is no real title available?)1981-01-01Paper
scientific article; zbMATH DE number 3661308 (Why is no real title available?)1978-01-01Paper


Research outcomes over time


This page was built for person: Pradeep Kumar Mishra