| Publication | Date of Publication | Type |
|---|
Scalar multiplication on Koblitz curves using double bases Progress in Cryptology - VIETCRYPT 2006 | 2014-08-21 | Paper |
On the distribution of the coefficients of normal forms for Frobenius expansions Designs, Codes and Cryptography | 2011-08-02 | Paper |
Efficient reduction of large divisors on hyperelliptic curves Advances in Mathematics of Communications | 2011-06-03 | Paper |
Optimization of the arithmetic of the ideal class group for genus 4 hyperelliptic curves over projective coordinates Advances in Mathematics of Communications | 2011-06-03 | Paper |
A filtering method for the hyperelliptic curve index calculus and its analysis Advances in Mathematics of Communications | 2011-06-03 | Paper |
Faster and lower memory scalar multiplication on supersingular curves in characteristic three Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
Redundant \(\tau \)-adic expansions. I: Non-adjacent digit sets and their applications to scalar multiplication Designs, Codes and Cryptography | 2011-03-10 | Paper |
Combined implementation attack resistant exponentiation Lecture Notes in Computer Science | 2010-08-31 | Paper |
Countermeasures against differential power analysis for hyperelliptic curve cryptosystems. Lecture Notes in Computer Science | 2010-03-09 | Paper |
Public Key Cryptography – PKC 2004 Lecture Notes in Computer Science | 2009-05-14 | Paper |
Trace Zero Varieties over Fields of Characteristic 2 for Cryptographic Applications Algebraic Geometry and Its Applications | 2008-12-10 | Paper |
Rethinking low genus hyperelliptic Jacobian arithmetic over binary fields: interplay of field arithmetic and explicit formulæ Journal of Mathematical Cryptology | 2008-11-06 | Paper |
Extending Scalar Multiplication Using Double Bases Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
Another Look at Square Roots (and Other Less Common Operations) in Fields of Even Characteristic Selected Areas in Cryptography | 2008-03-25 | Paper |
On Redundant τ-Adic Expansions and Non-adjacent Digit Sets Selected Areas in Cryptography | 2007-11-29 | Paper |
Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems Selected Areas in Cryptography | 2007-11-29 | Paper |
Minimality of the Hamming Weight of the τ-NAF for Koblitz Curves and Improved Combination with Point Halving Selected Areas in Cryptography | 2007-11-15 | Paper |
Effects of Optimizations for Software Implementations of Small Binary Field Arithmetic Arithmetic of Finite Fields | 2007-11-15 | Paper |
Scalar multiplication on Koblitz curves using the Frobenius endomorphism and its combination with point halving: extensions and mathematical analysis Algorithmica | 2007-02-14 | Paper |
Selected Areas in Cryptography Lecture Notes in Computer Science | 2006-10-10 | Paper |
The complexity of certain multi-exponentiation techniques in cryptography Journal of Cryptology | 2006-08-14 | Paper |
Selected Areas in Cryptography Lecture Notes in Computer Science | 2005-12-27 | Paper |
Cryptographic Hardware and Embedded Systems - CHES 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
On using expansions to the base of −2 International Journal of Computer Mathematics | 2004-12-29 | Paper |
The Equation f(X) = f(Y) in Rational Functions X = X(t), Y = Y(t) Compositio Mathematica | 2004-06-11 | Paper |
| Janko's simple groups \(J_2\) and \(J_3\) are irreducible subgroups of \(\text{SL}_{85}(5)\) with equal centralizers of an involution | 2002-07-22 | Paper |
| A study on polynomials in separated variables with low genus factors | 2002-01-21 | Paper |
Genus one curves defined by separated variable polynomials and a polynomial Pell equation Acta Arithmetica | 2001-12-11 | Paper |