Roberto Maria Avanzi

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Scalar multiplication on Koblitz curves using double bases
Progress in Cryptology - VIETCRYPT 2006
2014-08-21Paper
On the distribution of the coefficients of normal forms for Frobenius expansions
Designs, Codes and Cryptography
2011-08-02Paper
Efficient reduction of large divisors on hyperelliptic curves
Advances in Mathematics of Communications
2011-06-03Paper
Optimization of the arithmetic of the ideal class group for genus 4 hyperelliptic curves over projective coordinates
Advances in Mathematics of Communications
2011-06-03Paper
A filtering method for the hyperelliptic curve index calculus and its analysis
Advances in Mathematics of Communications
2011-06-03Paper
Faster and lower memory scalar multiplication on supersingular curves in characteristic three
Public Key Cryptography – PKC 2011
2011-03-15Paper
Redundant \(\tau \)-adic expansions. I: Non-adjacent digit sets and their applications to scalar multiplication
Designs, Codes and Cryptography
2011-03-10Paper
Combined implementation attack resistant exponentiation
Lecture Notes in Computer Science
2010-08-31Paper
Countermeasures against differential power analysis for hyperelliptic curve cryptosystems.
Lecture Notes in Computer Science
2010-03-09Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
Trace Zero Varieties over Fields of Characteristic 2 for Cryptographic Applications
Algebraic Geometry and Its Applications
2008-12-10Paper
Rethinking low genus hyperelliptic Jacobian arithmetic over binary fields: interplay of field arithmetic and explicit formulæ
Journal of Mathematical Cryptology
2008-11-06Paper
Extending Scalar Multiplication Using Double Bases
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
Another Look at Square Roots (and Other Less Common Operations) in Fields of Even Characteristic
Selected Areas in Cryptography
2008-03-25Paper
On Redundant τ-Adic Expansions and Non-adjacent Digit Sets
Selected Areas in Cryptography
2007-11-29Paper
Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems
Selected Areas in Cryptography
2007-11-29Paper
Minimality of the Hamming Weight of the τ-NAF for Koblitz Curves and Improved Combination with Point Halving
Selected Areas in Cryptography
2007-11-15Paper
Effects of Optimizations for Software Implementations of Small Binary Field Arithmetic
Arithmetic of Finite Fields
2007-11-15Paper
Scalar multiplication on Koblitz curves using the Frobenius endomorphism and its combination with point halving: extensions and mathematical analysis
Algorithmica
2007-02-14Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2006-10-10Paper
The complexity of certain multi-exponentiation techniques in cryptography
Journal of Cryptology
2006-08-14Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2005-12-27Paper
Cryptographic Hardware and Embedded Systems - CHES 2004
Lecture Notes in Computer Science
2005-08-23Paper
On using expansions to the base of −2
International Journal of Computer Mathematics
2004-12-29Paper
The Equation f(X) = f(Y) in Rational Functions X = X(t), Y = Y(t)
Compositio Mathematica
2004-06-11Paper
Janko's simple groups \(J_2\) and \(J_3\) are irreducible subgroups of \(\text{SL}_{85}(5)\) with equal centralizers of an involution2002-07-22Paper
A study on polynomials in separated variables with low genus factors2002-01-21Paper
Genus one curves defined by separated variable polynomials and a polynomial Pell equation
Acta Arithmetica
2001-12-11Paper


Research outcomes over time


This page was built for person: Roberto Maria Avanzi