Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Mazzocco, Marta
and
Vidunas, Raimundas
2013.
Cubic and Quartic Transformations of the Sixth Painlevé Equation in Terms of Riemann–Hilbert Correspondence.
Studies in Applied Mathematics,
Vol. 130,
Issue. 1,
p.
17.
Sutherland, Andrew
2013.
On the evaluation of modular polynomials.
The Open Book Series,
Vol. 1,
Issue. 1,
p.
531.
Elia, Michele
and
Schipani, Davide
2013.
On the Rabin Signature.
Journal of Discrete Mathematical Sciences and Cryptography,
Vol. 16,
Issue. 6,
p.
367.
Hunt, Duane
and
Al-Hamdani, Wasim A.
2013.
Theoretical Analysis of using Identity Based PKI as the Authentication method in SQL.
p.
33.
Kurosawa, Kaoru
and
Ueda, Takuma
2013.
Advances in Information and Computer Security.
Vol. 8231,
Issue. ,
p.
217.
Tian, Zhaofei
and
Qiao, Sanzheng
2013.
An enhanced Jacobi method for lattice-reduction-aided MIMO detection.
p.
39.
Wu, Hongfeng
Li, Liangze
and
Zhang, Fan
2013.
The Pairing Computation on Edwards Curves.
Mathematical Problems in Engineering,
Vol. 2013,
Issue. ,
p.
1.
Bos, Joppe W.
Costello, Craig
and
Miele, Andrea
2014.
Public-Key Cryptography – PKC 2014.
Vol. 8383,
Issue. ,
p.
203.
Bos, Joppe W.
Costello, Craig
and
Naehrig, Michael
2014.
Selected Areas in Cryptography -- SAC 2013.
Vol. 8282,
Issue. ,
p.
438.
Blomer, Johannes
Gunther, Peter
and
Liske, Gennadij
2014.
Tampering Attacks in Pairing-Based Cryptography.
p.
1.
Ko, Wen-Tsai
Chiou, Shin-Yan
Lu, Erl-Huei
and
Chang, Henry Ker-Chang
2014.
Modifying the ECC-Based Grouping-Proof RFID System to Increase Inpatient Medication Safety.
Journal of Medical Systems,
Vol. 38,
Issue. 9,
Blomer, Johannes
Silva, Ricardo Gomes da
Gunther, Peter
Kramer, Juliane
and
Seifert, Jean-Pierre
2014.
A Practical Second-Order Fault Attack against a Real-World Pairing Implementation.
p.
123.
Sokouti, Massoud
Zakerolhosseini, Ali
and
Sokouti, Babak
2014.
Encyclopedia of Information Science and Technology, Third Edition.
p.
3404.
Blackburn, Simon R.
and
Scott, Sam
2014.
The discrete logarithm problem for exponents of bounded height.
LMS Journal of Computation and Mathematics,
Vol. 17,
Issue. A,
p.
148.
Li, Liangze
Wu, Hongfeng
and
Zhang, Fan
2014.
Information Security and Cryptology.
Vol. 8567,
Issue. ,
p.
185.
Shparlinski, Igor E.
and
Sutherland, Andrew V.
2014.
On the Distribution of Atkin and Elkies Primes.
Foundations of Computational Mathematics,
Vol. 14,
Issue. 2,
p.
285.
Howe, James
Pöppelmann, Thomas
O'neill, Máire
O'sullivan, Elizabeth
and
Güneysu, Tim
2015.
Practical Lattice-Based Digital Signature Schemes.
ACM Transactions on Embedded Computing Systems,
Vol. 14,
Issue. 3,
p.
1.
To, Marco Antonio
Alvarez, Jose
Cano, Marcos
and
Maag, Stephane
2015.
Spanning Data Across Heterogeneous MANETs through Proactive Strip Interoperability.
p.
116.
Shparlinski, Igor E.
and
Sutherland, Andrew V.
2015.
On the distribution of Atkin and Elkies primes for reductions of elliptic curves on average.
LMS Journal of Computation and Mathematics,
Vol. 18,
Issue. 1,
p.
308.
Stanley, Kenneth O.
and
Lehman, Joel
2015.
Why Greatness Cannot Be Planned.
p.
79.