Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Galbraith, Steven
and
Menezes, Alfred
2005.
Algebraic curves and cryptography.
Finite Fields and Their Applications,
Vol. 11,
Issue. 3,
p.
544.
Delerablée, Cécile
and
Pointcheval, David
2006.
Progress in Cryptology - VIETCRYPT 2006.
Vol. 4341,
Issue. ,
p.
193.
Ryu, Eun-Kyung
and
Takagi, Tsuyoshi
2007.
Efficient Conjunctive Keyword-Searchable Encryption.
p.
409.
Harasawa, Ryuichi
Sueyoshi, Yutaka
and
Kudo, Aichi
2007.
Tate and Ate pairings fory
2 =x
5 − αx in characteristic five.
Japan Journal of Industrial and Applied Mathematics,
Vol. 24,
Issue. 3,
Mahalanobis, Ayan
2008.
The Diffie-Hellman key exchange protocol and non-abelian nilpotent groups.
Israel Journal of Mathematics,
Vol. 165,
Issue. 1,
p.
161.
Galbraith, Steven D.
and
Verheul, Eric R.
2008.
Public Key Cryptography – PKC 2008.
Vol. 4939,
Issue. ,
p.
308.
Galbraith, S.
Hess, F.
and
Vercauteren, F.
2008.
Aspects of Pairing Inversion.
IEEE Transactions on Information Theory,
Vol. 54,
Issue. 12,
p.
5719.
Tsang, Patrick P.
and
Smith, Sean W.
2008.
Applied Cryptography and Network Security.
Vol. 5037,
Issue. ,
p.
55.
Takashima, Katsuyuki
2008.
Algorithmic Number Theory.
Vol. 5011,
Issue. ,
p.
88.
Szczechowiak, Piotr
Kargl, Anton
Scott, Michael
and
Collier, Martin
2009.
On the application of pairing based cryptography to wireless sensor networks.
p.
1.
Emura, Keita
Miyaji, Atsuko
and
Omote, Kazumasa
2009.
A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier.
p.
769.
Moody, Dustin
2009.
The Diffie–Hellman problem and generalization of Verheul’s theorem.
Designs, Codes and Cryptography,
Vol. 52,
Issue. 3,
p.
381.
Galbraith, Steven D.
Pujolàs, Jordi
Ritzenthaler, Christophe
and
Smith, Benjamin
2009.
Distortion maps for supersingular genus two curves.
Journal of Mathematical Cryptology,
Vol. 3,
Issue. 1,
p.
1.
Freeman, David
Scott, Michael
and
Teske, Edlyn
2010.
A Taxonomy of Pairing-Friendly Elliptic Curves.
Journal of Cryptology,
Vol. 23,
Issue. 2,
p.
224.
Dodis, Yevgeniy
Haralambiev, Kristiyan
López-Alt, Adriana
and
Wichs, Daniel
2010.
Advances in Cryptology - ASIACRYPT 2010.
Vol. 6477,
Issue. ,
p.
613.
Dodis, Yevgeniy
Haralambiev, Kristiyan
Lopez-Alt, Adriana
and
Wichs, Daniel
2010.
Cryptography against Continuous Memory Attacks.
p.
511.
Nan Li
2010.
Research on Diffie-Hellman key exchange protocol.
p.
V4-634.
Zhu, Jinghan
Xu, Bin
Jiang, Bo
and
Chen, Weigang
2010.
Identifying Harmful Web Pages in Laboratory Information Security Management.
p.
1.
Dodis, Yevgeniy
Lewko, Allison
Waters, Brent
and
Wichs, Daniel
2011.
Storing Secrets on Continually Leaky Devices.
p.
688.
Koblitz, Ann Hibner
Koblitz, Neal
and
Menezes, Alfred
2011.
Elliptic curve cryptography: The serpentine course of a paradigm shift.
Journal of Number Theory,
Vol. 131,
Issue. 5,
p.
781.