Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Page, D.
and
Smart, N.P.
2003.
Cryptographic Hardware and Embedded Systems - CHES 2002.
Vol. 2523,
Issue. ,
p.
529.
Granger, R.
Holt, A. J.
Page, D.
Smart, N. P.
and
Vercauteren, F.
2004.
Algorithmic Number Theory.
Vol. 3076,
Issue. ,
p.
223.
Takagi, Tsuyoshi
Yen, Sung-Ming
and
Wu, Bo-Ching
2004.
Information Security.
Vol. 3225,
Issue. ,
p.
99.
Grabher, P.
and
Page, D.
2005.
Cryptographic Hardware and Embedded Systems – CHES 2005.
Vol. 3659,
Issue. ,
p.
398.
Granger, R.
Page, D.
and
Stam, M.
2005.
Hardware and Software Normal Basis Arithmetic for Pairing-Based Cryptography in Characteristic Three.
IEEE Transactions on Computers,
Vol. 54,
Issue. 7,
p.
852.
Negre, Christophe
2005.
Progress in Cryptology - INDOCRYPT 2005.
Vol. 3797,
Issue. ,
p.
389.
Kawahara, Yuto
Takagi, Tsuyoshi
and
Okamoto, Eiji
2006.
Efficient Implementation of Tate Pairing on a Mobile Phone using Java.
p.
1247.
Gustavsen, Trond Stølen
and
Ranestad, Kristian
2006.
A Simple Point Counting Algorithm for Hessian Elliptic Curves in Characteristic Three.
Applicable Algebra in Engineering, Communication and Computing,
Vol. 17,
Issue. 2,
p.
141.
Page, D.
Smart, N. P.
and
Vercauteren, F.
2006.
A comparison of MNT curves and supersingular curves.
Applicable Algebra in Engineering, Communication and Computing,
Vol. 17,
Issue. 5,
p.
379.
Ahmadi, Omran
Hankerson, Darrel
and
Menezes, Alfred
2007.
Formulas for cube roots in F3m.
Discrete Applied Mathematics,
Vol. 155,
Issue. 3,
p.
260.
Beuchat, Jean-Luc
Shirase, Masaaki
Takagi, Tsuyoshi
and
Okamoto, Eiji
2007.
An Algorithm for the nt Pairing Calculation in Characteristic Three and its Hardware Implementation.
p.
97.
Vejda, Tobias
Page, Dan
and
Großschädl, Johann
2007.
Pairing-Based Cryptography – Pairing 2007.
Vol. 4575,
Issue. ,
p.
208.
Hui, Gao
Shanguang, Chen
and
Guangchuan, Su
2007.
Emotion Classification of Mandarin Speech Based on TEO Nonlinear Features.
p.
394.
Kim, Sung-Kyoung
Han, Dong-Guk
Kim, Ho Won
Chung, Kyo IL
and
Lim, Jongin
2007.
Autonomic and Trusted Computing.
Vol. 4610,
Issue. ,
p.
286.
Ahmadi, Omran
Hankerson, Darrel
and
Menezes, Alfred
2007.
Arithmetic of Finite Fields.
Vol. 4547,
Issue. ,
p.
85.
Ahmadi, Omran
2007.
On the distribution of irreducible trinomials over F3.
Finite Fields and Their Applications,
Vol. 13,
Issue. 3,
p.
659.
Han, Dong-Guk
Kim, Sung-Kyoung
Kim, Ho Won
Chung, Kyo IL
and
Lim, Jongin
2007.
Information Security Practice and Experience.
Vol. 4464,
Issue. ,
p.
238.
Kawahara, Yuto
Takagi, Tsuyoshi
and
Okamoto, Eiji
2007.
Computational Intelligence and Security.
Vol. 4456,
Issue. ,
p.
396.
Kent, Kenneth B.
Iaderoza, Beatriz C.
and
Serra, Micaela
2007.
Codesign of a Computationally Intensive Problem in GF(3).
p.
10.
Kawahara, Yuto
Aoki, Kazumaro
and
Takagi, Tsuyoshi
2008.
Pairing-Based Cryptography – Pairing 2008.
Vol. 5209,
Issue. ,
p.
282.