Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by Crossref.
Galbraith, Steven D.
Hess, Florian
and
Vercauteren, Frederik
2007.
Pairing-Based Cryptography – Pairing 2007.
Vol. 4575,
Issue. ,
p.
108.
Beuchat, Jean-Luc
Brisebarre, Nicolas
Shirase, Masaaki
Takagi, Tsuyoshi
and
Okamoto, Eiji
2007.
Arithmetic of Finite Fields.
Vol. 4547,
Issue. ,
p.
25.
Barreto, Paulo S. L. M.
Galbraith, Steven D.
hÉigeartaigh, Colm Ó’
and
Scott, Michael
2007.
Efficient pairing computation on supersingular Abelian varieties.
Designs, Codes and Cryptography,
Vol. 42,
Issue. 3,
p.
239.
Shirase, Masaaki
Takagi, Tsuyoshi
and
Okamoto, Eiji
2007.
Information Security Practice and Experience.
Vol. 4464,
Issue. ,
p.
254.
Yoshitomi, Motoi
Takagi, Tsuyoshi
Kiyomoto, Shinsaku
and
Tanaka, Toshiaki
2007.
Information Security Applications.
Vol. 4867,
Issue. ,
p.
203.
Beuchat, Jean-Luc
Brisebarre, Nicolas
Detrey, Jérémie
Okamoto, Eiji
and
Rodríguez-Henríquez, Francisco
2008.
Pairing-Based Cryptography – Pairing 2008.
Vol. 5209,
Issue. ,
p.
297.
Galbraith, Steven D.
and
Scott, Michael
2008.
Pairing-Based Cryptography – Pairing 2008.
Vol. 5209,
Issue. ,
p.
211.
Naehrig, Michael
Barreto, Paulo S. L. M.
and
Schwabe, Peter
2008.
Progress in Cryptology – AFRICACRYPT 2008.
Vol. 5023,
Issue. ,
p.
371.
Rubin, K.
and
Silverberg, A.
2008.
Compression in Finite Fields and Torus-Based Cryptography.
SIAM Journal on Computing,
Vol. 37,
Issue. 5,
p.
1401.
Beuchat, Jean-Luc
Brisebarre, Nicolas
Detrey, Jérémie
Okamoto, Eiji
Shirase, Masaaki
and
Takagi, Tsuyoshi
2008.
Algorithms and Arithmetic Operators for Computing the ηT Pairing in Characteristic Three.
IEEE Transactions on Computers,
Vol. 57,
Issue. 11,
p.
1454.
Galbraith, Steven D.
Lin, Xibin
and
Mireles Morales, David J.
2008.
Pairing-Based Cryptography – Pairing 2008.
Vol. 5209,
Issue. ,
p.
265.
Beuchat, Jean-Luc
López-Trejo, Emmanuel
Martínez-Ramos, Luis
Mitsunari, Shigeo
and
Rodríguez-Henríquez, Francisco
2009.
Cryptology and Network Security.
Vol. 5888,
Issue. ,
p.
413.
Galbraith, Steven D.
and
Lin, Xibin
2009.
Computing pairings using x-coordinates only.
Designs, Codes and Cryptography,
Vol. 50,
Issue. 3,
p.
305.
SHIRASE, Masaaki
MIYAZAKI, Yukinori
TAKAGI, Tsuyoshi
HAN, Dong-Guk
and
CHOI, Dooho
2009.
Efficient Implementation of Pairing-Based Cryptography on a Sensor Node.
IEICE Transactions on Information and Systems,
Vol. E92-D,
Issue. 5,
p.
909.
Costello, Craig
Boyd, Colin
Gonzalez Nieto, Juan Manuel
and
Wong, Kenneth Koon-Ho
2010.
Arithmetic of Finite Fields.
Vol. 6087,
Issue. ,
p.
196.
Karabina, Koray
2010.
Factor-4 and 6 compression of cyclotomic subgroups of and.
Journal of Mathematical Cryptology,
Vol. 4,
Issue. 1,
p.
1.
Benger, Naomi
and
Scott, Michael
2010.
Arithmetic of Finite Fields.
Vol. 6087,
Issue. ,
p.
180.
Beuchat, Jean-Luc
Doi, Hiroshi
Fujita, Kaoru
Inomata, Atsuo
Ith, Piseth
Kanaoka, Akira
Katouno, Masayoshi
Mambo, Masahiro
Okamoto, Eiji
Okamoto, Takeshi
Shiga, Takaaki
Shirase, Masaaki
Soga, Ryuji
Takagi, Tsuyoshi
Vithanage, Ananda
and
Yamamoto, Hiroyasu
2010.
FPGA and ASIC implementations of the pairing in characteristic three.
Computers & Electrical Engineering,
Vol. 36,
Issue. 1,
p.
73.
Granger, Robert
and
Scott, Michael
2010.
Public Key Cryptography – PKC 2010.
Vol. 6056,
Issue. ,
p.
209.
Chatterjee, Sanjit
Hankerson, Darrel
and
Menezes, Alfred
2010.
Arithmetic of Finite Fields.
Vol. 6087,
Issue. ,
p.
114.