Christophe Doche
Christophe Doche
Onbekend partnerschap
Geverifieerd e-mailadres voor mq.edu.au - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Handbook of elliptic and hyperelliptic curve cryptography
R Avanzi, H Cohen, C Doche, G Frey, T Lange, K Nguyen, F Vercauteren
CRC press, 2006
1478*2006
Extended double-base number system with applications to elliptic curve cryptography
C Doche, L Imbert
International Conference on Cryptology in India, 335-348, 2006
1042006
Efficient scalar multiplication by isogeny decompositions
C Doche, T Icart, DR Kohel
International Workshop on Public Key Cryptography, 191-206, 2006
832006
Extending scalar multiplication using double bases
R Avanzi, V Dimitrov, C Doche, F Sica
International Conference on the Theory and Application of Cryptology and …, 2006
602006
Double-base number system for multi-scalar multiplications
C Doche, DR Kohel, F Sica
Annual International Conference on the Theory and Applications of …, 2009
482009
A tree-based approach for computing double-base chains
C Doche, L Habsieger
Australasian Conference on Information Security and Privacy, 433-446, 2008
482008
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
33*2006
Arithmetic of elliptic curves
C Doche, T Lange
Handbook of Elliptic and Hyperelliptic Curve Cryptography, 267-302, 2006
31*2006
Redundant trinomials for finite fields of characteristic 2
C Doche
Australasian Conference on Information Security and Privacy, 122-133, 2005
262005
Moments of the Rudin–Shapiro polynomials
C Doche, L Habsieger
Journal of Fourier Analysis and Applications 10 (5), 497-505, 2004
122004
On the enumeration of double-base chains with applications to elliptic curve cryptography
C Doche
International Conference on the Theory and Application of Cryptology and …, 2014
112014
On the spectrum of the Zhang-Zagier height
C Doche
Mathematics of computation 70 (233), 419-430, 2001
92001
Equidistribution modulo 1 and Salem numbers
C Doche, MM France, JJ Ruch
Functiones et Approximatio Commentarii Mathematici 39 (2), 261-271, 2008
82008
Zhang-Zagier heights of perturbed polynomials
C Doche
Journal de théorie des nombres de Bordeaux 13 (1), 103-110, 2001
82001
Threshold verifiable multi-secret sharing based on elliptic curves and Chinese remainder theorem
M Sheikhi-Garjan, M Bahramian, C Doche
IET Information Security 13 (3), 278-284, 2019
62019
New and improved methods to analyze and compute double-scalar multiplications
C Doche, D Sutantyo
IEEE Transactions on Computers 63 (1), 230-242, 2012
62012
Even moments of generalized Rudin–Shapiro polynomials
C Doche
Mathematics of computation 74 (252), 1923-1935, 2005
62005
Integral geometry and real zeros of Thue–Morse polynomials
C Doche, MM France
Experimental Mathematics 9 (3), 339-350, 2000
62000
Implementation of Pairings.
S Duquesne, G Frey
Handbook of elliptic and hyperelliptic curve cryptography, 389-404, 2005
52005
A strong lightweight authentication protocol for low-cost RFID systems
Z Shi, J Pieprzyk, C Doche, Y Xia, Y Zhang, J Dai
International Journal of Security and Its Applications 8 (6), 225-234, 2014
42014
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20