Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Alfred Menezes
@article{DBLP:journals/ieeesp/MenezesS21, author = {Alfred Menezes and Douglas Stebila}, title = {Challenges in Cryptography}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {2}, pages = {70--73}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3049730}, doi = {10.1109/MSEC.2021.3049730}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/MenezesS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MenezesS21a, author = {Alfred Menezes and Douglas Stebila}, title = {End-to-End Security: When Do We Have It?}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {4}, pages = {60--64}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3077403}, doi = {10.1109/MSEC.2021.3077403}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/MenezesS21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MenezesS21b, author = {Alfred Menezes and Douglas Stebila}, title = {The Advanced Encryption Standard: 20 Years Later}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {6}, pages = {98--102}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3107078}, doi = {10.1109/MSEC.2021.3107078}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/MenezesS21b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/LafranceM19, author = {Philip Lafrance and Alfred Menezes}, title = {On the security of the {WOTS-PRF} signature scheme}, journal = {Adv. Math. Commun.}, volume = {13}, number = {1}, pages = {185--193}, year = {2019}, url = {https://doi.org/10.3934/amc.2019012}, doi = {10.3934/AMC.2019012}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/LafranceM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/KoblitzM19, author = {Neal Koblitz and Alfred Menezes}, title = {Critical perspectives on provable security: Fifteen years of "another look" papers}, journal = {Adv. Math. Commun.}, volume = {13}, number = {4}, pages = {517--558}, year = {2019}, url = {https://doi.org/10.3934/amc.2019034}, doi = {10.3934/AMC.2019034}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/KoblitzM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/AdjAM19, author = {Gora Adj and Omran Ahmadi and Alfred Menezes}, title = {On isogeny graphs of supersingular elliptic curves over finite fields}, journal = {Finite Fields Their Appl.}, volume = {55}, pages = {268--283}, year = {2019}, url = {https://doi.org/10.1016/j.ffa.2018.10.002}, doi = {10.1016/J.FFA.2018.10.002}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/AdjAM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoblitzM19, author = {Neal Koblitz and Alfred Menezes}, title = {Critical Perspectives on Provable Security: Fifteen Years of "Another Look" Papers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1336}, year = {2019}, url = {https://eprint.iacr.org/2019/1336}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoblitzM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/AdjCCMORR18, author = {Gora Adj and Isaac Canales{-}Mart{\'{\i}}nez and Nareli Cruz Cort{\'{e}}s and Alfred Menezes and Thomaz Oliveira and Luis Rivera{-}Zamarripa and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields}, journal = {Adv. Math. Commun.}, volume = {12}, number = {4}, pages = {741--759}, year = {2018}, url = {https://doi.org/10.3934/amc.2018044}, doi = {10.3934/AMC.2018044}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/AdjCCMORR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/AdjCCMR18, author = {Gora Adj and Daniel Cervantes{-}V{\'{a}}zquez and Jes{\'{u}}s{-}Javier Chi{-}Dom{\'{\i}}nguez and Alfred Menezes and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, editor = {Carlos Cid and Michael J. Jacobson Jr.}, title = {On the Cost of Computing Isogenies Between Supersingular Elliptic Curves}, booktitle = {Selected Areas in Cryptography - {SAC} 2018 - 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11349}, pages = {322--343}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-10970-7\_15}, doi = {10.1007/978-3-030-10970-7\_15}, timestamp = {Wed, 25 Sep 2019 18:08:16 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/AdjCCMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AdjAM18, author = {Gora Adj and Omran Ahmadi and Alfred Menezes}, title = {On Isogeny Graphs of Supersingular Elliptic Curves over Finite Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {132}, year = {2018}, url = {http://eprint.iacr.org/2018/132}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AdjAM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AdjCCMR18, author = {Gora Adj and Daniel Cervantes{-}V{\'{a}}zquez and Jes{\'{u}}s{-}Javier Chi{-}Dom{\'{\i}}nguez and Alfred Menezes and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {On the cost of computing isogenies between supersingular elliptic curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {313}, year = {2018}, url = {https://eprint.iacr.org/2018/313}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AdjCCMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/ChatterjeeMR17, author = {Sanjit Chatterjee and Alfred Menezes and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {On Instantiating Pairing-Based Protocols with Elliptic Curves of Embedding Degree One}, journal = {{IEEE} Trans. Computers}, volume = {66}, number = {6}, pages = {1061--1070}, year = {2017}, url = {https://doi.org/10.1109/TC.2016.2633340}, doi = {10.1109/TC.2016.2633340}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/ChatterjeeMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LafranceM17, author = {Philip Lafrance and Alfred Menezes}, title = {On the security of the {WOTS-PRF} signature scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {938}, year = {2017}, url = {http://eprint.iacr.org/2017/938}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LafranceM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KoblitzM16, author = {Neal Koblitz and Alfred J. Menezes}, title = {Cryptocash, cryptocurrencies, and cryptocontracts}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {1}, pages = {87--102}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0148-5}, doi = {10.1007/S10623-015-0148-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KoblitzM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/KoblitzM16, author = {Neal Koblitz and Alfred Menezes}, title = {A Riddle Wrapped in an Enigma}, journal = {{IEEE} Secur. Priv.}, volume = {14}, number = {6}, pages = {34--42}, year = {2016}, url = {https://doi.org/10.1109/MSP.2016.120}, doi = {10.1109/MSP.2016.120}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/KoblitzM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/ChatterjeeKMS16, author = {Sanjit Chatterjee and Neal Koblitz and Alfred Menezes and Palash Sarkar}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Another Look at Tightness {II:} Practical Issues in Cryptography}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {21--55}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_3}, doi = {10.1007/978-3-319-61273-7\_3}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/ChatterjeeKMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/MenezesS016, author = {Alfred Menezes and Palash Sarkar and Shashank Singh}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Challenges with Assessing the Impact of {NFS} Advances on the Security of Pairing-Based Cryptography}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {83--108}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_5}, doi = {10.1007/978-3-319-61273-7\_5}, timestamp = {Tue, 04 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/MenezesS016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChatterjeeKMS16, author = {Sanjit Chatterjee and Neal Koblitz and Alfred Menezes and Palash Sarkar}, title = {Another Look at Tightness {II:} Practical Issues in Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {360}, year = {2016}, url = {http://eprint.iacr.org/2016/360}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChatterjeeKMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChatterjeeMR16, author = {Sanjit Chatterjee and Alfred Menezes and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {On Implementing Pairing-Based Protocols with Elliptic Curves of Embedding Degree One}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {403}, year = {2016}, url = {http://eprint.iacr.org/2016/403}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChatterjeeMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AdjCCMORR16, author = {Gora Adj and Isaac Canales{-}Mart{\'{\i}}nez and Nareli Cruz Cort{\'{e}}s and Alfred Menezes and Thomaz Oliveira and Luis Rivera{-}Zamarripa and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {914}, year = {2016}, url = {http://eprint.iacr.org/2016/914}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AdjCCMORR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MenezesSS16, author = {Alfred Menezes and Palash Sarkar and Shashank Singh}, title = {Challenges with Assessing the Impact of {NFS} Advances on the Security of Pairing-based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1102}, year = {2016}, url = {http://eprint.iacr.org/2016/1102}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MenezesSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cca/AdjMOR15, author = {Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Computing discrete logarithms using Joux's algorithm}, journal = {{ACM} Commun. Comput. Algebra}, volume = {49}, number = {2}, pages = {60}, year = {2015}, url = {https://doi.org/10.1145/2815111.2815154}, doi = {10.1145/2815111.2815154}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cca/AdjMOR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BlakeMS15, author = {Ian F. Blake and Alfred Menezes and Douglas R. Stinson}, title = {Guest Editorial: Special Issue in Honor of Scott A. Vanstone}, journal = {Des. Codes Cryptogr.}, volume = {77}, number = {2-3}, pages = {287--299}, year = {2015}, url = {https://doi.org/10.1007/s10623-015-0106-2}, doi = {10.1007/S10623-015-0106-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BlakeMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KoblitzM15, author = {Neal Koblitz and Alfred J. Menezes}, title = {The random oracle model: a twenty-year retrospective}, journal = {Des. Codes Cryptogr.}, volume = {77}, number = {2-3}, pages = {587--610}, year = {2015}, url = {https://doi.org/10.1007/s10623-015-0094-2}, doi = {10.1007/S10623-015-0094-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KoblitzM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/AdjMOR15, author = {Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Weakness of {\(\mathbb{F}\)}\({}_{\mbox{6\({}^{\mbox{6{\(\cdot\)}1429}}\)}}\) and {\(\mathbb{F}\)}\({}_{\mbox{2\({}^{\mbox{4{\(\cdot\)}3041}}\)}}\) for discrete logarithm cryptography}, journal = {Finite Fields Their Appl.}, volume = {32}, pages = {148--170}, year = {2015}, url = {https://doi.org/10.1016/j.ffa.2014.10.009}, doi = {10.1016/J.FFA.2014.10.009}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/AdjMOR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/ChatterjeeKM15, author = {Sanjit Chatterjee and Koray Karabina and Alfred Menezes}, title = {Fault Attacks on Pairing-Based Protocols Revisited}, journal = {{IEEE} Trans. Computers}, volume = {64}, number = {6}, pages = {1707--1714}, year = {2015}, url = {https://doi.org/10.1109/TC.2014.2339824}, doi = {10.1109/TC.2014.2339824}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/ChatterjeeKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChatterjeeM15, author = {Sanjit Chatterjee and Alfred Menezes}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Type 2 Structure-Preserving Signature Schemes Revisited}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9452}, pages = {286--310}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48797-6\_13}, doi = {10.1007/978-3-662-48797-6\_13}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChatterjeeM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/latincrypt/2014, editor = {Diego F. Aranha and Alfred Menezes}, title = {Progress in Cryptology - {LATINCRYPT} 2014 - Third International Conference on Cryptology and Information Security in Latin America, Florian{\'{o}}polis, Brazil, September 17-19, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8895}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-16295-9}, doi = {10.1007/978-3-319-16295-9}, isbn = {978-3-319-16294-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoblitzM15, author = {Neal Koblitz and Alfred Menezes}, title = {The Random Oracle Model: {A} Twenty-Year Retrospective}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {140}, year = {2015}, url = {http://eprint.iacr.org/2015/140}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoblitzM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoblitzM15a, author = {Neal Koblitz and Alfred Menezes}, title = {A Riddle Wrapped in an Enigma}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1018}, year = {2015}, url = {http://eprint.iacr.org/2015/1018}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoblitzM15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waifi/AdjMOR14, author = {Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Sihem Mesnager and Erkay Savas}, title = {Computing Discrete Logarithms in {\(\mathbb{F}\)}\({}_{\mbox{3\({}^{\mbox{6...137}}\)}}\) and {\(\mathbb{F}\)}\({}_{\mbox{3\({}^{\mbox{6...163}}\)}}\) Using Magma}, booktitle = {Arithmetic of Finite Fields - 5th International Workshop, {WAIFI} 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9061}, pages = {3--22}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16277-5\_1}, doi = {10.1007/978-3-319-16277-5\_1}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/waifi/AdjMOR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/14/KoblitzM14, author = {Neal Koblitz and Alfred Menezes}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Another Look at Security Theorems for 1-Key Nested MACs}, booktitle = {Open Problems in Mathematics and Computational Science}, pages = {69--89}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10683-0\_4}, doi = {10.1007/978-3-319-10683-0\_4}, timestamp = {Tue, 16 May 2017 14:01:44 +0200}, biburl = {https://dblp.org/rec/books/sp/14/KoblitzM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AdjMOR14, author = {Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Computing Discrete Logarithms in F\({}_{\mbox{3\({}^{\mbox{6*137}}\)}}\) using Magma}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {57}, year = {2014}, url = {http://eprint.iacr.org/2014/057}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AdjMOR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChatterjeeKM14, author = {Sanjit Chatterjee and Koray Karabina and Alfred Menezes}, title = {Fault attacks on pairing-based protocols revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {492}, year = {2014}, url = {http://eprint.iacr.org/2014/492}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChatterjeeKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChatterjeeM14a, author = {Sanjit Chatterjee and Alfred Menezes}, title = {Type 2 Structure-Preserving Signature Schemes Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {635}, year = {2014}, url = {http://eprint.iacr.org/2014/635}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChatterjeeM14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/KoblitzM13, author = {Neal Koblitz and Alfred Menezes}, title = {Another look at security definitions}, journal = {Adv. Math. Commun.}, volume = {7}, number = {1}, pages = {1--38}, year = {2013}, url = {https://doi.org/10.3934/amc.2013.7.1}, doi = {10.3934/AMC.2013.7.1}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/KoblitzM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/KarabinaKM13, author = {Koray Karabina and Edward Knapp and Alfred Menezes}, title = {Generalizations of Verheul's theorem to asymmetric pairings}, journal = {Adv. Math. Commun.}, volume = {7}, number = {1}, pages = {103--111}, year = {2013}, url = {https://doi.org/10.3934/amc.2013.7.103}, doi = {10.3934/AMC.2013.7.103}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/KarabinaKM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/KoblitzM13, author = {Neal Koblitz and Alfred Menezes}, title = {Another look at non-uniformity}, journal = {Groups Complex. Cryptol.}, volume = {5}, number = {2}, pages = {117--139}, year = {2013}, url = {https://doi.org/10.1515/gcc-2013-0008}, doi = {10.1515/GCC-2013-0008}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/KoblitzM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/KoblitzM13, author = {Neal Koblitz and Alfred Menezes}, title = {Another look at {HMAC}}, journal = {J. Math. Cryptol.}, volume = {7}, number = {3}, pages = {225--251}, year = {2013}, url = {https://doi.org/10.1515/jmc-2013-5004}, doi = {10.1515/JMC-2013-5004}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/KoblitzM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/AdjMOR13, author = {Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, editor = {Zhenfu Cao and Fangguo Zhang}, title = {Weakness of {\(\mathbb{F}\)}\({}_{\mbox{3\({}^{\mbox{6{\(\cdot\)}509}}\)}}\) for Discrete Logarithm Cryptography}, booktitle = {Pairing-Based Cryptography - Pairing 2013 - 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8365}, pages = {20--44}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04873-4\_2}, doi = {10.1007/978-3-319-04873-4\_2}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pairing/AdjMOR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/crc/13/Menezes13, author = {Alfred Menezes}, editor = {Gary L. Mullen and Daniel Panario}, title = {Introduction to cryptography}, booktitle = {Handbook of Finite Fields}, series = {Discrete mathematics and its applications}, pages = {741--749}, publisher = {{CRC} Press}, year = {2013}, timestamp = {Mon, 08 Jun 2020 15:38:06 +0200}, biburl = {https://dblp.org/rec/books/crc/13/Menezes13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoblitzM13, author = {Neal Koblitz and Alfred Menezes}, title = {Another Look at Security Theorems for 1-Key Nested MACs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {248}, year = {2013}, url = {http://eprint.iacr.org/2013/248}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoblitzM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AdjMOR13, author = {Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Weakness of {\(\mathbb{F}\)}\({}_{\mbox{3\({}^{\mbox{6{\(\cdot\)}509}}\)}}\) for Discrete Logarithm Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {446}, year = {2013}, url = {http://eprint.iacr.org/2013/446}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AdjMOR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AdjMOR13a, author = {Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Weakness of F\({}_{\mbox{3\({}^{\mbox{6*1429}}\)}}\) and F\({}_{\mbox{2\({}^{\mbox{4*3041}}\)}}\) for Discrete Logarithm Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {737}, year = {2013}, url = {http://eprint.iacr.org/2013/737}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AdjMOR13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Menezes12, author = {Alfred Menezes}, editor = {David Pointcheval and Thomas Johansson}, title = {Another Look at Provable Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {8}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_2}, doi = {10.1007/978-3-642-29011-4\_2}, timestamp = {Sun, 12 Nov 2023 02:15:08 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/Menezes12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/AranhaFKMR12, author = {Diego F. Aranha and Laura Fuentes{-}Casta{\~{n}}eda and Edward Knapp and Alfred Menezes and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, editor = {Michel Abdalla and Tanja Lange}, title = {Implementing Pairings at the 192-Bit Security Level}, booktitle = {Pairing-Based Cryptography - Pairing 2012 - 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7708}, pages = {177--195}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-36334-4\_11}, doi = {10.1007/978-3-642-36334-4\_11}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pairing/AranhaFKMR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoblitzM12, author = {Neal Koblitz and Alfred Menezes}, title = {Another look at {HMAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {74}, year = {2012}, url = {http://eprint.iacr.org/2012/074}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoblitzM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AranhaFKMR12, author = {Diego F. Aranha and Laura Fuentes{-}Casta{\~{n}}eda and Edward Knapp and Alfred Menezes and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Implementing Pairings at the 192-bit Security Level}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {232}, year = {2012}, url = {http://eprint.iacr.org/2012/232}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AranhaFKMR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoblitzM12a, author = {Neal Koblitz and Alfred Menezes}, title = {Another look at non-uniformity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {359}, year = {2012}, url = {http://eprint.iacr.org/2012/359}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoblitzM12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/ChatterjeeM11, author = {Sanjit Chatterjee and Alfred Menezes}, title = {On cryptographic protocols employing asymmetric pairings - The role of {\(\Psi\)} revisited}, journal = {Discret. Appl. Math.}, volume = {159}, number = {13}, pages = {1311--1322}, year = {2011}, url = {https://doi.org/10.1016/j.dam.2011.04.021}, doi = {10.1016/J.DAM.2011.04.021}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/ChatterjeeM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChatterjeeMU11, author = {Sanjit Chatterjee and Alfred Menezes and Berkant Ustaoglu}, editor = {Udaya Parampalli and Philip Hawkes}, title = {A Generic Variant of NIST's {KAS2} Key Agreement Protocol}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {353--370}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_23}, doi = {10.1007/978-3-642-22497-3\_23}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ChatterjeeMU11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/AranhaKMR11, author = {Diego F. Aranha and Edward Knapp and Alfred Menezes and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, editor = {Liqun Chen}, title = {Parallelizing the Weil and Tate Pairings}, booktitle = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC} 2011, Oxford, UK, December 12-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7089}, pages = {275--295}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25516-8\_17}, doi = {10.1007/978-3-642-25516-8\_17}, timestamp = {Wed, 18 Mar 2020 16:00:56 +0100}, biburl = {https://dblp.org/rec/conf/ima/AranhaKMR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/ChatterjeeMS11, author = {Sanjit Chatterjee and Alfred Menezes and Palash Sarkar}, editor = {Ali Miri and Serge Vaudenay}, title = {Another Look at Tightness}, booktitle = {Selected Areas in Cryptography - 18th International Workshop, {SAC} 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7118}, pages = {293--319}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-28496-0\_18}, doi = {10.1007/978-3-642-28496-0\_18}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/ChatterjeeMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/HankersonM11, author = {Darrel Hankerson and Alfred Menezes}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {{ECC} Challenges}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {379--380}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_242}, doi = {10.1007/978-1-4419-5906-5\_242}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/HankersonM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/HankersonM11a, author = {Darrel Hankerson and Alfred Menezes}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Elliptic Curve Cryptography}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {397}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_245}, doi = {10.1007/978-1-4419-5906-5\_245}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/HankersonM11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/HankersonM11b, author = {Darrel Hankerson and Alfred Menezes}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Elliptic Curve Discrete Logarithm Problem}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {397--400}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_246}, doi = {10.1007/978-1-4419-5906-5\_246}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/HankersonM11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/HankersonM11c, author = {Darrel Hankerson and Alfred Menezes}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Elliptic Curve Key Agreement Schemes}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {400--401}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_247}, doi = {10.1007/978-1-4419-5906-5\_247}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/HankersonM11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/HankersonM11d, author = {Darrel Hankerson and Alfred Menezes}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Elliptic Curve Keys}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {401}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_248}, doi = {10.1007/978-1-4419-5906-5\_248}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/HankersonM11d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/HankersonM11e, author = {Darrel Hankerson and Alfred Menezes}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Elliptic Curve Point Multiplication Using Halving}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {403--406}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_249}, doi = {10.1007/978-1-4419-5906-5\_249}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/HankersonM11e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/HankersonM11f, author = {Darrel Hankerson and Alfred Menezes}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Elliptic Curve Public-Key Encryption Schemes}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {406--407}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_250}, doi = {10.1007/978-1-4419-5906-5\_250}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/HankersonM11f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/HankersonM11g, author = {Darrel Hankerson and Alfred Menezes}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Elliptic Curve Signature Schemes}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {407--408}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_251}, doi = {10.1007/978-1-4419-5906-5\_251}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/HankersonM11g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/HankersonM11h, author = {Darrel Hankerson and Alfred Menezes}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Elliptic Curves}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {408--410}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_244}, doi = {10.1007/978-1-4419-5906-5\_244}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/HankersonM11h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/HankersonM11i, author = {Darrel Hankerson and Alfred Menezes}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Koblitz Elliptic Curves}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {705--706}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_872}, doi = {10.1007/978-1-4419-5906-5\_872}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/HankersonM11i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/HankersonM11j, author = {Darrel Hankerson and Alfred Menezes}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {{NIST} Elliptic Curves}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {843--844}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_255}, doi = {10.1007/978-1-4419-5906-5\_255}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/HankersonM11j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/HankersonM11k, author = {Darrel Hankerson and Alfred Menezes}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {{NSA} Suite {B}}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {857}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_648}, doi = {10.1007/978-1-4419-5906-5\_648}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/HankersonM11k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/HankersonM11l, author = {Darrel Hankerson and Alfred Menezes}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Pairings}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {907--909}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_254}, doi = {10.1007/978-1-4419-5906-5\_254}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/HankersonM11l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoblitzM11, author = {Neal Koblitz and Alfred Menezes}, title = {Another Look at Security Definitions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {343}, year = {2011}, url = {http://eprint.iacr.org/2011/343}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoblitzM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChatterjeeMS11, author = {Sanjit Chatterjee and Alfred Menezes and Palash Sarkar}, title = {Another Look at Tightness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {442}, year = {2011}, url = {http://eprint.iacr.org/2011/442}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChatterjeeMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChatterjeeHKM10, author = {Sanjit Chatterjee and Darrel Hankerson and Edward Knapp and Alfred Menezes}, title = {Comparing two pairing-based aggregate signature schemes}, journal = {Des. Codes Cryptogr.}, volume = {55}, number = {2-3}, pages = {141--167}, year = {2010}, url = {https://doi.org/10.1007/s10623-009-9334-7}, doi = {10.1007/S10623-009-9334-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChatterjeeHKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/MenezesU10, author = {Alfred Menezes and Berkant Ustaoglu}, title = {On reusing ephemeral keys in Diffie-Hellman key agreement protocols}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {2}, pages = {154--158}, year = {2010}, url = {https://doi.org/10.1504/IJACT.2010.038308}, doi = {10.1504/IJACT.2010.038308}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/MenezesU10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/KarabinaMPS10, author = {Koray Karabina and Alfred Menezes and Carl Pomerance and Igor E. Shparlinski}, title = {On the asymptotic effectiveness of Weil descent attacks}, journal = {J. Math. Cryptol.}, volume = {4}, number = {2}, pages = {175--191}, year = {2010}, url = {https://doi.org/10.1515/jmc.2010.007}, doi = {10.1515/JMC.2010.007}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/KarabinaMPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/ChatterjeeMU10, author = {Sanjit Chatterjee and Alfred Menezes and Berkant Ustaoglu}, editor = {Guang Gong and Kishan Chand Gupta}, title = {Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6498}, pages = {49--68}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17401-8\_5}, doi = {10.1007/978-3-642-17401-8\_5}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/ChatterjeeMU10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waifi/ChatterjeeHM10, author = {Sanjit Chatterjee and Darrel Hankerson and Alfred Menezes}, editor = {M. Anwar Hasan and Tor Helleseth}, title = {On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings}, booktitle = {Arithmetic of Finite Fields, Third International Workshop, {WAIFI} 2010, Istanbul, Turkey, June 27-30, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6087}, pages = {114--134}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13797-6\_9}, doi = {10.1007/978-3-642-13797-6\_9}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/waifi/ChatterjeeHM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoblitzM10, author = {Neal Koblitz and Alfred Menezes}, title = {Intractable Problems in Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {290}, year = {2010}, url = {http://eprint.iacr.org/2010/290}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoblitzM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChatterjeeHM10, author = {Sanjit Chatterjee and Darrel Hankerson and Alfred Menezes}, title = {On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {388}, year = {2010}, url = {http://eprint.iacr.org/2010/388}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChatterjeeHM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoblitzMS10, author = {Neal Koblitz and Alfred Menezes and Igor E. Shparlinski}, title = {Discrete Logarithms, Diffie-Hellman, and Reductions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {577}, year = {2010}, url = {http://eprint.iacr.org/2010/577}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoblitzMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/MenezesU09, author = {Alfred Menezes and Berkant Ustaoglu}, title = {Comparing the pre- and post-specified peer models for key agreement}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {3}, pages = {236--250}, year = {2009}, url = {https://doi.org/10.1504/IJACT.2009.023472}, doi = {10.1504/IJACT.2009.023472}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/MenezesU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/HankersonKM09, author = {Darrel Hankerson and Koray Karabina and Alfred Menezes}, title = {Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields}, journal = {{IEEE} Trans. Computers}, volume = {58}, number = {10}, pages = {1411--1420}, year = {2009}, url = {https://doi.org/10.1109/TC.2009.61}, doi = {10.1109/TC.2009.61}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/HankersonKM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/ChatterjeeKM09, author = {Sanjit Chatterjee and Koray Karabina and Alfred Menezes}, editor = {Matthew Geoffrey Parker}, title = {A New Protocol for the Nearby Friend Problem}, booktitle = {Cryptography and Coding, 12th {IMA} International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5921}, pages = {236--251}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10868-6\_14}, doi = {10.1007/978-3-642-10868-6\_14}, timestamp = {Wed, 01 Sep 2021 10:36:08 +0200}, biburl = {https://dblp.org/rec/conf/ima/ChatterjeeKM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/ChatterjeeMU09, author = {Sanjit Chatterjee and Alfred Menezes and Berkant Ustaoglu}, editor = {Bimal K. Roy and Nicolas Sendrier}, title = {Reusing Static Keys in Key Agreement Protocols}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5922}, pages = {39--56}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10628-6\_3}, doi = {10.1007/978-3-642-10628-6\_3}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/ChatterjeeMU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ciss/HankersonMS09, author = {Darrel Hankerson and Alfred Menezes and Michael Scott}, editor = {Marc Joye and Gregory Neven}, title = {Software Implementation of Pairings}, booktitle = {Identity-Based Cryptography}, series = {Cryptology and Information Security Series}, volume = {2}, pages = {188--206}, publisher = {{IOS} Press}, year = {2009}, url = {https://doi.org/10.3233/978-1-58603-947-9-188}, doi = {10.3233/978-1-58603-947-9-188}, timestamp = {Thu, 11 Apr 2019 14:31:06 +0200}, biburl = {https://dblp.org/rec/series/ciss/HankersonMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChatterjeeHKM09, author = {Sanjit Chatterjee and Darrel Hankerson and Edward Knapp and Alfred Menezes}, title = {Comparing Two Pairing-Based Aggregate Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {60}, year = {2009}, url = {http://eprint.iacr.org/2009/060}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChatterjeeHKM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChatterjeeM09, author = {Sanjit Chatterjee and Alfred Menezes}, title = {On Cryptographic Protocols Employing Asymmetric Pairings - The Role of Psi Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {480}, year = {2009}, url = {http://eprint.iacr.org/2009/480}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChatterjeeM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/KoblitzM08, author = {Neal Koblitz and Alfred Menezes}, title = {Another look at non-standard discrete log and Diffie-Hellman problems}, journal = {J. Math. Cryptol.}, volume = {2}, number = {4}, pages = {311--326}, year = {2008}, url = {https://doi.org/10.1515/JMC.2008.014}, doi = {10.1515/JMC.2008.014}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/KoblitzM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MenezesU08, author = {Alfred Menezes and Berkant Ustaoglu}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Comparing the Pre- and Post-specified Peer Models for Key Agreement}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {53--68}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_5}, doi = {10.1007/978-3-540-70500-0\_5}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/MenezesU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MenezesU08, author = {Alfred Menezes and Berkant Ustaoglu}, editor = {Masayuki Abe and Virgil D. Gligor}, title = {Security arguments for the {UM} key agreement protocol in the {NIST} {SP} 800-56A standard}, booktitle = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20, 2008}, pages = {261--270}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1368310.1368348}, doi = {10.1145/1368310.1368348}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MenezesU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Menezes08, author = {Alfred Menezes}, editor = {Kanta Matsuura and Eiichiro Fujisaki}, title = {The Elliptic Curve Discrete Logarithm Problem: State of the Art}, booktitle = {Advances in Information and Computer Security, Third International Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5312}, pages = {218}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89598-5\_14}, doi = {10.1007/978-3-540-89598-5\_14}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Menezes08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HankersonKM08, author = {Darrel Hankerson and Koray Karabina and Alfred Menezes}, title = {Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {334}, year = {2008}, url = {http://eprint.iacr.org/2008/334}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HankersonKM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoblitzKM08, author = {Ann Hibner Koblitz and Neal Koblitz and Alfred Menezes}, title = {Elliptic Curve Cryptography: The Serpentine Course of a Paradigm Shift}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {390}, year = {2008}, url = {http://eprint.iacr.org/2008/390}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoblitzKM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/KoblitzM07, author = {Neal Koblitz and Alfred Menezes}, title = {Another look at generic groups}, journal = {Adv. Math. Commun.}, volume = {1}, number = {1}, pages = {13--28}, year = {2007}, url = {https://doi.org/10.3934/amc.2007.1.13}, doi = {10.3934/AMC.2007.1.13}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/KoblitzM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/AhmadiHM07, author = {Omran Ahmadi and Darrel Hankerson and Alfred Menezes}, title = {Formulas for cube roots in F\({}_{\mbox{3\({}^{\mbox{m}}\)}}\)}, journal = {Discret. Appl. Math.}, volume = {155}, number = {3}, pages = {260--270}, year = {2007}, url = {https://doi.org/10.1016/j.dam.2006.06.004}, doi = {10.1016/J.DAM.2006.06.004}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/AhmadiHM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Menezes07, author = {Alfred Menezes}, title = {Another look at {HMQV}}, journal = {J. Math. Cryptol.}, volume = {1}, number = {1}, pages = {47--64}, year = {2007}, url = {https://doi.org/10.1515/JMC.2007.004}, doi = {10.1515/JMC.2007.004}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Menezes07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KoblitzM07, author = {Neal Koblitz and Alfred Menezes}, title = {Another Look at "Provable Security"}, journal = {J. Cryptol.}, volume = {20}, number = {1}, pages = {3--37}, year = {2007}, url = {https://doi.org/10.1007/s00145-005-0432-z}, doi = {10.1007/S00145-005-0432-Z}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KoblitzM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/Menezes07, author = {Alfred Menezes}, editor = {Tsuyoshi Takagi and Tatsuaki Okamoto and Eiji Okamoto and Takeshi Okamoto}, title = {Supersingular Elliptic Curves in Cryptography}, booktitle = {Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4575}, pages = {293}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73489-5\_15}, doi = {10.1007/978-3-540-73489-5\_15}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pairing/Menezes07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waifi/AhmadiHM07, author = {Omran Ahmadi and Darrel Hankerson and Alfred Menezes}, editor = {Claude Carlet and Berk Sunar}, title = {Software Implementation of Arithmetic in F\({}_{\mbox{3\({}^{\mbox{m}}\)}}\)}, booktitle = {Arithmetic of Finite Fields, First International Workshop, {WAIFI} 2007, Madrid, Spain, June 21-22, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4547}, pages = {85--102}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73074-3\_8}, doi = {10.1007/978-3-540-73074-3\_8}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/waifi/AhmadiHM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2007, editor = {Alfred Menezes}, title = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4622}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74143-5}, doi = {10.1007/978-3-540-74143-5}, isbn = {978-3-540-74142-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoblitzM07, author = {Neal Koblitz and Alfred Menezes}, title = {Another Look at Non-Standard Discrete Log and Diffie-Hellman Problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {442}, year = {2007}, url = {http://eprint.iacr.org/2007/442}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoblitzM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/MenezesT06, author = {Alfred Menezes and Edlyn Teske}, title = {Cryptographic implications of Hess' generalized {GHS} attack}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {16}, number = {6}, pages = {439--460}, year = {2006}, url = {https://doi.org/10.1007/s00200-005-0186-8}, doi = {10.1007/S00200-005-0186-8}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aaecc/MenezesT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/DahabHHLLM06, author = {Ricardo Dahab and Darrel Hankerson and Fei Hu and Men Long and Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and Alfred Menezes}, title = {Software Multiplication Using Gaussian Normal Bases}, journal = {{IEEE} Trans. Computers}, volume = {55}, number = {8}, pages = {974--984}, year = {2006}, url = {https://doi.org/10.1109/TC.2006.132}, doi = {10.1109/TC.2006.132}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/DahabHHLLM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/MenezesU06, author = {Alfred Menezes and Berkant Ustaoglu}, editor = {Rana Barua and Tanja Lange}, title = {On the Importance of Public-Key Validation in the {MQV} and {HMQV} Key Agreement Protocols}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4329}, pages = {133--147}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11941378\_11}, doi = {10.1007/11941378\_11}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/MenezesU06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/KoblitzM06, author = {Neal Koblitz and Alfred Menezes}, editor = {Rana Barua and Tanja Lange}, title = {Another Look at "Provable Security". {II}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4329}, pages = {148--175}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11941378\_12}, doi = {10.1007/11941378\_12}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/KoblitzM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoblitzM06, author = {Neal Koblitz and Alfred Menezes}, title = {Another Look at "Provable Security". {II}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {229}, year = {2006}, url = {http://eprint.iacr.org/2006/229}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoblitzM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoblitzM06a, author = {Neal Koblitz and Alfred Menezes}, title = {Another Look at Generic Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {230}, year = {2006}, url = {http://eprint.iacr.org/2006/230}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoblitzM06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AhmadiM05, author = {Omran Ahmadi and Alfred Menezes}, title = {On the Number of Trace-One Elements in Polynomial Bases for F\({}_{\mbox{2\({}^{\mbox{n}}\)}}\)}, journal = {Des. Codes Cryptogr.}, volume = {37}, number = {3}, pages = {493--507}, year = {2005}, url = {https://doi.org/10.1007/s10623-004-4039-4}, doi = {10.1007/S10623-004-4039-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AhmadiM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/GalbraithM05, author = {Steven D. Galbraith and Alfred Menezes}, title = {Algebraic curves and cryptography}, journal = {Finite Fields Their Appl.}, volume = {11}, number = {3}, pages = {544--577}, year = {2005}, url = {https://doi.org/10.1016/j.ffa.2005.05.001}, doi = {10.1016/J.FFA.2005.05.001}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/GalbraithM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/KoblitzM05, author = {Neal Koblitz and Alfred Menezes}, editor = {Nigel P. Smart}, title = {Pairing-Based Cryptography at High Security Levels}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {13--36}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_2}, doi = {10.1007/11586821\_2}, timestamp = {Wed, 18 Mar 2020 16:00:57 +0100}, biburl = {https://dblp.org/rec/conf/ima/KoblitzM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ctrsa/2005, editor = {Alfred Menezes}, title = {Topics in Cryptology - {CT-RSA} 2005, The Cryptographers' Track at the {RSA} Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3376}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b105222}, doi = {10.1007/B105222}, isbn = {3-540-24399-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/HankersonM05, author = {Darrel Hankerson and Alfred Menezes}, editor = {Henk C. A. van Tilborg}, title = {{ECC} Challenges}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_119}, doi = {10.1007/0-387-23483-7\_119}, timestamp = {Thu, 27 Jun 2019 15:50:13 +0200}, biburl = {https://dblp.org/rec/reference/crypt/HankersonM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/HankersonM05a, author = {Darrel Hankerson and Alfred Menezes}, editor = {Henk C. A. van Tilborg}, title = {Elliptic Curve}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_130}, doi = {10.1007/0-387-23483-7\_130}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/HankersonM05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/HankersonM05b, author = {Darrel Hankerson and Alfred Menezes}, editor = {Henk C. A. van Tilborg}, title = {Elliptic Curve Cryptography}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_131}, doi = {10.1007/0-387-23483-7\_131}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/HankersonM05b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/HankersonM05c, author = {Darrel Hankerson and Alfred Menezes}, editor = {Henk C. A. van Tilborg}, title = {Elliptic Curve Discrete Logarithm Problem}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_132}, doi = {10.1007/0-387-23483-7\_132}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/HankersonM05c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/HankersonM05d, author = {Darrel Hankerson and Alfred Menezes}, editor = {Henk C. A. van Tilborg}, title = {Elliptic Curve Key Agreement Schemes}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_133}, doi = {10.1007/0-387-23483-7\_133}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/HankersonM05d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/HankersonM05e, author = {Darrel Hankerson and Alfred Menezes}, editor = {Henk C. A. van Tilborg}, title = {Elliptic Curve Keys}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_134}, doi = {10.1007/0-387-23483-7\_134}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/HankersonM05e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/HankersonM05f, author = {Darrel Hankerson and Alfred Menezes}, editor = {Henk C. A. van Tilborg}, title = {Elliptic Curve Point Multiplication Using Halving}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_136}, doi = {10.1007/0-387-23483-7\_136}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/HankersonM05f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/HankersonM05g, author = {Darrel Hankerson and Alfred Menezes}, editor = {Henk C. A. van Tilborg}, title = {Elliptic Curve Public-Key Encryption Schemes}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_137}, doi = {10.1007/0-387-23483-7\_137}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/HankersonM05g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/HankersonM05h, author = {Darrel Hankerson and Alfred Menezes}, editor = {Henk C. A. van Tilborg}, title = {Elliptic Curve Signature Schemes}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_138}, doi = {10.1007/0-387-23483-7\_138}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/HankersonM05h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoblitzM05, author = {Neal Koblitz and Alfred Menezes}, title = {Pairing-Based Cryptography at High Security Levels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {76}, year = {2005}, url = {http://eprint.iacr.org/2005/076}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoblitzM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Menezes05, author = {Alfred Menezes}, title = {Another look at {HMQV}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {205}, year = {2005}, url = {http://eprint.iacr.org/2005/205}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Menezes05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MenezesS04, author = {Alfred Menezes and Nigel P. Smart}, title = {Security of Signature Schemes in a Multi-User Setting}, journal = {Des. Codes Cryptogr.}, volume = {33}, number = {3}, pages = {261--274}, year = {2004}, url = {https://doi.org/10.1023/B:DESI.0000036250.18062.3f}, doi = {10.1023/B:DESI.0000036250.18062.3F}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MenezesS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/moc/KoblitzM04, author = {Neal Koblitz and Alfred Menezes}, title = {Obstacles to the torsion-subgroup attack on the decision Diffie-Hellman Problem}, journal = {Math. Comput.}, volume = {73}, number = {248}, pages = {2027--2041}, year = {2004}, url = {https://doi.org/10.1090/S0025-5718-04-01637-0}, doi = {10.1090/S0025-5718-04-01637-0}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/moc/KoblitzM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamrev/KoblitzM04, author = {Neal Koblitz and Alfred Menezes}, title = {A Survey of Public-Key Cryptosystems}, journal = {{SIAM} Rev.}, volume = {46}, number = {4}, pages = {599--634}, year = {2004}, url = {https://doi.org/10.1137/S0036144503439190}, doi = {10.1137/S0036144503439190}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamrev/KoblitzM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/FongHLM04, author = {Kenny Fong and Darrel Hankerson and Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and Alfred Menezes}, title = {Field Inversion and Point Halving Revisited}, journal = {{IEEE} Trans. Computers}, volume = {53}, number = {8}, pages = {1047--1059}, year = {2004}, url = {https://doi.org/10.1109/TC.2004.43}, doi = {10.1109/TC.2004.43}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/FongHLM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/MenezesTW04, author = {Alfred Menezes and Edlyn Teske and Annegret Weng}, editor = {Tatsuaki Okamoto}, title = {Weak Fields for {ECC}}, booktitle = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2964}, pages = {366--386}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24660-2\_28}, doi = {10.1007/978-3-540-24660-2\_28}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/MenezesTW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoblitzM04, author = {Neal Koblitz and Alfred Menezes}, title = {Another Look at "Provable Security"}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {152}, year = {2004}, url = {http://eprint.iacr.org/2004/152}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoblitzM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MenezesT04, author = {Alfred Menezes and Edlyn Teske}, title = {Cryptographic Implications of Hess' Generalized {GHS} Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {235}, year = {2004}, url = {http://eprint.iacr.org/2004/235}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MenezesT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LawMQSV03, author = {Laurie Law and Alfred Menezes and Minghua Qu and Jerome A. Solinas and Scott A. Vanstone}, title = {An Efficient Protocol for Authenticated Key Agreement}, journal = {Des. Codes Cryptogr.}, volume = {28}, number = {2}, pages = {119--134}, year = {2003}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LawMQSV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AntipaBMSV03, author = {Adrian Antipa and Daniel R. L. Brown and Alfred Menezes and Ren{\'{e}} Struik and Scott A. Vanstone}, editor = {Yvo Desmedt}, title = {Validation of Elliptic Curve Public Keys}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {211--223}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_16}, doi = {10.1007/3-540-36288-6\_16}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AntipaBMSV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MenezesTW03, author = {Alfred Menezes and Edlyn Teske and Annegret Weng}, title = {Weak Fields for {ECC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {128}, year = {2003}, url = {http://eprint.iacr.org/2003/128}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MenezesTW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/EncinasMM02, author = {Luis Hern{\'{a}}ndez Encinas and Alfred Menezes and Jaime Mu{\~{n}}oz Masqu{\'{e}}}, title = {Isomorphism Classes of Genus-2 Hyperelliptic Curves Over Finite Fields}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {13}, number = {1}, pages = {57--65}, year = {2002}, url = {https://doi.org/10.1007/s002000100092}, doi = {10.1007/S002000100092}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aaecc/EncinasMM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/lmsjcm/MaurerMT02, author = {Markus Maurer and Alfred Menezes and Edlyn Teske}, title = {Analysis of the {GHS} Weil Descent Attack on the {ECDLP} over Characteristic Two Finite Fields of Composite Degree}, journal = {{LMS} J. Comput. Math.}, volume = {5}, pages = {127--174}, year = {2002}, url = {https://doi.org/10.1112/s1461157000000723}, doi = {10.1112/S1461157000000723}, timestamp = {Fri, 05 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/lmsjcm/MaurerMT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/indocrypt/2002, editor = {Alfred Menezes and Palash Sarkar}, title = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002}, series = {Lecture Notes in Computer Science}, volume = {2551}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36231-2}, doi = {10.1007/3-540-36231-2}, isbn = {3-540-00263-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/JohnsonMV01, author = {Don Johnson and Alfred Menezes and Scott A. Vanstone}, title = {The Elliptic Curve Digital Signature Algorithm {(ECDSA)}}, journal = {Int. J. Inf. Sec.}, volume = {1}, number = {1}, pages = {36--63}, year = {2001}, url = {https://doi.org/10.1007/s102070100002}, doi = {10.1007/S102070100002}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/JohnsonMV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BrownHLM01, author = {Michael Brown and Darrel Hankerson and Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and Alfred Menezes}, editor = {David Naccache}, title = {Software Implementation of the {NIST} Elliptic Curves Over Prime Fields}, booktitle = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2020}, pages = {250--265}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45353-9\_19}, doi = {10.1007/3-540-45353-9\_19}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BrownHLM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/MenezesQ01, author = {Alfred Menezes and Minghua Qu}, editor = {David Naccache}, title = {Analysis of the Weil Descent Attack of Gaudry, Hess and Smart}, booktitle = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2020}, pages = {308--318}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45353-9\_23}, doi = {10.1007/3-540-45353-9\_23}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/MenezesQ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/MaurerMT01, author = {Markus Maurer and Alfred Menezes and Edlyn Teske}, editor = {C. Pandu Rangan and Cunsheng Ding}, title = {Analysis of the {GHS} Weil Descent Attack on the {ECDLP} over Characteristic Two Finite Fields of Composite Degree}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2247}, pages = {195--213}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45311-3\_19}, doi = {10.1007/3-540-45311-3\_19}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/MaurerMT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Menezes01, author = {Alfred Menezes}, title = {Wireless Security - Is It Real?}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2001, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2001}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/Menezes01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JacobsonMS01, author = {Michael J. Jacobson Jr. and Alfred Menezes and Andreas Stein}, title = {Solving Elliptic Curve Discrete Logarithm Problems Using Weil Descent}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {41}, year = {2001}, url = {http://eprint.iacr.org/2001/041}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JacobsonMS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaurerMT01, author = {Markus Maurer and Alfred Menezes and Edlyn Teske}, title = {Analysis of the {GHS} Weil Descent Attack on the {ECDLP} over Characteristic Two Finite Fields of Composite Degree}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {84}, year = {2001}, url = {http://eprint.iacr.org/2001/084}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaurerMT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KoblitzMV00, author = {Neal Koblitz and Alfred Menezes and Scott A. Vanstone}, title = {The State of Elliptic Curve Cryptography}, journal = {Des. Codes Cryptogr.}, volume = {19}, number = {2/3}, pages = {173--193}, year = {2000}, url = {https://doi.org/10.1023/A:1008354106356}, doi = {10.1023/A:1008354106356}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KoblitzMV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HankersonHM00, author = {Darrel Hankerson and Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and Alfred Menezes}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Software Implementation of Elliptic Curve Cryptography over Binary Fields}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {1--24}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_1}, doi = {10.1007/3-540-44499-8\_1}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/HankersonHM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BrownCHHKM00, author = {Michael Brown and Donny Cheung and Darrel Hankerson and Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and Michael Kirkup and Alfred Menezes}, editor = {Steven M. Bellovin and Greg Rose}, title = {{PGP} in Constrained Wireless Devices}, booktitle = {9th {USENIX} Security Symposium, Denver, Colorado, USA, August 14-17, 2000}, publisher = {{USENIX} Association}, year = {2000}, url = {https://www.usenix.org/conference/9th-usenix-security-symposium/pgp-constrained-wireless-devices}, timestamp = {Mon, 01 Feb 2021 08:43:02 +0100}, biburl = {https://dblp.org/rec/conf/uss/BrownCHHKM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Blake-WilsonM99, author = {Simon Blake{-}Wilson and Alfred Menezes}, editor = {Hideki Imai and Yuliang Zheng}, title = {Unknown Key-Share Attacks on the Station-to-Station {(STS)} Protocol}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {154--170}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_12}, doi = {10.1007/3-540-49162-7\_12}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Blake-WilsonM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/MenezesO99, author = {Alfred J. Menezes and Paul C. van Oorschot}, editor = {Kenneth H. Rosen and John G. Michaels and Jonathan L. Gross and Jerrold W. Grossman and Douglas R. Shier}, title = {Coding Theory And Cryptology}, booktitle = {Handbook of Discrete and Combinatorial Mathematics}, publisher = {{CRC} Press}, year = {1999}, url = {https://doi.org/10.1201/9781439832905.ch14}, doi = {10.1201/9781439832905.CH14}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/reference/crc/MenezesO99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Blake-WilsonM98, author = {Simon Blake{-}Wilson and Alfred Menezes}, editor = {Stafford E. Tavares and Henk Meijer}, title = {Authenticated Diffie-Hellman Key Agreement Protocols}, booktitle = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1556}, pages = {339--361}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-48892-8\_26}, doi = {10.1007/3-540-48892-8\_26}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/Blake-WilsonM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0088555, author = {Alfred J. Menezes}, title = {Elliptic curve public key cryptosystems}, series = {The Kluwer international series in engineering and computer science}, volume = {234}, publisher = {Kluwer}, year = {1997}, isbn = {978-0-7923-9368-9}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0088555.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/arscom/MenezesW97, author = {Alfred Menezes and Yihong Wu}, title = {The Discrete Logarithm Problem in GL(n, q)}, journal = {Ars Comb.}, volume = {47}, year = {1997}, timestamp = {Fri, 11 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/arscom/MenezesW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Blake-WilsonJM97, author = {Simon Blake{-}Wilson and Don Johnson and Alfred Menezes}, editor = {Michael Darnell}, title = {Key Agreement Protocols and Their Security Analysis}, booktitle = {Cryptography and Coding, 6th {IMA} International Conference, Cirencester, UK, December 17-19, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1355}, pages = {30--45}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0024447}, doi = {10.1007/BFB0024447}, timestamp = {Wed, 18 Mar 2020 16:00:59 +0100}, biburl = {https://dblp.org/rec/conf/ima/Blake-WilsonJM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Blake-WilsonM97, author = {Simon Blake{-}Wilson and Alfred Menezes}, editor = {Bruce Christianson and Bruno Crispo and T. Mark A. Lomas and Michael Roe}, title = {Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques}, booktitle = {Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1361}, pages = {137--158}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028166}, doi = {10.1007/BFB0028166}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Blake-WilsonM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/crc/MenezesOV96, author = {Alfred Menezes and Paul C. van Oorschot and Scott A. Vanstone}, title = {Handbook of Applied Cryptography}, publisher = {{CRC} Press}, year = {1996}, url = {http://cacr.uwaterloo.ca/hac/}, doi = {10.1201/9781439821916}, isbn = {0-8493-8523-7}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/crc/MenezesOV96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/MenezesV93, author = {Alfred Menezes and Scott A. Vanstone}, title = {Elliptic Curve Cryptosystems and Their Implementations}, journal = {J. Cryptol.}, volume = {6}, number = {4}, pages = {209--224}, year = {1993}, url = {https://doi.org/10.1007/BF00203817}, doi = {10.1007/BF00203817}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/MenezesV93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/MenezesOV93, author = {Alfred Menezes and Tatsuaki Okamoto and Scott A. Vanstone}, title = {Reducing elliptic curve logarithms to logarithms in a finite field}, journal = {{IEEE} Trans. Inf. Theory}, volume = {39}, number = {5}, pages = {1639--1646}, year = {1993}, url = {https://doi.org/10.1109/18.259647}, doi = {10.1109/18.259647}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/MenezesOV93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/MenezesV92, author = {Alfred Menezes and Scott A. Vanstone}, title = {A Note on Cycloc Groups, Finite Fields, and the Discrete Logarithm Problem}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {3}, pages = {67--74}, year = {1992}, url = {https://doi.org/10.1007/BF01189025}, doi = {10.1007/BF01189025}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aaecc/MenezesV92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/MenezesOV92, author = {Alfred Menezes and Paul C. van Oorschot and Scott A. Vanstone}, title = {Subgroup Refinement Algorithms for Root Finding in GF(q)}, journal = {{SIAM} J. Comput.}, volume = {21}, number = {2}, pages = {228--239}, year = {1992}, url = {https://doi.org/10.1137/0221018}, doi = {10.1137/0221018}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/siamcomp/MenezesOV92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HarperMV92, author = {Greg Harper and Alfred Menezes and Scott A. Vanstone}, editor = {Rainer A. Rueppel}, title = {Public-Key Cryptosystems with Very Small Key Length}, booktitle = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and Application of of Cryptographic Techniques, Balatonf{\"{u}}red, Hungary, May 24-28, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {658}, pages = {163--173}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-47555-9\_14}, doi = {10.1007/3-540-47555-9\_14}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HarperMV92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/MenezesVO91, author = {Alfred Menezes and Scott A. Vanstone and Tatsuaki Okamoto}, editor = {Cris Koutsougeras and Jeffrey Scott Vitter}, title = {Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field}, booktitle = {Proceedings of the 23rd Annual {ACM} Symposium on Theory of Computing, May 5-8, 1991, New Orleans, Louisiana, {USA}}, pages = {80--89}, publisher = {{ACM}}, year = {1991}, url = {https://doi.org/10.1145/103418.103434}, doi = {10.1145/103418.103434}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/MenezesVO91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/1990, editor = {Alfred Menezes and Scott A. Vanstone}, title = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {537}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-38424-3}, doi = {10.1007/3-540-38424-3}, isbn = {3-540-54508-5}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/1990.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/MenezesV90, author = {Alfred Menezes and Scott A. Vanstone}, editor = {Jennifer Seberry and Josef Pieprzyk}, title = {The Implementation of Elliptic Curve Cryptosystems}, booktitle = {Advances in Cryptology - {AUSCRYPT} '90, International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {453}, pages = {2--13}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/BFb0030345}, doi = {10.1007/BFB0030345}, timestamp = {Fri, 17 Jul 2020 16:12:46 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/MenezesV90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issac/MenezesOV88, author = {Alfred Menezes and Paul C. van Oorschot and Scott A. Vanstone}, editor = {Patrizia M. Gianni}, title = {Some Computational Aspects of Root Finding in GF(q\({}^{\mbox{m}}\))}, booktitle = {Symbolic and Algebraic Computation, International Symposium ISSAC'88, Rome, Italy, July 4-8, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {358}, pages = {259--270}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-51084-2\_24}, doi = {10.1007/3-540-51084-2\_24}, timestamp = {Fri, 17 Jul 2020 16:12:46 +0200}, biburl = {https://dblp.org/rec/conf/issac/MenezesOV88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.