BibTeX records: Alfred Menezes

download as .bib file

@article{DBLP:journals/ieeesp/MenezesS21,
  author       = {Alfred Menezes and
                  Douglas Stebila},
  title        = {Challenges in Cryptography},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {2},
  pages        = {70--73},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3049730},
  doi          = {10.1109/MSEC.2021.3049730},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MenezesS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MenezesS21a,
  author       = {Alfred Menezes and
                  Douglas Stebila},
  title        = {End-to-End Security: When Do We Have It?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {4},
  pages        = {60--64},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3077403},
  doi          = {10.1109/MSEC.2021.3077403},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MenezesS21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MenezesS21b,
  author       = {Alfred Menezes and
                  Douglas Stebila},
  title        = {The Advanced Encryption Standard: 20 Years Later},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {6},
  pages        = {98--102},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3107078},
  doi          = {10.1109/MSEC.2021.3107078},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MenezesS21b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/LafranceM19,
  author       = {Philip Lafrance and
                  Alfred Menezes},
  title        = {On the security of the {WOTS-PRF} signature scheme},
  journal      = {Adv. Math. Commun.},
  volume       = {13},
  number       = {1},
  pages        = {185--193},
  year         = {2019},
  url          = {https://doi.org/10.3934/amc.2019012},
  doi          = {10.3934/AMC.2019012},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/LafranceM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/KoblitzM19,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {Critical perspectives on provable security: Fifteen years of "another
                  look" papers},
  journal      = {Adv. Math. Commun.},
  volume       = {13},
  number       = {4},
  pages        = {517--558},
  year         = {2019},
  url          = {https://doi.org/10.3934/amc.2019034},
  doi          = {10.3934/AMC.2019034},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/KoblitzM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/AdjAM19,
  author       = {Gora Adj and
                  Omran Ahmadi and
                  Alfred Menezes},
  title        = {On isogeny graphs of supersingular elliptic curves over finite fields},
  journal      = {Finite Fields Their Appl.},
  volume       = {55},
  pages        = {268--283},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ffa.2018.10.002},
  doi          = {10.1016/J.FFA.2018.10.002},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/AdjAM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoblitzM19,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {Critical Perspectives on Provable Security: Fifteen Years of "Another
                  Look" Papers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1336},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1336},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoblitzM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/AdjCCMORR18,
  author       = {Gora Adj and
                  Isaac Canales{-}Mart{\'{\i}}nez and
                  Nareli Cruz Cort{\'{e}}s and
                  Alfred Menezes and
                  Thomaz Oliveira and
                  Luis Rivera{-}Zamarripa and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {Computing discrete logarithms in cryptographically-interesting characteristic-three
                  finite fields},
  journal      = {Adv. Math. Commun.},
  volume       = {12},
  number       = {4},
  pages        = {741--759},
  year         = {2018},
  url          = {https://doi.org/10.3934/amc.2018044},
  doi          = {10.3934/AMC.2018044},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/AdjCCMORR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/AdjCCMR18,
  author       = {Gora Adj and
                  Daniel Cervantes{-}V{\'{a}}zquez and
                  Jes{\'{u}}s{-}Javier Chi{-}Dom{\'{\i}}nguez and
                  Alfred Menezes and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  editor       = {Carlos Cid and
                  Michael J. Jacobson Jr.},
  title        = {On the Cost of Computing Isogenies Between Supersingular Elliptic
                  Curves},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2018 - 25th International Conference,
                  Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11349},
  pages        = {322--343},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-10970-7\_15},
  doi          = {10.1007/978-3-030-10970-7\_15},
  timestamp    = {Wed, 25 Sep 2019 18:08:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/AdjCCMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AdjAM18,
  author       = {Gora Adj and
                  Omran Ahmadi and
                  Alfred Menezes},
  title        = {On Isogeny Graphs of Supersingular Elliptic Curves over Finite Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {132},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/132},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AdjAM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AdjCCMR18,
  author       = {Gora Adj and
                  Daniel Cervantes{-}V{\'{a}}zquez and
                  Jes{\'{u}}s{-}Javier Chi{-}Dom{\'{\i}}nguez and
                  Alfred Menezes and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {On the cost of computing isogenies between supersingular elliptic
                  curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {313},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/313},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AdjCCMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/ChatterjeeMR17,
  author       = {Sanjit Chatterjee and
                  Alfred Menezes and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {On Instantiating Pairing-Based Protocols with Elliptic Curves of Embedding
                  Degree One},
  journal      = {{IEEE} Trans. Computers},
  volume       = {66},
  number       = {6},
  pages        = {1061--1070},
  year         = {2017},
  url          = {https://doi.org/10.1109/TC.2016.2633340},
  doi          = {10.1109/TC.2016.2633340},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/ChatterjeeMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LafranceM17,
  author       = {Philip Lafrance and
                  Alfred Menezes},
  title        = {On the security of the {WOTS-PRF} signature scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {938},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/938},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LafranceM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KoblitzM16,
  author       = {Neal Koblitz and
                  Alfred J. Menezes},
  title        = {Cryptocash, cryptocurrencies, and cryptocontracts},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {1},
  pages        = {87--102},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0148-5},
  doi          = {10.1007/S10623-015-0148-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KoblitzM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/KoblitzM16,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {A Riddle Wrapped in an Enigma},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {14},
  number       = {6},
  pages        = {34--42},
  year         = {2016},
  url          = {https://doi.org/10.1109/MSP.2016.120},
  doi          = {10.1109/MSP.2016.120},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/KoblitzM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/ChatterjeeKMS16,
  author       = {Sanjit Chatterjee and
                  Neal Koblitz and
                  Alfred Menezes and
                  Palash Sarkar},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Another Look at Tightness {II:} Practical Issues in Cryptography},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {21--55},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_3},
  doi          = {10.1007/978-3-319-61273-7\_3},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/ChatterjeeKMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/MenezesS016,
  author       = {Alfred Menezes and
                  Palash Sarkar and
                  Shashank Singh},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Challenges with Assessing the Impact of {NFS} Advances on the Security
                  of Pairing-Based Cryptography},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {83--108},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_5},
  doi          = {10.1007/978-3-319-61273-7\_5},
  timestamp    = {Tue, 04 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/MenezesS016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeKMS16,
  author       = {Sanjit Chatterjee and
                  Neal Koblitz and
                  Alfred Menezes and
                  Palash Sarkar},
  title        = {Another Look at Tightness {II:} Practical Issues in Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {360},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/360},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeKMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeMR16,
  author       = {Sanjit Chatterjee and
                  Alfred Menezes and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {On Implementing Pairing-Based Protocols with Elliptic Curves of Embedding
                  Degree One},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {403},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/403},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AdjCCMORR16,
  author       = {Gora Adj and
                  Isaac Canales{-}Mart{\'{\i}}nez and
                  Nareli Cruz Cort{\'{e}}s and
                  Alfred Menezes and
                  Thomaz Oliveira and
                  Luis Rivera{-}Zamarripa and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {Computing discrete logarithms in cryptographically-interesting characteristic-three
                  finite fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {914},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/914},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AdjCCMORR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MenezesSS16,
  author       = {Alfred Menezes and
                  Palash Sarkar and
                  Shashank Singh},
  title        = {Challenges with Assessing the Impact of {NFS} Advances on the Security
                  of Pairing-based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1102},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1102},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MenezesSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cca/AdjMOR15,
  author       = {Gora Adj and
                  Alfred Menezes and
                  Thomaz Oliveira and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {Computing discrete logarithms using Joux's algorithm},
  journal      = {{ACM} Commun. Comput. Algebra},
  volume       = {49},
  number       = {2},
  pages        = {60},
  year         = {2015},
  url          = {https://doi.org/10.1145/2815111.2815154},
  doi          = {10.1145/2815111.2815154},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cca/AdjMOR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BlakeMS15,
  author       = {Ian F. Blake and
                  Alfred Menezes and
                  Douglas R. Stinson},
  title        = {Guest Editorial: Special Issue in Honor of Scott A. Vanstone},
  journal      = {Des. Codes Cryptogr.},
  volume       = {77},
  number       = {2-3},
  pages        = {287--299},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10623-015-0106-2},
  doi          = {10.1007/S10623-015-0106-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BlakeMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KoblitzM15,
  author       = {Neal Koblitz and
                  Alfred J. Menezes},
  title        = {The random oracle model: a twenty-year retrospective},
  journal      = {Des. Codes Cryptogr.},
  volume       = {77},
  number       = {2-3},
  pages        = {587--610},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10623-015-0094-2},
  doi          = {10.1007/S10623-015-0094-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KoblitzM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/AdjMOR15,
  author       = {Gora Adj and
                  Alfred Menezes and
                  Thomaz Oliveira and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {Weakness of {\(\mathbb{F}\)}\({}_{\mbox{6\({}^{\mbox{6{\(\cdot\)}1429}}\)}}\)
                  and {\(\mathbb{F}\)}\({}_{\mbox{2\({}^{\mbox{4{\(\cdot\)}3041}}\)}}\)
                  for discrete logarithm cryptography},
  journal      = {Finite Fields Their Appl.},
  volume       = {32},
  pages        = {148--170},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ffa.2014.10.009},
  doi          = {10.1016/J.FFA.2014.10.009},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/AdjMOR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/ChatterjeeKM15,
  author       = {Sanjit Chatterjee and
                  Koray Karabina and
                  Alfred Menezes},
  title        = {Fault Attacks on Pairing-Based Protocols Revisited},
  journal      = {{IEEE} Trans. Computers},
  volume       = {64},
  number       = {6},
  pages        = {1707--1714},
  year         = {2015},
  url          = {https://doi.org/10.1109/TC.2014.2339824},
  doi          = {10.1109/TC.2014.2339824},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/ChatterjeeKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChatterjeeM15,
  author       = {Sanjit Chatterjee and
                  Alfred Menezes},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {Type 2 Structure-Preserving Signature Schemes Revisited},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9452},
  pages        = {286--310},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48797-6\_13},
  doi          = {10.1007/978-3-662-48797-6\_13},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChatterjeeM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/latincrypt/2014,
  editor       = {Diego F. Aranha and
                  Alfred Menezes},
  title        = {Progress in Cryptology - {LATINCRYPT} 2014 - Third International Conference
                  on Cryptology and Information Security in Latin America, Florian{\'{o}}polis,
                  Brazil, September 17-19, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8895},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-16295-9},
  doi          = {10.1007/978-3-319-16295-9},
  isbn         = {978-3-319-16294-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoblitzM15,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {The Random Oracle Model: {A} Twenty-Year Retrospective},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {140},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/140},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoblitzM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoblitzM15a,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {A Riddle Wrapped in an Enigma},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1018},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1018},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoblitzM15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waifi/AdjMOR14,
  author       = {Gora Adj and
                  Alfred Menezes and
                  Thomaz Oliveira and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Sihem Mesnager and
                  Erkay Savas},
  title        = {Computing Discrete Logarithms in {\(\mathbb{F}\)}\({}_{\mbox{3\({}^{\mbox{6...137}}\)}}\)
                  and {\(\mathbb{F}\)}\({}_{\mbox{3\({}^{\mbox{6...163}}\)}}\) Using
                  Magma},
  booktitle    = {Arithmetic of Finite Fields - 5th International Workshop, {WAIFI}
                  2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9061},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16277-5\_1},
  doi          = {10.1007/978-3-319-16277-5\_1},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/waifi/AdjMOR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/14/KoblitzM14,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Another Look at Security Theorems for 1-Key Nested MACs},
  booktitle    = {Open Problems in Mathematics and Computational Science},
  pages        = {69--89},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10683-0\_4},
  doi          = {10.1007/978-3-319-10683-0\_4},
  timestamp    = {Tue, 16 May 2017 14:01:44 +0200},
  biburl       = {https://dblp.org/rec/books/sp/14/KoblitzM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AdjMOR14,
  author       = {Gora Adj and
                  Alfred Menezes and
                  Thomaz Oliveira and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {Computing Discrete Logarithms in F\({}_{\mbox{3\({}^{\mbox{6*137}}\)}}\)
                  using Magma},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {57},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/057},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AdjMOR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeKM14,
  author       = {Sanjit Chatterjee and
                  Koray Karabina and
                  Alfred Menezes},
  title        = {Fault attacks on pairing-based protocols revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {492},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/492},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeKM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeM14a,
  author       = {Sanjit Chatterjee and
                  Alfred Menezes},
  title        = {Type 2 Structure-Preserving Signature Schemes Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {635},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/635},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeM14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/KoblitzM13,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {Another look at security definitions},
  journal      = {Adv. Math. Commun.},
  volume       = {7},
  number       = {1},
  pages        = {1--38},
  year         = {2013},
  url          = {https://doi.org/10.3934/amc.2013.7.1},
  doi          = {10.3934/AMC.2013.7.1},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/KoblitzM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/KarabinaKM13,
  author       = {Koray Karabina and
                  Edward Knapp and
                  Alfred Menezes},
  title        = {Generalizations of Verheul's theorem to asymmetric pairings},
  journal      = {Adv. Math. Commun.},
  volume       = {7},
  number       = {1},
  pages        = {103--111},
  year         = {2013},
  url          = {https://doi.org/10.3934/amc.2013.7.103},
  doi          = {10.3934/AMC.2013.7.103},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/KarabinaKM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/KoblitzM13,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {Another look at non-uniformity},
  journal      = {Groups Complex. Cryptol.},
  volume       = {5},
  number       = {2},
  pages        = {117--139},
  year         = {2013},
  url          = {https://doi.org/10.1515/gcc-2013-0008},
  doi          = {10.1515/GCC-2013-0008},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/gcc/KoblitzM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/KoblitzM13,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {Another look at {HMAC}},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {3},
  pages        = {225--251},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2013-5004},
  doi          = {10.1515/JMC-2013-5004},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/KoblitzM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/AdjMOR13,
  author       = {Gora Adj and
                  Alfred Menezes and
                  Thomaz Oliveira and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  editor       = {Zhenfu Cao and
                  Fangguo Zhang},
  title        = {Weakness of {\(\mathbb{F}\)}\({}_{\mbox{3\({}^{\mbox{6{\(\cdot\)}509}}\)}}\)
                  for Discrete Logarithm Cryptography},
  booktitle    = {Pairing-Based Cryptography - Pairing 2013 - 6th International Conference,
                  Beijing, China, November 22-24, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8365},
  pages        = {20--44},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04873-4\_2},
  doi          = {10.1007/978-3-319-04873-4\_2},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/AdjMOR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/crc/13/Menezes13,
  author       = {Alfred Menezes},
  editor       = {Gary L. Mullen and
                  Daniel Panario},
  title        = {Introduction to cryptography},
  booktitle    = {Handbook of Finite Fields},
  series       = {Discrete mathematics and its applications},
  pages        = {741--749},
  publisher    = {{CRC} Press},
  year         = {2013},
  timestamp    = {Mon, 08 Jun 2020 15:38:06 +0200},
  biburl       = {https://dblp.org/rec/books/crc/13/Menezes13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoblitzM13,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {Another Look at Security Theorems for 1-Key Nested MACs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {248},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/248},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoblitzM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AdjMOR13,
  author       = {Gora Adj and
                  Alfred Menezes and
                  Thomaz Oliveira and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {Weakness of {\(\mathbb{F}\)}\({}_{\mbox{3\({}^{\mbox{6{\(\cdot\)}509}}\)}}\)
                  for Discrete Logarithm Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {446},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/446},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AdjMOR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AdjMOR13a,
  author       = {Gora Adj and
                  Alfred Menezes and
                  Thomaz Oliveira and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {Weakness of F\({}_{\mbox{3\({}^{\mbox{6*1429}}\)}}\) and F\({}_{\mbox{2\({}^{\mbox{4*3041}}\)}}\)
                  for Discrete Logarithm Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {737},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/737},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AdjMOR13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Menezes12,
  author       = {Alfred Menezes},
  editor       = {David Pointcheval and
                  Thomas Johansson},
  title        = {Another Look at Provable Security},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cambridge, UK, April 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7237},
  pages        = {8},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29011-4\_2},
  doi          = {10.1007/978-3-642-29011-4\_2},
  timestamp    = {Sun, 12 Nov 2023 02:15:08 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Menezes12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/AranhaFKMR12,
  author       = {Diego F. Aranha and
                  Laura Fuentes{-}Casta{\~{n}}eda and
                  Edward Knapp and
                  Alfred Menezes and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  editor       = {Michel Abdalla and
                  Tanja Lange},
  title        = {Implementing Pairings at the 192-Bit Security Level},
  booktitle    = {Pairing-Based Cryptography - Pairing 2012 - 5th International Conference,
                  Cologne, Germany, May 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7708},
  pages        = {177--195},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36334-4\_11},
  doi          = {10.1007/978-3-642-36334-4\_11},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/AranhaFKMR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoblitzM12,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {Another look at {HMAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {74},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/074},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoblitzM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AranhaFKMR12,
  author       = {Diego F. Aranha and
                  Laura Fuentes{-}Casta{\~{n}}eda and
                  Edward Knapp and
                  Alfred Menezes and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {Implementing Pairings at the 192-bit Security Level},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {232},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/232},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AranhaFKMR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoblitzM12a,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {Another look at non-uniformity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {359},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/359},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoblitzM12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/ChatterjeeM11,
  author       = {Sanjit Chatterjee and
                  Alfred Menezes},
  title        = {On cryptographic protocols employing asymmetric pairings - The role
                  of {\(\Psi\)} revisited},
  journal      = {Discret. Appl. Math.},
  volume       = {159},
  number       = {13},
  pages        = {1311--1322},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.dam.2011.04.021},
  doi          = {10.1016/J.DAM.2011.04.021},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/ChatterjeeM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChatterjeeMU11,
  author       = {Sanjit Chatterjee and
                  Alfred Menezes and
                  Berkant Ustaoglu},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {A Generic Variant of NIST's {KAS2} Key Agreement Protocol},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {353--370},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_23},
  doi          = {10.1007/978-3-642-22497-3\_23},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ChatterjeeMU11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/AranhaKMR11,
  author       = {Diego F. Aranha and
                  Edward Knapp and
                  Alfred Menezes and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  editor       = {Liqun Chen},
  title        = {Parallelizing the Weil and Tate Pairings},
  booktitle    = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC}
                  2011, Oxford, UK, December 12-15, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7089},
  pages        = {275--295},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25516-8\_17},
  doi          = {10.1007/978-3-642-25516-8\_17},
  timestamp    = {Wed, 18 Mar 2020 16:00:56 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/AranhaKMR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/ChatterjeeMS11,
  author       = {Sanjit Chatterjee and
                  Alfred Menezes and
                  Palash Sarkar},
  editor       = {Ali Miri and
                  Serge Vaudenay},
  title        = {Another Look at Tightness},
  booktitle    = {Selected Areas in Cryptography - 18th International Workshop, {SAC}
                  2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7118},
  pages        = {293--319},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-28496-0\_18},
  doi          = {10.1007/978-3-642-28496-0\_18},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/ChatterjeeMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/HankersonM11,
  author       = {Darrel Hankerson and
                  Alfred Menezes},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {{ECC} Challenges},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {379--380},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_242},
  doi          = {10.1007/978-1-4419-5906-5\_242},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/HankersonM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/HankersonM11a,
  author       = {Darrel Hankerson and
                  Alfred Menezes},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Elliptic Curve Cryptography},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {397},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_245},
  doi          = {10.1007/978-1-4419-5906-5\_245},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/HankersonM11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/HankersonM11b,
  author       = {Darrel Hankerson and
                  Alfred Menezes},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Elliptic Curve Discrete Logarithm Problem},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {397--400},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_246},
  doi          = {10.1007/978-1-4419-5906-5\_246},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/HankersonM11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/HankersonM11c,
  author       = {Darrel Hankerson and
                  Alfred Menezes},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Elliptic Curve Key Agreement Schemes},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {400--401},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_247},
  doi          = {10.1007/978-1-4419-5906-5\_247},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/HankersonM11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/HankersonM11d,
  author       = {Darrel Hankerson and
                  Alfred Menezes},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Elliptic Curve Keys},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {401},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_248},
  doi          = {10.1007/978-1-4419-5906-5\_248},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/HankersonM11d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/HankersonM11e,
  author       = {Darrel Hankerson and
                  Alfred Menezes},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Elliptic Curve Point Multiplication Using Halving},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {403--406},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_249},
  doi          = {10.1007/978-1-4419-5906-5\_249},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/HankersonM11e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/HankersonM11f,
  author       = {Darrel Hankerson and
                  Alfred Menezes},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Elliptic Curve Public-Key Encryption Schemes},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {406--407},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_250},
  doi          = {10.1007/978-1-4419-5906-5\_250},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/HankersonM11f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/HankersonM11g,
  author       = {Darrel Hankerson and
                  Alfred Menezes},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Elliptic Curve Signature Schemes},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {407--408},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_251},
  doi          = {10.1007/978-1-4419-5906-5\_251},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/HankersonM11g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/HankersonM11h,
  author       = {Darrel Hankerson and
                  Alfred Menezes},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Elliptic Curves},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {408--410},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_244},
  doi          = {10.1007/978-1-4419-5906-5\_244},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/HankersonM11h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/HankersonM11i,
  author       = {Darrel Hankerson and
                  Alfred Menezes},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Koblitz Elliptic Curves},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {705--706},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_872},
  doi          = {10.1007/978-1-4419-5906-5\_872},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/HankersonM11i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/HankersonM11j,
  author       = {Darrel Hankerson and
                  Alfred Menezes},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {{NIST} Elliptic Curves},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {843--844},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_255},
  doi          = {10.1007/978-1-4419-5906-5\_255},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/HankersonM11j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/HankersonM11k,
  author       = {Darrel Hankerson and
                  Alfred Menezes},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {{NSA} Suite {B}},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {857},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_648},
  doi          = {10.1007/978-1-4419-5906-5\_648},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/HankersonM11k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/HankersonM11l,
  author       = {Darrel Hankerson and
                  Alfred Menezes},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Pairings},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {907--909},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_254},
  doi          = {10.1007/978-1-4419-5906-5\_254},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/HankersonM11l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoblitzM11,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {Another Look at Security Definitions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {343},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/343},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoblitzM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeMS11,
  author       = {Sanjit Chatterjee and
                  Alfred Menezes and
                  Palash Sarkar},
  title        = {Another Look at Tightness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {442},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/442},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChatterjeeHKM10,
  author       = {Sanjit Chatterjee and
                  Darrel Hankerson and
                  Edward Knapp and
                  Alfred Menezes},
  title        = {Comparing two pairing-based aggregate signature schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {55},
  number       = {2-3},
  pages        = {141--167},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-009-9334-7},
  doi          = {10.1007/S10623-009-9334-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChatterjeeHKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/MenezesU10,
  author       = {Alfred Menezes and
                  Berkant Ustaoglu},
  title        = {On reusing ephemeral keys in Diffie-Hellman key agreement protocols},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {2},
  pages        = {154--158},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJACT.2010.038308},
  doi          = {10.1504/IJACT.2010.038308},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/MenezesU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/KarabinaMPS10,
  author       = {Koray Karabina and
                  Alfred Menezes and
                  Carl Pomerance and
                  Igor E. Shparlinski},
  title        = {On the asymptotic effectiveness of Weil descent attacks},
  journal      = {J. Math. Cryptol.},
  volume       = {4},
  number       = {2},
  pages        = {175--191},
  year         = {2010},
  url          = {https://doi.org/10.1515/jmc.2010.007},
  doi          = {10.1515/JMC.2010.007},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/KarabinaMPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ChatterjeeMU10,
  author       = {Sanjit Chatterjee and
                  Alfred Menezes and
                  Berkant Ustaoglu},
  editor       = {Guang Gong and
                  Kishan Chand Gupta},
  title        = {Combined Security Analysis of the One- and Three-Pass Unified Model
                  Key Agreement Protocols},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference
                  on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6498},
  pages        = {49--68},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17401-8\_5},
  doi          = {10.1007/978-3-642-17401-8\_5},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/ChatterjeeMU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waifi/ChatterjeeHM10,
  author       = {Sanjit Chatterjee and
                  Darrel Hankerson and
                  Alfred Menezes},
  editor       = {M. Anwar Hasan and
                  Tor Helleseth},
  title        = {On the Efficiency and Security of Pairing-Based Protocols in the Type
                  1 and Type 4 Settings},
  booktitle    = {Arithmetic of Finite Fields, Third International Workshop, {WAIFI}
                  2010, Istanbul, Turkey, June 27-30, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6087},
  pages        = {114--134},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13797-6\_9},
  doi          = {10.1007/978-3-642-13797-6\_9},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/waifi/ChatterjeeHM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoblitzM10,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {Intractable Problems in Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {290},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/290},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoblitzM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeHM10,
  author       = {Sanjit Chatterjee and
                  Darrel Hankerson and
                  Alfred Menezes},
  title        = {On the Efficiency and Security of Pairing-Based Protocols in the Type
                  1 and Type 4 Settings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {388},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/388},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeHM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoblitzMS10,
  author       = {Neal Koblitz and
                  Alfred Menezes and
                  Igor E. Shparlinski},
  title        = {Discrete Logarithms, Diffie-Hellman, and Reductions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {577},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/577},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoblitzMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/MenezesU09,
  author       = {Alfred Menezes and
                  Berkant Ustaoglu},
  title        = {Comparing the pre- and post-specified peer models for key agreement},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {3},
  pages        = {236--250},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJACT.2009.023472},
  doi          = {10.1504/IJACT.2009.023472},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/MenezesU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/HankersonKM09,
  author       = {Darrel Hankerson and
                  Koray Karabina and
                  Alfred Menezes},
  title        = {Analyzing the Galbraith-Lin-Scott Point Multiplication Method for
                  Elliptic Curves over Binary Fields},
  journal      = {{IEEE} Trans. Computers},
  volume       = {58},
  number       = {10},
  pages        = {1411--1420},
  year         = {2009},
  url          = {https://doi.org/10.1109/TC.2009.61},
  doi          = {10.1109/TC.2009.61},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/HankersonKM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/ChatterjeeKM09,
  author       = {Sanjit Chatterjee and
                  Koray Karabina and
                  Alfred Menezes},
  editor       = {Matthew Geoffrey Parker},
  title        = {A New Protocol for the Nearby Friend Problem},
  booktitle    = {Cryptography and Coding, 12th {IMA} International Conference, Cryptography
                  and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5921},
  pages        = {236--251},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10868-6\_14},
  doi          = {10.1007/978-3-642-10868-6\_14},
  timestamp    = {Wed, 01 Sep 2021 10:36:08 +0200},
  biburl       = {https://dblp.org/rec/conf/ima/ChatterjeeKM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ChatterjeeMU09,
  author       = {Sanjit Chatterjee and
                  Alfred Menezes and
                  Berkant Ustaoglu},
  editor       = {Bimal K. Roy and
                  Nicolas Sendrier},
  title        = {Reusing Static Keys in Key Agreement Protocols},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference
                  on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5922},
  pages        = {39--56},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10628-6\_3},
  doi          = {10.1007/978-3-642-10628-6\_3},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/ChatterjeeMU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ciss/HankersonMS09,
  author       = {Darrel Hankerson and
                  Alfred Menezes and
                  Michael Scott},
  editor       = {Marc Joye and
                  Gregory Neven},
  title        = {Software Implementation of Pairings},
  booktitle    = {Identity-Based Cryptography},
  series       = {Cryptology and Information Security Series},
  volume       = {2},
  pages        = {188--206},
  publisher    = {{IOS} Press},
  year         = {2009},
  url          = {https://doi.org/10.3233/978-1-58603-947-9-188},
  doi          = {10.3233/978-1-58603-947-9-188},
  timestamp    = {Thu, 11 Apr 2019 14:31:06 +0200},
  biburl       = {https://dblp.org/rec/series/ciss/HankersonMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeHKM09,
  author       = {Sanjit Chatterjee and
                  Darrel Hankerson and
                  Edward Knapp and
                  Alfred Menezes},
  title        = {Comparing Two Pairing-Based Aggregate Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {60},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/060},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeHKM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeM09,
  author       = {Sanjit Chatterjee and
                  Alfred Menezes},
  title        = {On Cryptographic Protocols Employing Asymmetric Pairings - The Role
                  of Psi Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {480},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/480},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/KoblitzM08,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {Another look at non-standard discrete log and Diffie-Hellman problems},
  journal      = {J. Math. Cryptol.},
  volume       = {2},
  number       = {4},
  pages        = {311--326},
  year         = {2008},
  url          = {https://doi.org/10.1515/JMC.2008.014},
  doi          = {10.1515/JMC.2008.014},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/KoblitzM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MenezesU08,
  author       = {Alfred Menezes and
                  Berkant Ustaoglu},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Comparing the Pre- and Post-specified Peer Models for Key Agreement},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {53--68},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_5},
  doi          = {10.1007/978-3-540-70500-0\_5},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/MenezesU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MenezesU08,
  author       = {Alfred Menezes and
                  Berkant Ustaoglu},
  editor       = {Masayuki Abe and
                  Virgil D. Gligor},
  title        = {Security arguments for the {UM} key agreement protocol in the {NIST}
                  {SP} 800-56A standard},
  booktitle    = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
                  2008},
  pages        = {261--270},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1368310.1368348},
  doi          = {10.1145/1368310.1368348},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MenezesU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Menezes08,
  author       = {Alfred Menezes},
  editor       = {Kanta Matsuura and
                  Eiichiro Fujisaki},
  title        = {The Elliptic Curve Discrete Logarithm Problem: State of the Art},
  booktitle    = {Advances in Information and Computer Security, Third International
                  Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5312},
  pages        = {218},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89598-5\_14},
  doi          = {10.1007/978-3-540-89598-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Menezes08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HankersonKM08,
  author       = {Darrel Hankerson and
                  Koray Karabina and
                  Alfred Menezes},
  title        = {Analyzing the Galbraith-Lin-Scott Point Multiplication Method for
                  Elliptic Curves over Binary Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {334},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/334},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HankersonKM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoblitzKM08,
  author       = {Ann Hibner Koblitz and
                  Neal Koblitz and
                  Alfred Menezes},
  title        = {Elliptic Curve Cryptography: The Serpentine Course of a Paradigm Shift},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {390},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/390},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoblitzKM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/KoblitzM07,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {Another look at generic groups},
  journal      = {Adv. Math. Commun.},
  volume       = {1},
  number       = {1},
  pages        = {13--28},
  year         = {2007},
  url          = {https://doi.org/10.3934/amc.2007.1.13},
  doi          = {10.3934/AMC.2007.1.13},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/KoblitzM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/AhmadiHM07,
  author       = {Omran Ahmadi and
                  Darrel Hankerson and
                  Alfred Menezes},
  title        = {Formulas for cube roots in F\({}_{\mbox{3\({}^{\mbox{m}}\)}}\)},
  journal      = {Discret. Appl. Math.},
  volume       = {155},
  number       = {3},
  pages        = {260--270},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.dam.2006.06.004},
  doi          = {10.1016/J.DAM.2006.06.004},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/AhmadiHM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Menezes07,
  author       = {Alfred Menezes},
  title        = {Another look at {HMQV}},
  journal      = {J. Math. Cryptol.},
  volume       = {1},
  number       = {1},
  pages        = {47--64},
  year         = {2007},
  url          = {https://doi.org/10.1515/JMC.2007.004},
  doi          = {10.1515/JMC.2007.004},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Menezes07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KoblitzM07,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {Another Look at "Provable Security"},
  journal      = {J. Cryptol.},
  volume       = {20},
  number       = {1},
  pages        = {3--37},
  year         = {2007},
  url          = {https://doi.org/10.1007/s00145-005-0432-z},
  doi          = {10.1007/S00145-005-0432-Z},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KoblitzM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/Menezes07,
  author       = {Alfred Menezes},
  editor       = {Tsuyoshi Takagi and
                  Tatsuaki Okamoto and
                  Eiji Okamoto and
                  Takeshi Okamoto},
  title        = {Supersingular Elliptic Curves in Cryptography},
  booktitle    = {Pairing-Based Cryptography - Pairing 2007, First International Conference,
                  Tokyo, Japan, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4575},
  pages        = {293},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73489-5\_15},
  doi          = {10.1007/978-3-540-73489-5\_15},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/Menezes07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waifi/AhmadiHM07,
  author       = {Omran Ahmadi and
                  Darrel Hankerson and
                  Alfred Menezes},
  editor       = {Claude Carlet and
                  Berk Sunar},
  title        = {Software Implementation of Arithmetic in F\({}_{\mbox{3\({}^{\mbox{m}}\)}}\)},
  booktitle    = {Arithmetic of Finite Fields, First International Workshop, {WAIFI}
                  2007, Madrid, Spain, June 21-22, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4547},
  pages        = {85--102},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73074-3\_8},
  doi          = {10.1007/978-3-540-73074-3\_8},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/waifi/AhmadiHM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2007,
  editor       = {Alfred Menezes},
  title        = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4622},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74143-5},
  doi          = {10.1007/978-3-540-74143-5},
  isbn         = {978-3-540-74142-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoblitzM07,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {Another Look at Non-Standard Discrete Log and Diffie-Hellman Problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {442},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/442},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoblitzM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/MenezesT06,
  author       = {Alfred Menezes and
                  Edlyn Teske},
  title        = {Cryptographic implications of Hess' generalized {GHS} attack},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {16},
  number       = {6},
  pages        = {439--460},
  year         = {2006},
  url          = {https://doi.org/10.1007/s00200-005-0186-8},
  doi          = {10.1007/S00200-005-0186-8},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aaecc/MenezesT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/DahabHHLLM06,
  author       = {Ricardo Dahab and
                  Darrel Hankerson and
                  Fei Hu and
                  Men Long and
                  Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and
                  Alfred Menezes},
  title        = {Software Multiplication Using Gaussian Normal Bases},
  journal      = {{IEEE} Trans. Computers},
  volume       = {55},
  number       = {8},
  pages        = {974--984},
  year         = {2006},
  url          = {https://doi.org/10.1109/TC.2006.132},
  doi          = {10.1109/TC.2006.132},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/DahabHHLLM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/MenezesU06,
  author       = {Alfred Menezes and
                  Berkant Ustaoglu},
  editor       = {Rana Barua and
                  Tanja Lange},
  title        = {On the Importance of Public-Key Validation in the {MQV} and {HMQV}
                  Key Agreement Protocols},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference
                  on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4329},
  pages        = {133--147},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11941378\_11},
  doi          = {10.1007/11941378\_11},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/MenezesU06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/KoblitzM06,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  editor       = {Rana Barua and
                  Tanja Lange},
  title        = {Another Look at "Provable Security". {II}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference
                  on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4329},
  pages        = {148--175},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11941378\_12},
  doi          = {10.1007/11941378\_12},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/KoblitzM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoblitzM06,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {Another Look at "Provable Security". {II}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {229},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/229},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoblitzM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoblitzM06a,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {Another Look at Generic Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {230},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/230},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoblitzM06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AhmadiM05,
  author       = {Omran Ahmadi and
                  Alfred Menezes},
  title        = {On the Number of Trace-One Elements in Polynomial Bases for F\({}_{\mbox{2\({}^{\mbox{n}}\)}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {37},
  number       = {3},
  pages        = {493--507},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-004-4039-4},
  doi          = {10.1007/S10623-004-4039-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AhmadiM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/GalbraithM05,
  author       = {Steven D. Galbraith and
                  Alfred Menezes},
  title        = {Algebraic curves and cryptography},
  journal      = {Finite Fields Their Appl.},
  volume       = {11},
  number       = {3},
  pages        = {544--577},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.ffa.2005.05.001},
  doi          = {10.1016/J.FFA.2005.05.001},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/GalbraithM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/KoblitzM05,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  editor       = {Nigel P. Smart},
  title        = {Pairing-Based Cryptography at High Security Levels},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {13--36},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_2},
  doi          = {10.1007/11586821\_2},
  timestamp    = {Wed, 18 Mar 2020 16:00:57 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/KoblitzM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2005,
  editor       = {Alfred Menezes},
  title        = {Topics in Cryptology - {CT-RSA} 2005, The Cryptographers' Track at
                  the {RSA} Conference 2005, San Francisco, CA, USA, February 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3376},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b105222},
  doi          = {10.1007/B105222},
  isbn         = {3-540-24399-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/HankersonM05,
  author       = {Darrel Hankerson and
                  Alfred Menezes},
  editor       = {Henk C. A. van Tilborg},
  title        = {{ECC} Challenges},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_119},
  doi          = {10.1007/0-387-23483-7\_119},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/HankersonM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/HankersonM05a,
  author       = {Darrel Hankerson and
                  Alfred Menezes},
  editor       = {Henk C. A. van Tilborg},
  title        = {Elliptic Curve},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_130},
  doi          = {10.1007/0-387-23483-7\_130},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/HankersonM05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/HankersonM05b,
  author       = {Darrel Hankerson and
                  Alfred Menezes},
  editor       = {Henk C. A. van Tilborg},
  title        = {Elliptic Curve Cryptography},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_131},
  doi          = {10.1007/0-387-23483-7\_131},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/HankersonM05b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/HankersonM05c,
  author       = {Darrel Hankerson and
                  Alfred Menezes},
  editor       = {Henk C. A. van Tilborg},
  title        = {Elliptic Curve Discrete Logarithm Problem},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_132},
  doi          = {10.1007/0-387-23483-7\_132},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/HankersonM05c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/HankersonM05d,
  author       = {Darrel Hankerson and
                  Alfred Menezes},
  editor       = {Henk C. A. van Tilborg},
  title        = {Elliptic Curve Key Agreement Schemes},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_133},
  doi          = {10.1007/0-387-23483-7\_133},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/HankersonM05d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/HankersonM05e,
  author       = {Darrel Hankerson and
                  Alfred Menezes},
  editor       = {Henk C. A. van Tilborg},
  title        = {Elliptic Curve Keys},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_134},
  doi          = {10.1007/0-387-23483-7\_134},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/HankersonM05e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/HankersonM05f,
  author       = {Darrel Hankerson and
                  Alfred Menezes},
  editor       = {Henk C. A. van Tilborg},
  title        = {Elliptic Curve Point Multiplication Using Halving},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_136},
  doi          = {10.1007/0-387-23483-7\_136},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/HankersonM05f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/HankersonM05g,
  author       = {Darrel Hankerson and
                  Alfred Menezes},
  editor       = {Henk C. A. van Tilborg},
  title        = {Elliptic Curve Public-Key Encryption Schemes},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_137},
  doi          = {10.1007/0-387-23483-7\_137},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/HankersonM05g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/HankersonM05h,
  author       = {Darrel Hankerson and
                  Alfred Menezes},
  editor       = {Henk C. A. van Tilborg},
  title        = {Elliptic Curve Signature Schemes},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_138},
  doi          = {10.1007/0-387-23483-7\_138},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/HankersonM05h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoblitzM05,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {Pairing-Based Cryptography at High Security Levels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {76},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/076},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoblitzM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Menezes05,
  author       = {Alfred Menezes},
  title        = {Another look at {HMQV}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {205},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/205},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Menezes05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MenezesS04,
  author       = {Alfred Menezes and
                  Nigel P. Smart},
  title        = {Security of Signature Schemes in a Multi-User Setting},
  journal      = {Des. Codes Cryptogr.},
  volume       = {33},
  number       = {3},
  pages        = {261--274},
  year         = {2004},
  url          = {https://doi.org/10.1023/B:DESI.0000036250.18062.3f},
  doi          = {10.1023/B:DESI.0000036250.18062.3F},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MenezesS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/moc/KoblitzM04,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {Obstacles to the torsion-subgroup attack on the decision Diffie-Hellman
                  Problem},
  journal      = {Math. Comput.},
  volume       = {73},
  number       = {248},
  pages        = {2027--2041},
  year         = {2004},
  url          = {https://doi.org/10.1090/S0025-5718-04-01637-0},
  doi          = {10.1090/S0025-5718-04-01637-0},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/moc/KoblitzM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamrev/KoblitzM04,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {A Survey of Public-Key Cryptosystems},
  journal      = {{SIAM} Rev.},
  volume       = {46},
  number       = {4},
  pages        = {599--634},
  year         = {2004},
  url          = {https://doi.org/10.1137/S0036144503439190},
  doi          = {10.1137/S0036144503439190},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamrev/KoblitzM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/FongHLM04,
  author       = {Kenny Fong and
                  Darrel Hankerson and
                  Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and
                  Alfred Menezes},
  title        = {Field Inversion and Point Halving Revisited},
  journal      = {{IEEE} Trans. Computers},
  volume       = {53},
  number       = {8},
  pages        = {1047--1059},
  year         = {2004},
  url          = {https://doi.org/10.1109/TC.2004.43},
  doi          = {10.1109/TC.2004.43},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/FongHLM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/MenezesTW04,
  author       = {Alfred Menezes and
                  Edlyn Teske and
                  Annegret Weng},
  editor       = {Tatsuaki Okamoto},
  title        = {Weak Fields for {ECC}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at
                  the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2964},
  pages        = {366--386},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24660-2\_28},
  doi          = {10.1007/978-3-540-24660-2\_28},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/MenezesTW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoblitzM04,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {Another Look at "Provable Security"},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {152},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/152},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoblitzM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MenezesT04,
  author       = {Alfred Menezes and
                  Edlyn Teske},
  title        = {Cryptographic Implications of Hess' Generalized {GHS} Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {235},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/235},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MenezesT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LawMQSV03,
  author       = {Laurie Law and
                  Alfred Menezes and
                  Minghua Qu and
                  Jerome A. Solinas and
                  Scott A. Vanstone},
  title        = {An Efficient Protocol for Authenticated Key Agreement},
  journal      = {Des. Codes Cryptogr.},
  volume       = {28},
  number       = {2},
  pages        = {119--134},
  year         = {2003},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LawMQSV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AntipaBMSV03,
  author       = {Adrian Antipa and
                  Daniel R. L. Brown and
                  Alfred Menezes and
                  Ren{\'{e}} Struik and
                  Scott A. Vanstone},
  editor       = {Yvo Desmedt},
  title        = {Validation of Elliptic Curve Public Keys},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {211--223},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_16},
  doi          = {10.1007/3-540-36288-6\_16},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AntipaBMSV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MenezesTW03,
  author       = {Alfred Menezes and
                  Edlyn Teske and
                  Annegret Weng},
  title        = {Weak Fields for {ECC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {128},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/128},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MenezesTW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/EncinasMM02,
  author       = {Luis Hern{\'{a}}ndez Encinas and
                  Alfred Menezes and
                  Jaime Mu{\~{n}}oz Masqu{\'{e}}},
  title        = {Isomorphism Classes of Genus-2 Hyperelliptic Curves Over Finite Fields},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {13},
  number       = {1},
  pages        = {57--65},
  year         = {2002},
  url          = {https://doi.org/10.1007/s002000100092},
  doi          = {10.1007/S002000100092},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aaecc/EncinasMM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/lmsjcm/MaurerMT02,
  author       = {Markus Maurer and
                  Alfred Menezes and
                  Edlyn Teske},
  title        = {Analysis of the {GHS} Weil Descent Attack on the {ECDLP} over Characteristic
                  Two Finite Fields of Composite Degree},
  journal      = {{LMS} J. Comput. Math.},
  volume       = {5},
  pages        = {127--174},
  year         = {2002},
  url          = {https://doi.org/10.1112/s1461157000000723},
  doi          = {10.1112/S1461157000000723},
  timestamp    = {Fri, 05 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/lmsjcm/MaurerMT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2002,
  editor       = {Alfred Menezes and
                  Palash Sarkar},
  title        = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference
                  on Cryptology in India, Hyderabad, India, December 16-18, 2002},
  series       = {Lecture Notes in Computer Science},
  volume       = {2551},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36231-2},
  doi          = {10.1007/3-540-36231-2},
  isbn         = {3-540-00263-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/JohnsonMV01,
  author       = {Don Johnson and
                  Alfred Menezes and
                  Scott A. Vanstone},
  title        = {The Elliptic Curve Digital Signature Algorithm {(ECDSA)}},
  journal      = {Int. J. Inf. Sec.},
  volume       = {1},
  number       = {1},
  pages        = {36--63},
  year         = {2001},
  url          = {https://doi.org/10.1007/s102070100002},
  doi          = {10.1007/S102070100002},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/JohnsonMV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BrownHLM01,
  author       = {Michael Brown and
                  Darrel Hankerson and
                  Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and
                  Alfred Menezes},
  editor       = {David Naccache},
  title        = {Software Implementation of the {NIST} Elliptic Curves Over Prime Fields},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at
                  {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2020},
  pages        = {250--265},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45353-9\_19},
  doi          = {10.1007/3-540-45353-9\_19},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BrownHLM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/MenezesQ01,
  author       = {Alfred Menezes and
                  Minghua Qu},
  editor       = {David Naccache},
  title        = {Analysis of the Weil Descent Attack of Gaudry, Hess and Smart},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at
                  {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2020},
  pages        = {308--318},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45353-9\_23},
  doi          = {10.1007/3-540-45353-9\_23},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/MenezesQ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/MaurerMT01,
  author       = {Markus Maurer and
                  Alfred Menezes and
                  Edlyn Teske},
  editor       = {C. Pandu Rangan and
                  Cunsheng Ding},
  title        = {Analysis of the {GHS} Weil Descent Attack on the {ECDLP} over Characteristic
                  Two Finite Fields of Composite Degree},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference
                  on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2247},
  pages        = {195--213},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45311-3\_19},
  doi          = {10.1007/3-540-45311-3\_19},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/MaurerMT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Menezes01,
  author       = {Alfred Menezes},
  title        = {Wireless Security - Is It Real?},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2001, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2001},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/Menezes01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JacobsonMS01,
  author       = {Michael J. Jacobson Jr. and
                  Alfred Menezes and
                  Andreas Stein},
  title        = {Solving Elliptic Curve Discrete Logarithm Problems Using Weil Descent},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {41},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/041},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JacobsonMS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaurerMT01,
  author       = {Markus Maurer and
                  Alfred Menezes and
                  Edlyn Teske},
  title        = {Analysis of the {GHS} Weil Descent Attack on the {ECDLP} over Characteristic
                  Two Finite Fields of Composite Degree},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {84},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/084},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaurerMT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KoblitzMV00,
  author       = {Neal Koblitz and
                  Alfred Menezes and
                  Scott A. Vanstone},
  title        = {The State of Elliptic Curve Cryptography},
  journal      = {Des. Codes Cryptogr.},
  volume       = {19},
  number       = {2/3},
  pages        = {173--193},
  year         = {2000},
  url          = {https://doi.org/10.1023/A:1008354106356},
  doi          = {10.1023/A:1008354106356},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KoblitzMV00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HankersonHM00,
  author       = {Darrel Hankerson and
                  Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and
                  Alfred Menezes},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Software Implementation of Elliptic Curve Cryptography over Binary
                  Fields},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {1--24},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_1},
  doi          = {10.1007/3-540-44499-8\_1},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HankersonHM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BrownCHHKM00,
  author       = {Michael Brown and
                  Donny Cheung and
                  Darrel Hankerson and
                  Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and
                  Michael Kirkup and
                  Alfred Menezes},
  editor       = {Steven M. Bellovin and
                  Greg Rose},
  title        = {{PGP} in Constrained Wireless Devices},
  booktitle    = {9th {USENIX} Security Symposium, Denver, Colorado, USA, August 14-17,
                  2000},
  publisher    = {{USENIX} Association},
  year         = {2000},
  url          = {https://www.usenix.org/conference/9th-usenix-security-symposium/pgp-constrained-wireless-devices},
  timestamp    = {Mon, 01 Feb 2021 08:43:02 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BrownCHHKM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Blake-WilsonM99,
  author       = {Simon Blake{-}Wilson and
                  Alfred Menezes},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Unknown Key-Share Attacks on the Station-to-Station {(STS)} Protocol},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {154--170},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_12},
  doi          = {10.1007/3-540-49162-7\_12},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Blake-WilsonM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/MenezesO99,
  author       = {Alfred J. Menezes and
                  Paul C. van Oorschot},
  editor       = {Kenneth H. Rosen and
                  John G. Michaels and
                  Jonathan L. Gross and
                  Jerrold W. Grossman and
                  Douglas R. Shier},
  title        = {Coding Theory And Cryptology},
  booktitle    = {Handbook of Discrete and Combinatorial Mathematics},
  publisher    = {{CRC} Press},
  year         = {1999},
  url          = {https://doi.org/10.1201/9781439832905.ch14},
  doi          = {10.1201/9781439832905.CH14},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/reference/crc/MenezesO99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Blake-WilsonM98,
  author       = {Simon Blake{-}Wilson and
                  Alfred Menezes},
  editor       = {Stafford E. Tavares and
                  Henk Meijer},
  title        = {Authenticated Diffie-Hellman Key Agreement Protocols},
  booktitle    = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada,
                  August 17-18, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1556},
  pages        = {339--361},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-48892-8\_26},
  doi          = {10.1007/3-540-48892-8\_26},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/Blake-WilsonM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0088555,
  author       = {Alfred J. Menezes},
  title        = {Elliptic curve public key cryptosystems},
  series       = {The Kluwer international series in engineering and computer science},
  volume       = {234},
  publisher    = {Kluwer},
  year         = {1997},
  isbn         = {978-0-7923-9368-9},
  timestamp    = {Fri, 19 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0088555.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/arscom/MenezesW97,
  author       = {Alfred Menezes and
                  Yihong Wu},
  title        = {The Discrete Logarithm Problem in GL(n, q)},
  journal      = {Ars Comb.},
  volume       = {47},
  year         = {1997},
  timestamp    = {Fri, 11 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/arscom/MenezesW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Blake-WilsonJM97,
  author       = {Simon Blake{-}Wilson and
                  Don Johnson and
                  Alfred Menezes},
  editor       = {Michael Darnell},
  title        = {Key Agreement Protocols and Their Security Analysis},
  booktitle    = {Cryptography and Coding, 6th {IMA} International Conference, Cirencester,
                  UK, December 17-19, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1355},
  pages        = {30--45},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0024447},
  doi          = {10.1007/BFB0024447},
  timestamp    = {Wed, 18 Mar 2020 16:00:59 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Blake-WilsonJM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Blake-WilsonM97,
  author       = {Simon Blake{-}Wilson and
                  Alfred Menezes},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  T. Mark A. Lomas and
                  Michael Roe},
  title        = {Entity Authentication and Authenticated Key Transport Protocols Employing
                  Asymmetric Techniques},
  booktitle    = {Security Protocols, 5th International Workshop, Paris, France, April
                  7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1361},
  pages        = {137--158},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028166},
  doi          = {10.1007/BFB0028166},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Blake-WilsonM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/crc/MenezesOV96,
  author       = {Alfred Menezes and
                  Paul C. van Oorschot and
                  Scott A. Vanstone},
  title        = {Handbook of Applied Cryptography},
  publisher    = {{CRC} Press},
  year         = {1996},
  url          = {http://cacr.uwaterloo.ca/hac/},
  doi          = {10.1201/9781439821916},
  isbn         = {0-8493-8523-7},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/crc/MenezesOV96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/MenezesV93,
  author       = {Alfred Menezes and
                  Scott A. Vanstone},
  title        = {Elliptic Curve Cryptosystems and Their Implementations},
  journal      = {J. Cryptol.},
  volume       = {6},
  number       = {4},
  pages        = {209--224},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF00203817},
  doi          = {10.1007/BF00203817},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/MenezesV93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/MenezesOV93,
  author       = {Alfred Menezes and
                  Tatsuaki Okamoto and
                  Scott A. Vanstone},
  title        = {Reducing elliptic curve logarithms to logarithms in a finite field},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {39},
  number       = {5},
  pages        = {1639--1646},
  year         = {1993},
  url          = {https://doi.org/10.1109/18.259647},
  doi          = {10.1109/18.259647},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/MenezesOV93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/MenezesV92,
  author       = {Alfred Menezes and
                  Scott A. Vanstone},
  title        = {A Note on Cycloc Groups, Finite Fields, and the Discrete Logarithm
                  Problem},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {3},
  pages        = {67--74},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF01189025},
  doi          = {10.1007/BF01189025},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aaecc/MenezesV92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/MenezesOV92,
  author       = {Alfred Menezes and
                  Paul C. van Oorschot and
                  Scott A. Vanstone},
  title        = {Subgroup Refinement Algorithms for Root Finding in GF(q)},
  journal      = {{SIAM} J. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {228--239},
  year         = {1992},
  url          = {https://doi.org/10.1137/0221018},
  doi          = {10.1137/0221018},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/siamcomp/MenezesOV92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HarperMV92,
  author       = {Greg Harper and
                  Alfred Menezes and
                  Scott A. Vanstone},
  editor       = {Rainer A. Rueppel},
  title        = {Public-Key Cryptosystems with Very Small Key Length},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Balatonf{\"{u}}red,
                  Hungary, May 24-28, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {658},
  pages        = {163--173},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-47555-9\_14},
  doi          = {10.1007/3-540-47555-9\_14},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/HarperMV92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/MenezesVO91,
  author       = {Alfred Menezes and
                  Scott A. Vanstone and
                  Tatsuaki Okamoto},
  editor       = {Cris Koutsougeras and
                  Jeffrey Scott Vitter},
  title        = {Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field},
  booktitle    = {Proceedings of the 23rd Annual {ACM} Symposium on Theory of Computing,
                  May 5-8, 1991, New Orleans, Louisiana, {USA}},
  pages        = {80--89},
  publisher    = {{ACM}},
  year         = {1991},
  url          = {https://doi.org/10.1145/103418.103434},
  doi          = {10.1145/103418.103434},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/MenezesVO91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/1990,
  editor       = {Alfred Menezes and
                  Scott A. Vanstone},
  title        = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {537},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-38424-3},
  doi          = {10.1007/3-540-38424-3},
  isbn         = {3-540-54508-5},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/1990.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MenezesV90,
  author       = {Alfred Menezes and
                  Scott A. Vanstone},
  editor       = {Jennifer Seberry and
                  Josef Pieprzyk},
  title        = {The Implementation of Elliptic Curve Cryptosystems},
  booktitle    = {Advances in Cryptology - {AUSCRYPT} '90, International Conference
                  on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {453},
  pages        = {2--13},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/BFb0030345},
  doi          = {10.1007/BFB0030345},
  timestamp    = {Fri, 17 Jul 2020 16:12:46 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MenezesV90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issac/MenezesOV88,
  author       = {Alfred Menezes and
                  Paul C. van Oorschot and
                  Scott A. Vanstone},
  editor       = {Patrizia M. Gianni},
  title        = {Some Computational Aspects of Root Finding in GF(q\({}^{\mbox{m}}\))},
  booktitle    = {Symbolic and Algebraic Computation, International Symposium ISSAC'88,
                  Rome, Italy, July 4-8, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {358},
  pages        = {259--270},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/3-540-51084-2\_24},
  doi          = {10.1007/3-540-51084-2\_24},
  timestamp    = {Fri, 17 Jul 2020 16:12:46 +0200},
  biburl       = {https://dblp.org/rec/conf/issac/MenezesOV88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics