The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Martijn Stam: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Robert Granger, Dan Page, Martijn Stam
    A Comparison of CEILIDH and XTR. [Citation Graph (0, 0)][DBLP]
    ANTS, 2004, pp:235-249 [Conf]
  2. Martijn Stam, Arjen K. Lenstra
    Speeding Up XTR. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:125-143 [Conf]
  3. Martijn Stam, Arjen K. Lenstra
    Efficient Subgroup Exponentiation in Quadratic and Sixth Degree Extensions. [Citation Graph (0, 0)][DBLP]
    CHES, 2002, pp:318-332 [Conf]
  4. Ronald Cramer, Serge Fehr, Martijn Stam
    Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:344-360 [Conf]
  5. Marten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David P. Woodruff
    Practical Cryptography in High Dimensional Tori. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:234-250 [Conf]
  6. C. Dods, Nigel P. Smart, Martijn Stam
    Hash Based Digital Signature Schemes. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:96-115 [Conf]
  7. Martijn Stam
    A Key Encapsulation Mechanism for NTRU. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:410-427 [Conf]
  8. Martijn Stam
    On Montgomery-Like Representationsfor Elliptic Curves over GF(2k). [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:240-253 [Conf]
  9. Dan Page, Martijn Stam
    On XTR and Side-Channel Analysis. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:54-68 [Conf]
  10. Dennis Hofheinz, John Malone-Lee, Martijn Stam
    Obfuscation for Cryptographic Purposes. [Citation Graph (0, 0)][DBLP]
    TCC, 2007, pp:214-232 [Conf]
  11. Arjen K. Lenstra, Daniel Page, Martijn Stam
    Discrete Logarithm Variants of VSH. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:229-242 [Conf]
  12. Sébastien Canard, Berry Schoenmakers, Martijn Stam, Jacques Traoré
    List signature schemes. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:2, pp:189-201 [Journal]
  13. Robert Granger, Dan Page, Martijn Stam
    Hardware and Software Normal Basis Arithmetic for Pairing-Based Cryptography in Characteristic Three. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2005, v:54, n:7, pp:852-860 [Journal]

  14. Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions. [Citation Graph (, )][DBLP]


  15. A New Randomness Extraction Paradigm for Hybrid Encryption. [Citation Graph (, )][DBLP]


  16. Attacking the Knudsen-Preneel Compression Functions. [Citation Graph (, )][DBLP]


  17. Blockcipher-Based Hashing Revisited. [Citation Graph (, )][DBLP]


  18. Building a Collision-Resistant Compression Function from Non-compressing Primitives. [Citation Graph (, )][DBLP]


  19. Another Glance at Double-Length Hashing. [Citation Graph (, )][DBLP]


  20. Confidential Signatures and Deterministic Signcryption. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002