|
Search the dblp DataBase
Martijn Stam:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Robert Granger, Dan Page, Martijn Stam
A Comparison of CEILIDH and XTR. [Citation Graph (0, 0)][DBLP] ANTS, 2004, pp:235-249 [Conf]
- Martijn Stam, Arjen K. Lenstra
Speeding Up XTR. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2001, pp:125-143 [Conf]
- Martijn Stam, Arjen K. Lenstra
Efficient Subgroup Exponentiation in Quadratic and Sixth Degree Extensions. [Citation Graph (0, 0)][DBLP] CHES, 2002, pp:318-332 [Conf]
- Ronald Cramer, Serge Fehr, Martijn Stam
Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields. [Citation Graph (0, 0)][DBLP] CRYPTO, 2005, pp:344-360 [Conf]
- Marten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David P. Woodruff
Practical Cryptography in High Dimensional Tori. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2005, pp:234-250 [Conf]
- C. Dods, Nigel P. Smart, Martijn Stam
Hash Based Digital Signature Schemes. [Citation Graph (0, 0)][DBLP] IMA Int. Conf., 2005, pp:96-115 [Conf]
- Martijn Stam
A Key Encapsulation Mechanism for NTRU. [Citation Graph (0, 0)][DBLP] IMA Int. Conf., 2005, pp:410-427 [Conf]
- Martijn Stam
On Montgomery-Like Representationsfor Elliptic Curves over GF(2k). [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2003, pp:240-253 [Conf]
- Dan Page, Martijn Stam
On XTR and Side-Channel Analysis. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2004, pp:54-68 [Conf]
- Dennis Hofheinz, John Malone-Lee, Martijn Stam
Obfuscation for Cryptographic Purposes. [Citation Graph (0, 0)][DBLP] TCC, 2007, pp:214-232 [Conf]
- Arjen K. Lenstra, Daniel Page, Martijn Stam
Discrete Logarithm Variants of VSH. [Citation Graph (0, 0)][DBLP] VIETCRYPT, 2006, pp:229-242 [Conf]
- Sébastien Canard, Berry Schoenmakers, Martijn Stam, Jacques Traoré
List signature schemes. [Citation Graph (0, 0)][DBLP] Discrete Applied Mathematics, 2006, v:154, n:2, pp:189-201 [Journal]
- Robert Granger, Dan Page, Martijn Stam
Hardware and Software Normal Basis Arithmetic for Pairing-Based Cryptography in Characteristic Three. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2005, v:54, n:7, pp:852-860 [Journal]
Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions. [Citation Graph (, )][DBLP]
A New Randomness Extraction Paradigm for Hybrid Encryption. [Citation Graph (, )][DBLP]
Attacking the Knudsen-Preneel Compression Functions. [Citation Graph (, )][DBLP]
Blockcipher-Based Hashing Revisited. [Citation Graph (, )][DBLP]
Building a Collision-Resistant Compression Function from Non-compressing Primitives. [Citation Graph (, )][DBLP]
Another Glance at Double-Length Hashing. [Citation Graph (, )][DBLP]
Confidential Signatures and Deterministic Signcryption. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|