The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Alfred Menezes: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Alfred Menezes, Scott A. Vanstone
    The Implementation of Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:2-13 [Conf]
  2. Darrel Hankerson, Julio López Hernandez, Alfred Menezes
    Software Implementation of Elliptic Curve Cryptography over Binary Fields. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:1-24 [Conf]
  3. Michael Brown, Darrel Hankerson, Julio López, Alfred Menezes
    Software Implementation of the NIST Elliptic Curves Over Prime Fields. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2001, pp:250-265 [Conf]
  4. Alfred Menezes, Minghua Qu
    Analysis of the Weil Descent Attack of Gaudry, Hess and Smart. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2001, pp:308-318 [Conf]
  5. Alfred Menezes, Edlyn Teske, Annegret Weng
    Weak Fields for ECC. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:366-386 [Conf]
  6. Greg Harper, Alfred Menezes, Scott A. Vanstone
    Public-Key Cryptosystems with Very Small Key Length. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:163-173 [Conf]
  7. Simon Blake-Wilson, Don Johnson, Alfred Menezes
    Key Agreement Protocols and Their Security Analysis. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1997, pp:30-45 [Conf]
  8. Neal Koblitz, Alfred Menezes
    Pairing-Based Cryptography at High Security Levels. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:13-36 [Conf]
  9. Neal Koblitz, Alfred Menezes
    Another Look at "Provable Security". II. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:148-175 [Conf]
  10. Markus Maurer, Alfred Menezes, Edlyn Teske
    Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:195-213 [Conf]
  11. Alfred Menezes, Berkant Ustaoglu
    On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:133-147 [Conf]
  12. Alfred Menezes, Paul C. van Oorschot, Scott A. Vanstone
    Some Computational Aspects of Root Finding in GF(qm). [Citation Graph (0, 0)][DBLP]
    ISSAC, 1988, pp:259-270 [Conf]
  13. Alfred Menezes
    Wireless Security - Is It Real? [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  14. Adrian Antipa, Daniel R. L. Brown, Alfred Menezes, René Struik, Scott A. Vanstone
    Validation of Elliptic Curve Public Keys. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:211-223 [Conf]
  15. Simon Blake-Wilson, Alfred Menezes
    Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:154-170 [Conf]
  16. Simon Blake-Wilson, Alfred Menezes
    Authenticated Diffie-Hellman Key Agreement Protocols. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:339-361 [Conf]
  17. Simon Blake-Wilson, Alfred Menezes
    Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:137-158 [Conf]
  18. Alfred Menezes, Scott A. Vanstone, Tatsuaki Okamoto
    Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field [Citation Graph (0, 0)][DBLP]
    STOC, 1991, pp:80-89 [Conf]
  19. Luis Hernández Encinas, Alfred Menezes, Jaime Muñoz Masqué
    Isomorphism Classes of Genus-2 Hyperelliptic Curves Over Finite Fields. [Citation Graph (0, 0)][DBLP]
    Appl. Algebra Eng. Commun. Comput., 2002, v:13, n:1, pp:57-65 [Journal]
  20. Alfred Menezes, Edlyn Teske
    Cryptographic implications of Hess' generalized GHS attack. [Citation Graph (0, 0)][DBLP]
    Appl. Algebra Eng. Commun. Comput., 2006, v:16, n:6, pp:439-460 [Journal]
  21. Alfred Menezes, Scott A. Vanstone
    A Note on Cycloc Groups, Finite Fields, and the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP]
    Appl. Algebra Eng. Commun. Comput., 1992, v:3, n:, pp:67-74 [Journal]
  22. Alfred Menezes, Yi-Hong Wu
    The Discrete Logarithm Problem in GL(n, q). [Citation Graph (0, 0)][DBLP]
    Ars Comb., 1997, v:47, n:, pp:- [Journal]
  23. Omran Ahmadi, Darrel Hankerson, Alfred Menezes
    Formulas for cube roots in F3m. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2007, v:155, n:3, pp:260-270 [Journal]
  24. Omran Ahmadi, Alfred Menezes
    On the Number of Trace-One Elements in Polynomial Bases for F2n. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:3, pp:493-507 [Journal]
  25. Neal Koblitz, Alfred Menezes, Scott A. Vanstone
    The State of Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2000, v:19, n:2/3, pp:173-193 [Journal]
  26. Alfred Menezes, Nigel P. Smart
    Security of Signature Schemes in a Multi-User Setting. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:33, n:3, pp:261-274 [Journal]
  27. Laurie Law, Alfred Menezes, Minghua Qu, Jerry Solinas, Scott A. Vanstone
    An Efficient Protocol for Authenticated Key Agreement. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2003, v:28, n:2, pp:119-134 [Journal]
  28. Don Johnson, Alfred Menezes, Scott A. Vanstone
    The Elliptic Curve Digital Signature Algorithm (ECDSA). [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2001, v:1, n:1, pp:36-63 [Journal]
  29. Alfred Menezes, Scott A. Vanstone
    Elliptic Curve Cryptosystems and Their Implementations. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1993, v:6, n:4, pp:209-224 [Journal]
  30. Neal Koblitz, Alfred Menezes
    Obstacles to the torsion-subgroup attack on the decision Diffie-Hellman Problem. [Citation Graph (0, 0)][DBLP]
    Math. Comput., 2004, v:73, n:248, pp:2027-2041 [Journal]
  31. Alfred Menezes, Paul C. van Oorschot, Scott A. Vanstone
    Subgroup Refinement Algorithms for Root Finding in GF(q). [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1992, v:21, n:2, pp:228-239 [Journal]
  32. Ricardo Dahab, Darrel Hankerson, Fei Hu, Men Long, Julio López, Alfred Menezes
    Software Multiplication Using Gaussian Normal Bases. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2006, v:55, n:8, pp:974-984 [Journal]
  33. Kenny Fong, Darrel Hankerson, Julio López, Alfred Menezes
    Field Inversion and Point Halving Revisited. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2004, v:53, n:8, pp:1047-1059 [Journal]
  34. Alfred Menezes, Tatsuaki Okamoto, Scott A. Vanstone
    Reducing elliptic curve logarithms to logarithms in a finite field. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1993, v:39, n:5, pp:1639-1646 [Journal]
  35. Alfred Menezes
    Supersingular Elliptic Curves in Cryptography. [Citation Graph (0, 0)][DBLP]
    Pairing, 2007, pp:293- [Conf]
  36. Omran Ahmadi, Darrel Hankerson, Alfred Menezes
    Software Implementation of Arithmetic in F3m. [Citation Graph (0, 0)][DBLP]
    WAIFI, 2007, pp:85-102 [Conf]
  37. Neal Koblitz, Alfred Menezes
    Another Look at "Provable Security". [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2007, v:20, n:1, pp:3-37 [Journal]

  38. Comparing the Pre- and Post-specified Peer Models for Key Agreement. [Citation Graph (, )][DBLP]


  39. Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard. [Citation Graph (, )][DBLP]


  40. A New Protocol for the Nearby Friend Problem. [Citation Graph (, )][DBLP]


  41. Reusing Static Keys in Key Agreement Protocols. [Citation Graph (, )][DBLP]


  42. The Elliptic Curve Discrete Logarithm Problem: State of the Art. [Citation Graph (, )][DBLP]


  43. On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002