Publications

Ìý

Publications

  1. Several sections on elliptic curve cryptography
    (with D. Hankerson)
    (third edition), edited by S. Jajodia, P. Samarati and M. Yung, Springer-Verlag, 2025.

  2. (with D. Stebila)
    IEEE Security & Privacy, 19-6 (2021), 98-102.


  3. (with D. Stebila)
    IEEE Security & Privacy, 19-4 (2021), 60-64.


  4. (with D. Stebila)
    IEEE Security & Privacy, 19-2 (2021), 70-73.


  5. (with N. Koblitz)
    Advances in Mathematics of Communications, 13 (2019), 517-558.
    .


  6. (with G. Adj, D. Cervantes-Vazquez, J. Chi-Dominguez and F. Rodriguez-Henriquez)
    SAC 2018, Lecture Notes in Computer Science, 11349 (2019), 322-343.
    .


  7. (with P. Lafrance)
    Advances in Mathematics of Communications, 13 (2019), 185-193.
    .


  8. (with G. Adj and O. Ahmadi)
    Finite Fields and Their Applications, 55 (2019), 267-283.
    .


  9. (with G. Adj, I. Canales-Martinez, N. Cruz-Cortes, T. Oliveira, L. Rivera-Zamarripa and F. Rodriguez-Henriquez)
    Advances in Mathematics of Communications, 12 (2018), 741-759.
    .

  10. Coding Theory
    (with P. van Oorschot, D. Joyner and T. Shaska)
    chapter in , second edition, CRC Press, 2018, pages 1023-1067.


  11. (with N. Koblitz)
    CMS Notes, Vol. 49, No. 5 (2017), 16-17.


  12. (with S. Chatterjee, N. Koblitz and P. Sarkar)
    Mycrypt 2016, Lecture Notes in Computer Science, 10311 (2017), 21-55.
    .


  13. (with P. Sarkar and S. Singh)
    Mycrypt 2016, Lecture Notes in Computer Science, 10311 (2017), 83-108.
    .


  14. (with S. Chatterjee and F. Rodriguez-Henriquez)
    IEEE Transactions on Computers, 66 (2017), 1061-1070.
    .


  15. (with N. Koblitz)
    IEEE Security & Privacy, 14 (2016), 34-42.
    .


  16. (with N. Koblitz)
    Designs, Codes and Cryptography, 78 (2016), 87-102.
    Preprint:ÌýÌý cryptocash.pdf


  17. (with S. Chatterjee)
    ASIACRYPT 2015, Lecture Notes in Computer Science, 9452 (2015), 286-310.
    .


  18. (with N. Koblitz)
    Designs, Codes and Cryptography, 77 (2015), 587-610.
    .


  19. (edited with I. Blake and D. Stinson)
    Designs, Codes and Cryptography, 77 (2-3), 2015.


  20. (with S. Chatterjee and K. Karabina)
    IEEE Transactions on Computers, 64 (2015), 1707-1714.


  21. (edited with D. Aranha)
    Lecture Notes in Computer Science, 8895, Springer-Verlag, 2015.


  22. (with G. Adj, T. Oliveira and F. Rodriguez-Henriquez)
    WAIFI 2014, Lecture Notes in Computer Science, 9061 (2015), 3-22.
    .


  23. (with G. Adj, T. Oliveira and F. Rodriguez-Henriquez)
    Finite Fields and Their Applications, 32 (2015), 148-170.
    .


  24. (with N. Koblitz)
    C.K. Koc (ed.), Open Problems in Mathematics and Computational Science, Springer 2014, 69-89.
    .


  25. (with G. Adj, T. Oliveira and F. Rodriguez-Henriquez)
    Pairing-Based Cryptography -- Pairing 2013, Lecture Notes in Computer Science, 8365 (2014), 20-44.
    .


  26. (with N. Koblitz)
    Groups Complexity Cryptology, 5 (2013), 117-139.
    .


  27. (with N. Koblitz)
    Journal of Mathematical Cryptology, 7 (2013), 225-251.
    .

  28. Introduction to Cryptography
    Section 16.1 of , edited by G. Mullen and D. Panario, Chapman & Hall/CRC, 2013


  29. (with D. Aranha, L. Fuentes-Castaneda, E. Knapp and F. Rodriguez-Henriquez)
    Pairing-Based Cryptography -- Pairing 2012, Lecture Notes in Computer Science, 7708 (2013), 177-195.
    .


  30. (with K. Karabina and E. Knapp)
    Advances in Mathematics of Communications, 7 (2013), 103-111.
    Preprint:ÌýÌýÌýverheul.pdf


  31. (with N. Koblitz)
    Advances in Mathematics of Communications, 7 (2013), 1-38.
    .


  32. (with S. Chatterjee and P. Sarkar)
    Proceedings of SAC 2011, Lecture Notes in Computer Science, 7118 (2012), 293-319.
    .


  33. (with D. Aranha, E. Knapp and F. Rodriguez-Henriquez)
    Cryptography and Coding 2011, Lecture Notes in Computer Science, 7089 (2011), 275-295.


  34. (with N. Koblitz and I. Shparlinski)
    Vietnam Journal of Mathematics, 39 (2011), 267-285.


  35. (with S. Chatterjee and B. Ustaoglu)
    Proceedings of ACISP 2011, Lecture Notes in Computer Science, 6812 (2011), 353-370.
    Full version:ÌýÌýÌýkas2.pdf


  36. (with A. Hibner Koblitz and N. Koblitz)
    Journal of Number Theory, 131 (2011), 781-814.
    .


  37. (with S. Chatterjee)
    Discrete Applied Mathematics, 159 (2011), 1311-1322.
    .

  38. Several sections on elliptic curve cryptography
    (with D. Hankerson)
    (second edition), edited by H. van Tilborg and S. Jajodia, Springer-Verlag, 2011.

  39. On reusing ephemeral public keys in Diffie-Hellman key agreement protocolsÌýÌýÌýephemeral.pdf
    (with B. Ustaoglu)
    International Journal of Applied Cryptography, 2 (2010), 154-158.


  40. (with S. Chatterjee and B. Ustaoglu)
    Indocrypt 2010, Lecture Notes in Computer Science, 6498 (2010), 49-68.


  41. (with S. Chatterjee and D. Hankerson)
    WAIFI 2010, Lecture Notes in Computer Science, 6087 (2010), 114-134.
    .

  42. On the asymptotic effectiveness of Weil descent attacksÌýÌýÌýweildescent.pdf
    (with K. Karabina, C. Pomerance and I. Shparlinski)
    Journal of Mathematical Cryptology, 4 (2010), 175-191.

  43. Intractable problems in cryptographyÌýÌýÌýdlog.pdf
    (with N. Koblitz)
    Revised version of a paper that appeared in Finite Fields: Theory and Applications, Contemporary Mathematics, 518 (2010), 279-300.
    See also
    Notices of the AMS, 57 (2010), 357-365.


  44. (with S. Chatterjee, D. Hankerson and E. Knapp)
    Designs, Codes and Cryptography, 55 (2010), 141-167.
    .


  45. (with S. Chatterjee and B. Ustaoglu)
    Indocrypt 2009, Lecture Notes in Computer Science, 5922 (2009), 39-56.
    Full version:ÌýÌýÌýstatic.pdf


  46. (with S. Chatterjee and K. Karabina)
    Cryptography and Coding 2009, Lecture Notes in Computer Science, 5921 (2009), 236-251.


  47. (with D. Hankerson and K. Karabina)
    IEEE Transactions on Computers, 58 (2009), 1411-1420.
    .

  48. An introduction to pairing-based cryptographyÌýÌýÌýpairings.pdf
    Recent Trends in Cryptography, edited by I. Luengo, volume 477 of Contemporary Mathematics, AMS-RSME, 2009, 47-65.

  49. Comparing the pre- and post-specified peer models for key agreementÌýÌýÌýprepost.pdf
    (with B. Ustaoglu)
    International Journal of Applied Cryptography, 1 (2009), 236-250.
    An appeared in Proceedings of ACISP 2008, Lecture Notes in Computer Science, 5107 (2008), 53-68.

  50. Software implementation of pairingsÌýÌýÌýpairings_software.pdf
    (with D. Hankerson and M. Scott)
    Identity-Based Cryptography, edited by M. Joye and G. Neven, IOS Press, 2008, 188-206.


  51. (with N. Koblitz)
    Journal of Mathematical Cryptology, 4 (2008), 311-326.
    .

  52. Security arguments for the UM key agreement protocol in the NIST SP 800-56A standardÌýÌýÌýum.pdf
    (with B. Ustaoglu)
    Proceedings of ASIACCS '08, ACM Press, 261-270.


  53. (with O. Ahmadi and D. Hankerson)
    Proceedings of WAIFI 2007, Lecture Notes in Computer Science, 4547 (2007), 85-102.

  54. (edited volume)
    Lecture Notes in Computer Science, 4622, Springer-Verlag, 2007.


  55. (with O. Ahmadi and D. Hankerson)
    Discrete Applied Mathematics, 155 (2007), 260-270.

  56. Irreducible polynomials of maximum weightÌýÌýÌýweightn.pdf
    (with O. Ahmadi)
    Utilitas Mathematica, 72 (2007), 111-123.


  57. Journal of Mathematical Cryptology, 1 (2007), 47-64.
    .


  58. (with N. Koblitz)
    Advances in Mathematics of Communications, 1 (2007), 13-28.
    .


  59. (with N. Koblitz)
    Journal of Cryptology, 20 (2007), 3-37.
    .


  60. (with N. Koblitz)
    Progress in Cryptology - Indocrypt 2006, Lecture Notes in Computer Science, 4329 (2006), 148-175.
    by Francisco Rodriguez-Henriquez.
    .


  61. (with B. Ustaoglu)
    Progress in Cryptology - Indocrypt 2006, Lecture Notes in Computer Science, 4329 (2006), 133-147.


  62. (with R. Dahab, D. Hankerson, F. Hu, M. Long and J. López)
    IEEE Transactions on Computers, 55 (2006), 974-984.


  63. (with E. Teske)
    Applicable Algebra in Engineering, Communication and Computing, 16 (2006), 439-460.
    .


  64. (with O. Ahmadi)
    Designs, Codes and Cryptography, 37 (2005), 493-507.


  65. (with N. Koblitz)
    Cryptography and Coding 2005, Lecture Notes in Computer Science, 3796 (2005), 13-36.
    .


  66. (with S. Galbraith)
    Finite Fields and Their Applications, 11 (2005), 544-577.

  67. Several sections on elliptic curve cryptography
    (with D. Hankerson)
    Encyclopedia of Cryptography and Security, edited by Henk van Tilborg, Springer-Verlag, 2005.

  68. (edited volume)
    Lecture Notes in Computer Science, 3376, Springer-Verlag, 2005.

  69. A survey of public-key cryptosystemsÌýÌýÌýpublickey.pdf
    (with N. Koblitz)
    SIAM Review, 46 (2004), 599-634.


  70. (with N. Smart)
    Designs, Codes and Cryptography, 33 (2004), 261-274.

  71. Hyperelliptic curves and cryptographyÌýÌýÌýhcc.pdf
    (with M. Jacobson and A. Stein)
    High Primes and Misdemeanours: Lectures in Honour of the 60th Birthday of Hugh Cowie Williams,
    Fields Institute Communications Series, 41 (2004), 255-282.


  72. (with N. Koblitz)
    Mathematics of Computation, 73 (2004), 2027-2041.


  73. (with K. Fong, D. Hankerson and J. López)
    IEEE Transactions on Computers, 53 (2004), 1047-1059.


  74. (with E. Teske and A. Weng)
    Topics in Cryptology - CT-RSA 2004, Lecture Notes in Computer Science, 2964 (2004), 366-386.
    .


  75. (with D. Hankerson and S. Vanstone)
    Springer, 2004.


  76. (with L. Law, M. Qu, J. Solinas and S. Vanstone)
    Designs, Codes and Cryptography, 28 (2003), 119-134.


  77. (with A. Antipa, D. Brown, R. Struik and S. Vanstone)
    Proceedings of PKC 2003, Lecture Notes in Computer Science, 2567 (2003), 211-223.

  78. A small subgroup attack on a key agreement protocol of AraziÌýÌýÌýarazi.pdf
    (with D. Brown)
    Bulletin of the ICA, 37 (2003), 45-50.


  79. (edited with P. Sarkar)
    Lecture Notes in Computer Science, 2551, Springer-Verlag, 2002.


  80. (with M. Maurer and E. Teske)
    LMS Journal of Computation and Mathematics, 5 (2002), 127-174
    An earlier version appeared in Proceedings of Indocrypt 2001, Lecture Notes in Computer Science, 2247 (2001), 195-213.
    .


  81. (with L. Encinas and J. Masque)
    Applicable Algebra in Engineering, Communication and Computing, 13 (2002), 57-65.


  82. (with M. Jacobson and A. Stein)
    Journal of the Ramanujan Mathematical Society, 16 (2001), 231-260.


  83. (with D. Johnson and S. Vanstone)
    International Journal on Information Security, 1 (2001), 36-63.


  84. (with M. Brown, D. Hankerson and J. Hernandez)
    Topics in Cryptology - CT-RSA 2001, Lecture Notes in Computer Science, 2020 (2001), 250-265.


  85. (with M. Qu)
    Topics in Cryptology - CT-RSA 2001, Lecture Notes in Computer Science, 2020 (2001), 308-318.


  86. (with D. Hankerson and J. Hernandez)
    Proceedings of CHES 2000, Lecture Notes in Computer Science, 1965 (2000), 1-24.

  87. PGP in constrained wireless devicesÌýÌýÌýpager.pdf
    (with M. Brown, D. Cheung, D. Hankerson, J. Hernandez and M. Kirkup)
    Proceedings of the 9th USENIX Security Symposium, 2000, 247-261.


  88. (with N. Koblitz and S. Vanstone)
    Designs, Codes and Cryptography, 19 (2000), 173-193.

  89. Coding Theory and Cryptology
    (with P. van Oorschot)
    chapter in , CRC Press, 1999, pages 889-954.


  90. (with S. Blake-Wilson)
    Proceedings of the 5th Annual Workshop on Selected Areas in Cryptography (SAC '98), Lecture Notes in Computer Science, 1556 (1999), 339-361.


  91. (with S. Blake-Wilson)
    Proceedings of PKC '99, Lecture Notes in Computer Science, 1560 (1999), 154-170.


  92. (with S. Blake-Wilson)
    Proceedings of the 5th International Workshop on Security Protocols, Lecture Notes in Computer Science, 1361 (1998), 137-158.

  93. The discrete logarithm problem in GL(n,q)ÌýÌýÌýglnq.pdf
    (with Yi-Hong Wu)
    Ars Combinatoria, 47 (1998), 23-32.

  94. An elementary introduction to hyperelliptic curvesÌýÌýÌýhyperelliptic.pdf
    (with Yi-Hong Wu and R. Zuccherato)
    appendix in by Neal Koblitz, Springer-Verlag, 1998, pages 155-178.


  95. (with D. Johnson and S. Blake-Wilson)
    Proceedings of the Sixth IMA International Conference on Cryptography and Coding, Lecture Notes in Computer Science, 1355 (1997), 30-45.
    Full versionÌýÌýÌýagreement.pdf


  96. (with P. van Oorschot and S. Vanstone)
    CRC Press, 1997.

  97. Elliptic curves and cryptography
    (with A. Jurisic)
    , April 1997, 23-36.

  98. Some new key agreement protocols providing mutual implicit authentication
    (with M. Qu and S. Vanstone)
    Workshop on Selected Areas in Cryptography (SAC '95), 22-32, 1995.

  99. Elliptic curve cryptosystems
    CryptoBytes - The Technical Newsletter of RSA Laboratories, Volume 1, Number 2, Summer 1995, 1-4.


  100. Kluwer Academic Publishers, 1993.


  101. (with T. Okamoto and S. Vanstone)
    IEEE Transactions on Information Theory, 39 (1993), 1639-1646.


  102. (with S. Vanstone)
    Journal of Cryptology, 6 (1993), 209-224


  103. (with G. Harper and S. Vanstone)
    Advances in Cryptology - EUROCRYPT '92, Lecture Notes in Computer Science, 658 (1993), 163-173.


  104. (with S. Vanstone and R. Zuccherato)
    Mathematics of Computation, 60 (1993), 407-420.


  105. (with I. Blake, S. Gao, R. Mullin, S. Vanstone and T. Yaghoobian)
    Kluwer Academic Publishers, 1992.


  106. (with P. van Oorschot and S. Vanstone)
    SIAM Journal on Computing, 21 (1992), 228-239.


  107. (with S. Vanstone)
    Applicable Algebra in Engineering, Communication and Computing, 3 (1992), 67-74.


  108. (edited with S. Vanstone)
    Lecture Notes in Computer Science, 537, Springer-Verlag, 1991.


  109. (with S. Vanstone)
    Advances in Cryptology - AUSCRYPT '90, Lecture Notes in Computer Science, 453 (1990), 2-13.

  110. Isomorphism classes of elliptic curves over finite fields of characteristic 2
    (with S. Vanstone)
    Utilitas Mathematica, 38 (1990), 135-154.


  111. (with D. Jungnickel and S. Vanstone)
    Proceedings of the American Mathematics Society, 109 (1990), 23-29.


  112. (with S. Vanstone and P. van Oorschot)
    Symbolic and Algebraic Computation, Lecture Notes in Computer Science, 358 (1989), 259-270.