Follow
Fajar Yuliawan
Title
Cited by
Cited by
Year
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptography Implementation
MW Paryasto, B Rahardjo, F Yuliawan, IM Alamsyah, K Kuspriyanto
Journal of ICT Research and Applications 6 (1), 63-81, 2012
92012
Composite field multiplier based on look-up table for elliptic curve cryptography implementation
MW Paryasto, B Rahardjo, F Yuliawan, I Muchtadi-Alamsyah, ...
Electrical Engineering and Informatics (ICEEI), 2011 International …, 2011
92011
Basis conversion in composite field
I Muchtadi-Alamsyah, F Yuliawan
International Journal of Mathematics and Computation 16 (2), 2013
62013
Implementation of Pollard Rho attack on elliptic curve cryptography over binary fields
Wienardo, F Yuliawan, I Muchtadi-Alamsyah, B Rahardjo
AIP Conference Proceedings 1677 (1), 030019, 2015
12015
Constructing Twisted Anomalous Elliptic Curves
I Muchtadi-Alamsyah, F Yuliawan, A Muchlis
International Journal of Basic and Applied Sciences IJBAS/IJENS 10 (6), 01-04, 2010
12010
Finite Field Basis Conversion and Normal Basis in Characteristic Three
I Muchtadi-Alamsyah, F Yuliawan, A Muchlis
Proceedings Of The International Conference On Algebra 2010: Advances in …, 2012
2012
The system can't perform the operation now. Try again later.
Articles 1–6