Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptography Implementation MW Paryasto, B Rahardjo, F Yuliawan, IM Alamsyah, K Kuspriyanto Journal of ICT Research and Applications 6 (1), 63-81, 2012 | 9 | 2012 |
Composite field multiplier based on look-up table for elliptic curve cryptography implementation MW Paryasto, B Rahardjo, F Yuliawan, I Muchtadi-Alamsyah, ... Electrical Engineering and Informatics (ICEEI), 2011 International …, 2011 | 9 | 2011 |
Basis conversion in composite field I Muchtadi-Alamsyah, F Yuliawan International Journal of Mathematics and Computation 16 (2), 2013 | 6 | 2013 |
Implementation of Pollard Rho attack on elliptic curve cryptography over binary fields Wienardo, F Yuliawan, I Muchtadi-Alamsyah, B Rahardjo AIP Conference Proceedings 1677 (1), 030019, 2015 | 1 | 2015 |
Constructing Twisted Anomalous Elliptic Curves I Muchtadi-Alamsyah, F Yuliawan, A Muchlis International Journal of Basic and Applied Sciences IJBAS/IJENS 10 (6), 01-04, 2010 | 1 | 2010 |
Finite Field Basis Conversion and Normal Basis in Characteristic Three I Muchtadi-Alamsyah, F Yuliawan, A Muchlis Proceedings Of The International Conference On Algebra 2010: Advances in …, 2012 | | 2012 |