Christophe Doche

According to our database1, Christophe Doche authored at least 22 papers between 2000 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Elliptic Curve Cryptography Point Multiplication Core for Hardware Security Module.
IEEE Trans. Computers, 2020

2019
Low-Cost, Low-Power FPGA Implementation of ED25519 and CURVE25519 Point Multiplication.
Inf., 2019

Threshold verifiable multi-secret sharing based on elliptic curves and Chinese remainder theorem.
IET Inf. Secur., 2019

2014
New and Improved Methods to Analyze and Compute Double-Scalar Multiplications.
IEEE Trans. Computers, 2014

On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography.
IACR Cryptol. ePrint Arch., 2014

2013
Faster Repeated Doublings on Binary Elliptic Curves.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

Computational techniques.
Proceedings of the Handbook of Finite Fields., 2013

2008
Double-Base Number System for Multi-Scalar Multiplications.
IACR Cryptol. ePrint Arch., 2008

A Tree-Based Approach for Computing Double-Base Chains.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2006
Extended Double-Base Number System with applications to Elliptic Curve Cryptography.
IACR Cryptol. ePrint Arch., 2006

Extending Scalar Multiplication Using Double Bases.
Proceedings of the Advances in Cryptology, 2006

2005
Arithmetic of Special Curves.
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005

Arithmetic of Elliptic Curves.
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005

Algebraic Background.
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005

Finite Field Arithmetic.
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005

Integer Arithmetic.
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005

Exponentiation.
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005

Even moments of generalized Rudin-Shapiro polynomials.
Math. Comput., 2005

Efficient Scalar Multiplication by Isogeny Decompositions.
IACR Cryptol. ePrint Arch., 2005

2004
Redundant Trinomials for Finite Fields of Characteristic 2.
IACR Cryptol. ePrint Arch., 2004

2001
On the spectrum of the Zhang-Zagier height.
Math. Comput., 2001

2000
Integral Geometry and Real Zeros of Thue-Morse Polynomials.
Exp. Math., 2000


  Loading...