Darrel Hankerson

According to our database1, Darrel Hankerson authored at least 34 papers between 2000 and 2011.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2011
Pairings.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

NSA Suite B.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

NIST Elliptic Curves.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Koblitz Elliptic Curves.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Elliptic Curves.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Elliptic Curve Public-Key Encryption Schemes.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Elliptic Curve Point Multiplication Using Halving.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Elliptic Curve Key Agreement Schemes.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Elliptic Curve Discrete Logarithm Problem.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Elliptic Curve Cryptography.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Speeding scalar multiplication over binary elliptic curves using the new carry-less multiplication instruction.
J. Cryptographic Engineering, 2011

Software implementation of binary elliptic curves: impact of the carry-less multiplier on scalar multiplication.
IACR Cryptology ePrint Archive, 2011

Software Implementation of Binary Elliptic Curves: Impact of the Carry-Less Multiplier on Scalar Multiplication.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

2010
On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings.
IACR Cryptology ePrint Archive, 2010

Comparing two pairing-based aggregate signature schemes.
Des. Codes Cryptogr., 2010

On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings.
Proceedings of the Arithmetic of Finite Fields, Third International Workshop, 2010

Efficient Software Implementation of Binary Field Arithmetic Using Vector Instruction Sets.
Proceedings of the Progress in Cryptology, 2010

High-Speed Parallel Software Implementation of the ηT Pairing.
Proceedings of the Topics in Cryptology, 2010

2009
Software Implementation of Pairings.
Proceedings of the Identity-Based Cryptography, 2009

Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields.
IEEE Trans. Computers, 2009

Comparing Two Pairing-Based Aggregate Signature Schemes.
IACR Cryptology ePrint Archive, 2009

2008
Parallel Formulations of Scalar Multiplication on Koblitz Curves.
J. UCS, 2008

Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields.
IACR Cryptology ePrint Archive, 2008

2007
Formulas for cube roots in F3m.
Discrete Applied Mathematics, 2007

Software Implementation of Arithmetic in F3m.
Proceedings of the Arithmetic of Finite Fields, First International Workshop, 2007

2006
Software Multiplication Using Gaussian Normal Bases.
IEEE Trans. Computers, 2006

2005
Elliptic Curve Signature Schemes.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Elliptic Curve Keys.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Elliptic Curve.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

ECC Challenges.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

2004
Field Inversion and Point Halving Revisited.
IEEE Trans. Computers, 2004

2001
Software Implementation of the NIST Elliptic Curves Over Prime Fields.
Proceedings of the Topics in Cryptology, 2001

2000
PGP in Constrained Wireless Devices.
Proceedings of the 9th USENIX Security Symposium, 2000

Software Implementation of Elliptic Curve Cryptography over Binary Fields.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2000


  Loading...