# Darrel Hankerson

According to our database

Collaborative distances:

^{1}, Darrel Hankerson authored at least 34 papers between 2000 and 2011.Collaborative distances:

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Other## Links

#### On csauthors.net:

## Bibliography

2011

Pairings.

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

NSA Suite B.

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

NIST Elliptic Curves.

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Koblitz Elliptic Curves.

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Elliptic Curves.

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Elliptic Curve Public-Key Encryption Schemes.

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Elliptic Curve Point Multiplication Using Halving.

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Elliptic Curve Key Agreement Schemes.

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Elliptic Curve Discrete Logarithm Problem.

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Elliptic Curve Cryptography.

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Speeding scalar multiplication over binary elliptic curves using the new carry-less multiplication instruction.

J. Cryptographic Engineering, 2011

Software implementation of binary elliptic curves: impact of the carry-less multiplier on scalar multiplication.

IACR Cryptology ePrint Archive, 2011

Software Implementation of Binary Elliptic Curves: Impact of the Carry-Less Multiplier on Scalar Multiplication.

Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

2010

On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings.

IACR Cryptology ePrint Archive, 2010

Comparing two pairing-based aggregate signature schemes.

Des. Codes Cryptogr., 2010

On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings.

Proceedings of the Arithmetic of Finite Fields, Third International Workshop, 2010

Efficient Software Implementation of Binary Field Arithmetic Using Vector Instruction Sets.

Proceedings of the Progress in Cryptology, 2010

High-Speed Parallel Software Implementation of the ηT Pairing.

Proceedings of the Topics in Cryptology, 2010

2009

Software Implementation of Pairings.

Proceedings of the Identity-Based Cryptography, 2009

Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields.

IEEE Trans. Computers, 2009

Comparing Two Pairing-Based Aggregate Signature Schemes.

IACR Cryptology ePrint Archive, 2009

2008

Parallel Formulations of Scalar Multiplication on Koblitz Curves.

J. UCS, 2008

Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields.

IACR Cryptology ePrint Archive, 2008

2007

Formulas for cube roots in F

_{3m}.
Discrete Applied Mathematics, 2007

Software Implementation of Arithmetic in F

_{3m}.
Proceedings of the Arithmetic of Finite Fields, First International Workshop, 2007

2006

Software Multiplication Using Gaussian Normal Bases.

IEEE Trans. Computers, 2006

2005

Elliptic Curve Signature Schemes.

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Elliptic Curve Keys.

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Elliptic Curve.

Proceedings of the Encyclopedia of Cryptography and Security, 2005

ECC Challenges.

Proceedings of the Encyclopedia of Cryptography and Security, 2005

2004

Field Inversion and Point Halving Revisited.

IEEE Trans. Computers, 2004

2001

Software Implementation of the NIST Elliptic Curves Over Prime Fields.

Proceedings of the Topics in Cryptology, 2001

2000

PGP in Constrained Wireless Devices.

Proceedings of the 9th USENIX Security Symposium, 2000

Software Implementation of Elliptic Curve Cryptography over Binary Fields.

Proceedings of the Cryptographic Hardware and Embedded Systems, 2000