# Darrel Hankerson

According to our database

Collaborative distances:

^{1}, Darrel Hankerson authored at least 38 papers between 2000 and 2011.Collaborative distances:

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Other## Links

#### On csauthors.net:

## Bibliography

2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Speeding scalar multiplication over binary elliptic curves using the new carry-less multiplication instruction.

J. Cryptogr. Eng., 2011

Software implementation of binary elliptic curves: impact of the carry-less multiplier on scalar multiplication.

IACR Cryptol. ePrint Arch., 2011

2010

On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings.

IACR Cryptol. ePrint Arch., 2010

Des. Codes Cryptogr., 2010

Efficient Software Implementation of Binary Field Arithmetic Using Vector Instruction Sets.

Proceedings of the Progress in Cryptology, 2010

Proceedings of the Topics in Cryptology, 2010

2009

Proceedings of the Identity-Based Cryptography, 2009

Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields.

IEEE Trans. Computers, 2009

2008

J. UCS, 2008

2007

Discret. Appl. Math., 2007

Proceedings of the Arithmetic of Finite Fields, First International Workshop, 2007

2006

IEEE Trans. Computers, 2006

2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

2004

IEEE Trans. Computers, 2004

2001

Proceedings of the Topics in Cryptology, 2001

2000

Proceedings of the 9th USENIX Security Symposium, 2000

Proceedings of the Cryptographic Hardware and Embedded Systems, 2000