Mathieu Ciet

According to our database1, Mathieu Ciet authored at least 15 papers between 2001 and 2011.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2011
Compact elliptic curve representations.
J. Math. Cryptol., 2011

2006
Trading Inversions for Multiplications in Elliptic Curve Cryptography.
Des. Codes Cryptogr., 2006

Why One Should Also Secure RSA Public Key Elements.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006

2005
Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults.
Des. Codes Cryptogr., 2005

An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm.
Proceedings of the Progress in Cryptology, 2005

2004
Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity.
IEEE Trans. Computers, 2004

Parallel FPGA Implementation of RSA with Residue Number Systems - Can side-channel threats be avoided? - Extended version.
IACR Cryptol. ePrint Arch., 2004

Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism.
Proceedings of the Public Key Cryptography, 2004

Transient Fault Induction Attacks on XTR.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

XTR Implementation on Reconfigurable Hardware.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004

2003
(Virtually) Free Randomization Techniques for Elliptic Curve Cryptography.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast Endomorphisms.
Proceedings of the Advances in Cryptology, 2003

2002
Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves.
Proceedings of the Selected Areas in Cryptography, 2002

Preventing Differential Analysis in GLV Elliptic Curve Scalar Multiplication.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002

2001
A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography.
Proceedings of the Progress in Cryptology, 2001


  Loading...