Kamal Bentahar

Dr

  • 78 Citations
  • 2 h-Index
20052008
If you made any changes in Pure these will be visible here soon.

Personal profile

Research Interests

Cryptography ; Algorithmic Mathematics

Keywords

  • QA76 Computer software
  • QA75 Electronic computers. Computer science

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

Identity-based Mathematics
Encapsulation Mathematics
Cryptography Mathematics
Elliptic Curves Mathematics
Encryption Mathematics
Data encapsulation Engineering & Materials Science
Equivalence Mathematics
Modular arithmetic Mathematics

Research Output 2005 2008

  • 78 Citations
  • 2 h-Index
  • 2 Conference proceeding
  • 1 Paper
  • 1 Article
71 Citations (Scopus)

Generic constructions of identity-based and certificateless KEMs

Bentahar, K., Farshim, P., Malone-Lee, J. & Smart, N. P., Apr 2008, In : Journal of Cryptology. 21, 2, p. 178-199 22 p.

Research output: Contribution to journalArticle

Identity-based
Encapsulation
Encryption
Cryptography
Data encapsulation
1 Citation (Scopus)

Efficient 15,360-bit RSA using woop-optimised montgomery arithmetic

Bentahar, K. & Smart, N. P., 2007, Cryptography and Coding - 11th IMA International Conference, Proceedings. Springer, Vol. 4887 LNCS. p. 346-363 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4887 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

Modular arithmetic
Straight
Style
Strategy
Government

Lash

Bentahar, K., Silverman, JH., Saarinen, M. O. & Smart, NP., 2006.

Research output: Contribution to conferencePaper

Open Access
Hash functions
6 Citations (Scopus)

The equivalence between the DHP and DLP for elliptic curves used in practical applications, revisited

Bentahar, K., 2005, Cryptography and Coding 2005: Cryptography and Coding. Smart, N. P. (ed.). Springer, Vol. 3796 LNCS. p. 376-391 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3796 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

Elliptic Curves
Equivalence

Activities 2006 2006

  • 1 Participation in workshop, seminar, course

NIST Second Cryptographic Hash Workshop

Kamal Bentahar (Participant)
24 Aug 200625 Aug 2006

Activity: Participating in or organising an eventParticipation in workshop, seminar, course