• 81 Citations
  • 2 h-Index
20052008

Research output per year

If you made any changes in Pure these will be visible here soon.

Personal profile

Research Interests

Cryptography ; Algorithmic Mathematics

Keywords

  • QA76 Computer software
  • QA75 Electronic computers. Computer science

Fingerprint Dive into the research topics where Kamal Bentahar is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

Research Output

  • 81 Citations
  • 2 h-Index
  • 2 Conference proceeding
  • 1 Paper
  • 1 Article

Generic constructions of identity-based and certificateless KEMs

Bentahar, K., Farshim, P., Malone-Lee, J. & Smart, N. P., Apr 2008, In : Journal of Cryptology. 21, 2, p. 178-199 22 p.

Research output: Contribution to journalArticle

  • 74 Citations (Scopus)

    Efficient 15,360-bit RSA using woop-optimised montgomery arithmetic

    Bentahar, K. & Smart, N. P., 2007, Cryptography and Coding - 11th IMA International Conference, Proceedings. Springer, Vol. 4887 LNCS. p. 346-363 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4887 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding

  • 1 Citation (Scopus)

    Lash

    Bentahar, K., Silverman, JH., Saarinen, M. O. & Smart, NP., 2006.

    Research output: Contribution to conferencePaper

    Open Access
  • The equivalence between the DHP and DLP for elliptic curves used in practical applications, revisited

    Bentahar, K., 2005, Cryptography and Coding 2005: Cryptography and Coding. Smart, N. P. (ed.). Springer, Vol. 3796 LNCS. p. 376-391 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3796 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding

  • 6 Citations (Scopus)

    Activities

    • 1 Participation in workshop, seminar, course

    NIST Second Cryptographic Hash Workshop

    Kamal Bentahar (Participant)
    24 Aug 200625 Aug 2006

    Activity: Participating in or organising an eventParticipation in workshop, seminar, course