• 79 Citations
  • 2 h-Index
20052008
If you made any changes in Pure these will be visible here soon.

Personal profile

Research Interests

Cryptography ; Algorithmic Mathematics

Keywords

  • QA76 Computer software
  • QA75 Electronic computers. Computer science

Fingerprint Dive into the research topics where Kamal Bentahar is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

Identity-based Mathematics
Encapsulation Mathematics
Cryptography Mathematics
Elliptic Curves Mathematics
Encryption Mathematics
Data encapsulation Engineering & Materials Science
Equivalence Mathematics
Modular arithmetic Mathematics

Research Output 2005 2008

  • 79 Citations
  • 2 h-Index
  • 2 Conference proceeding
  • 1 Paper
  • 1 Article
72 Citations (Scopus)

Generic constructions of identity-based and certificateless KEMs

Bentahar, K., Farshim, P., Malone-Lee, J. & Smart, N. P., Apr 2008, In : Journal of Cryptology. 21, 2, p. 178-199 22 p.

Research output: Contribution to journalArticle

Identity-based
Encapsulation
Encryption
Cryptography
Data encapsulation
1 Citation (Scopus)

Efficient 15,360-bit RSA using woop-optimised montgomery arithmetic

Bentahar, K. & Smart, N. P., 2007, Cryptography and Coding - 11th IMA International Conference, Proceedings. Springer, Vol. 4887 LNCS. p. 346-363 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4887 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

Modular arithmetic
Straight
Style
Strategy
Government

Lash

Bentahar, K., Silverman, JH., Saarinen, M. O. & Smart, NP., 2006.

Research output: Contribution to conferencePaper

Open Access
Hash functions
6 Citations (Scopus)

The equivalence between the DHP and DLP for elliptic curves used in practical applications, revisited

Bentahar, K., 2005, Cryptography and Coding 2005: Cryptography and Coding. Smart, N. P. (ed.). Springer, Vol. 3796 LNCS. p. 376-391 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3796 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

Elliptic Curves
Equivalence

Activities 2006 2006

  • 1 Participation in workshop, seminar, course

NIST Second Cryptographic Hash Workshop

Kamal Bentahar (Participant)
24 Aug 200625 Aug 2006

Activity: Participating in or organising an eventParticipation in workshop, seminar, course