No photo of Kamal Bentahar

Kamal Bentahar

Dr

    Calculated based on number of publications stored in Pure and citations from Scopus
    20052008

    Research activity per year

    If you made any changes in Pure these will be visible here soon.

    Search results

    • 2008

      Generic constructions of identity-based and certificateless KEMs

      Bentahar, K., Farshim, P., Malone-Lee, J. & Smart, N. P., Apr 2008, In: Journal of Cryptology. 21, 2, p. 178-199 22 p.

      Research output: Contribution to journalArticlepeer-review

      84 Citations (Scopus)
    • 2007

      Efficient 15,360-bit RSA using woop-optimised montgomery arithmetic

      Bentahar, K. & Smart, N. P., 2007, Cryptography and Coding - 11th IMA International Conference, Proceedings. Springer, Vol. 4887 LNCS. p. 346-363 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4887 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference proceedingpeer-review

      1 Citation (Scopus)
    • 2006

      Lash

      Bentahar, K., Silverman, JH., Saarinen, M. O. & Smart, NP., 2006.

      Research output: Contribution to conferencePaperpeer-review

      Open Access
    • 2005

      The equivalence between the DHP and DLP for elliptic curves used in practical applications, revisited

      Bentahar, K., 2005, Cryptography and Coding 2005: Cryptography and Coding. Smart, N. P. (ed.). Springer, Vol. 3796 LNCS. p. 376-391 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3796 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference proceedingpeer-review

      7 Citations (Scopus)
    Your message has successfully been sent.
    Your message was not sent due to an error.