No photo of Kamal Bentahar

Kamal Bentahar

Dr

    Calculated based on number of publications stored in Pure and citations from Scopus
    20052008

    Research activity per year

    Search results

    • 2008

      Generic constructions of identity-based and certificateless KEMs

      Bentahar, K., Farshim, P., Malone-Lee, J. & Smart, N. P., Apr 2008, In: Journal of Cryptology. 21, 2, p. 178-199 22 p.

      Research output: Contribution to journalArticlepeer-review

      85 Citations (Scopus)
    • 2007

      Efficient 15,360-bit RSA using woop-optimised montgomery arithmetic

      Bentahar, K. & Smart, N. P., 2007, Cryptography and Coding - 11th IMA International Conference, Proceedings. Springer, Vol. 4887 LNCS. p. 346-363 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4887 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference proceedingpeer-review

      1 Citation (Scopus)
    • 2006

      Lash

      Bentahar, K., Silverman, J., Saarinen, M.-J. O. & Smart, N., 2006.

      Research output: Contribution to conferencePaperpeer-review

      Open Access
    • 2005

      The equivalence between the DHP and DLP for elliptic curves used in practical applications, revisited

      Bentahar, K., 2005, Cryptography and Coding 2005: Cryptography and Coding. Smart, N. P. (ed.). Springer, Vol. 3796 LNCS. p. 376-391 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3796 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference proceedingpeer-review

      7 Citations (Scopus)
    Your message has successfully been sent.
    Your message was not sent due to an error.