• 79 Citations
  • 2 h-Index
20052008
If you made any changes in Pure these will be visible here soon.

Research Output 2005 2008

  • 79 Citations
  • 2 h-Index
  • 2 Conference proceeding
  • 1 Paper
  • 1 Article
2008
72 Citations (Scopus)

Generic constructions of identity-based and certificateless KEMs

Bentahar, K., Farshim, P., Malone-Lee, J. & Smart, N. P., Apr 2008, In : Journal of Cryptology. 21, 2, p. 178-199 22 p.

Research output: Contribution to journalArticle

Identity-based
Encapsulation
Encryption
Cryptography
Data encapsulation
2007
1 Citation (Scopus)

Efficient 15,360-bit RSA using woop-optimised montgomery arithmetic

Bentahar, K. & Smart, N. P., 2007, Cryptography and Coding - 11th IMA International Conference, Proceedings. Springer, Vol. 4887 LNCS. p. 346-363 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4887 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

Modular arithmetic
Straight
Style
Strategy
Government
2006

Lash

Bentahar, K., Silverman, JH., Saarinen, M. O. & Smart, NP., 2006.

Research output: Contribution to conferencePaper

Open Access
Hash functions
2005
6 Citations (Scopus)

The equivalence between the DHP and DLP for elliptic curves used in practical applications, revisited

Bentahar, K., 2005, Cryptography and Coding 2005: Cryptography and Coding. Smart, N. P. (ed.). Springer, Vol. 3796 LNCS. p. 376-391 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3796 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

Elliptic Curves
Equivalence