Extending scalar multiplication using double bases R Avanzi, V Dimitrov, C Doche, F Sica Advances in Cryptology–ASIACRYPT 2006: 12th International Conference on the …, 2006 | 67 | 2006 |
Improved algorithms for efficient arithmetic on elliptic curves using fast endomorphisms M Ciet, T Lange, F Sica, JJ Quisquater Advances in Cryptology—EUROCRYPT 2003: International Conference on the …, 2003 | 62 | 2003 |
Double-base number system for multi-scalar multiplications C Doche, DR Kohel, F Sica Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009 | 61 | 2009 |
Analysis of the Gallant-Lambert-Vanstone method based on efficient endomorphisms: Elliptic and hyperelliptic curves F Sica, M Ciet, JJ Quisquater Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002 …, 2003 | 61 | 2003 |
Four-dimensional gallant-lambert-vanstone scalar multiplication P Longa, F Sica Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012 | 57 | 2012 |
Congruences satisfied by Apéry-like numbers HH Chan, S Cooper, F Sica Int. J. Number Theory 6 (1), 89-97, 2010 | 49 | 2010 |
Faster scalar multiplication on Koblitz curves combining point halving with the Frobenius endomorphism RM Avanzi, M Ciet, F Sica Public Key Cryptography–PKC 2004: 7th International Workshop on Theory and …, 2004 | 44 | 2004 |
A secure family of composite finite fields suitable for fast implementation of elliptic curve cryptography M Ciet, Q Jean-Jacques, F Sica Progress in Cryptology—INDOCRYPT 2001: Second International Conference on …, 2001 | 42 | 2001 |
Four-dimensional gallant–lambert–vanstone scalar multiplication P Longa, F Sica Journal of Cryptology 27 (2), 248-283, 2014 | 41 | 2014 |
Scalar multiplication on Koblitz curves using double bases R Avanzi, F Sica Progress in Cryptology-VIETCRYPT 2006: First International Conference on …, 2006 | 35 | 2006 |
An analysis of double base number systems and a sublinear scalar multiplication algorithm M Ciet, F Sica Progress in Cryptology–Mycrypt 2005: First International Conference on …, 2005 | 33 | 2005 |
Preventing differential analysis in GLV elliptic curve scalar multiplication M Ciet, JJ Quisquater, F Sica Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International …, 2003 | 26 | 2003 |
NESSIE security report B Preneel, A Biryukov, E Oswald, BV Rompay, L Granboulan, E Dottax, ... Deliverable D20, NESSIE Consortium. Feb, 2003 | 24 | 2003 |
Final report of European project number IST-1999-12324, named New European Schemes for Signatures, Integrity, and Encryption B Preneel, A Biryukov, C De Canničre, SB Örs, E Oswald, B Van Rompay, ... Berlin Heidelberg NewYork London Paris Tokyo Hong Kong Barcelona Budapest …, 2004 | 21 | 2004 |
NESSIE security report, version 2.0 B Preneel, A Biryukov, E Oswald, B Van Rompay, L Granboulan, E Dottax, ... NESSIE Deliverable D 20, 2003 | 20 | 2003 |
Selected Areas in Cryptography RM Avanzi, L Keliher, F Sica Lecture Notes in Computer Science 5381, 2009 | 14 | 2009 |
A short note on irreducible trinomials in binary fields M Ciet, JJ Quisquater, F Sica 23rd Symposium on Information Theory in the BENELUX, 2002 | 10 | 2002 |
Two classes of ternary codes and their weight distributions C Ding, T Klřve, F Sica Discrete applied mathematics 111 (1-2), 37-53, 2001 | 8 | 2001 |
Multiple point compression on elliptic curves X Fan, A Otemissov, F Sica, A Sidorenko Designs, Codes and Cryptography 83, 565-588, 2017 | 6 | 2017 |
The order of vanishing of L-functions at the center of the critical strip F Sica | 5 | 1998 |