Examples: Prince; Princeton University; Ken Follett; Follett,Ken
1shortlisttitle datasearch history  
results search [or] ISN:0000000108776637 | 1 hits
Person
ISNI: 
0000 0001 0877 6637
Name: 
Menezes, A.
Menezes, A. J.
Menezes, Alfred,
Menezes, Alfred J.
Menezes, Alfred John
Dates: 
1965-
Creation class: 
article
cre
Language material
Text
txt
Creation role: 
author
author of afterword, colophon
contributor
editor
redactor
writer of accompanying material
Related names: 
Hankerson, Darrel R.
Koblitz, Neal
Sarkar, Palash (1969-)
University of Waterloo
University of Waterloo. Department of Combinatorics and Optimization
University of Waterloo. Faculty of Mathematics
Van Oorschot, Paul C.
Vanstone, Scott A.
Wu, Yi-Hong
Wydawnictwa Naukowo-Techniczne
Zuccherato, Robert J.
Titles: 
Advances in Cryptology - CRYPTO 2007 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedings
Algebraic aspects of cryptography
An elementary introduction to hyperelliptic curves, 1996. Alfred J. Menezes.
Analysis of the Weil descent attack of Gaudry, Hess and Smart
Another look at generic groups
Another look at non-standard discrete log and Diffie-Hellman problems
Another look at "provable security"
Applications of finite fields
( cf. certicom biography ref name="certicombio"/ and homepage at waterloo ref name="waterloohomepage"[http://www.math.uwaterloo.ca/~ajmeneze/ alfred menezes homepage] - university of waterloo/ref )
elliptic curve digital signature algorithm (ECDSA), The
Elliptic curve public key cryptosystems
Formulas for cube roots in [enhanced F subscript 3m]
Handbook of Applied Cryptography
Hyperelliptic curves and cryptography
INDOCRYPT 2002
Irreducible polynomials of maximum weight
Isomorphism classes of genus-2 hyperelliptic curves over finite fields
Key agreement protocols and their security analysis
Kryptografia stosowana
Obstacles to the torsion-subgroup attack on the decision Diffie-Hellman problem
Pairing-based cryptography at high security levels
Progress in cryptology
RSA Conference 2005
Security of signature schemes in a multi-user setting
small subgroup attack on a key agreement protocol of Arazi, A
Software implementation of elliptic curve crytography over binary fields
Solving elliptic curve discrete logarithm problems using Weil descent
Contributed to or performed: 
KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE
Notes: 
University Microfilms order no. UMI00379100
Thesis (Ph. D.)--University of Waterloo, 1992
Sources: 
VIAF BNC LAC LC NKC NLP NTA NUKAT SELIBR SUDOC WKP
TEL
ZETO