ABOUT ME
PUBLICATIONS
TALKS
BLOG
PROJECTS
TEACHING
SUPERVISION
SERVICE
CV
Julio César López-Hernández
Latest
Finite Field Arithmetic Using AVX-512 For Isogeny-Based Cryptography
A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA)
PRESENT Runs Fast - Efficient and Secure Implementation in Software
Canais laterais em criptografia simétrica e de curvas elı́pticas: ataques e contramedidas
Lightweight cryptography on ARM
Implementação Eficiente e Segura de Algoritmos Criptográficos
Fast Point Multiplication Algorithms for Binary Elliptic Curves with and without Precomputation
Two is the fastest prime: lambda coordinates for binary elliptic curves
Lambda Coordinates for Binary Elliptic Curves
Faster Implementation of Scalar Multiplication on Koblitz Curves
Implementação eficiente em software de curvas elípticas e emparelhamentos bilineares
Implementação eficiente em software de curvas elípticas e emparelhamentos bilineares
Secure-TWS: Authenticating Node to Multi-user Communication in Shared Sensor Networks
Faster Explicit Formulas for Computing Pairings over Ordinary Curves
Software Implementation of Binary Elliptic Curves: Impact of the Carry-Less Multiplier on Scalar Multiplication
Speeding scalar multiplication over binary elliptic curves using the new carry-less multiplication instruction
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
Efficient implementation of elliptic curve cryptography in wireless sensors
Efficient Software Implementation of Binary Field Arithmetic Using Vector Instruction Sets
High-Speed Parallel Software Implementation of the ηT Pairing
Efficient implementation of elliptic curves on sensor nodes
High-Speed Parallel Software Implementation of the $η_T$ Pairing
NanoPBC: implementing cryptographic pairings on an 8-bit platform
Paralelização em software do Algoritmo de Miller
Efficient Certificateless Signcryption
Implementação eficiente de criptografia de curvas elípticas em sensores sem fio
On the Identity-Based Encryption for WM² Nets
TinyTate: Computing the Tate Pairing in Resource-Constrained Sensor Nodes
Cite
×