Follow
Christophe Doche
Christophe Doche
Professor
Verified email at aibihe.edu.au
Title
Cited by
Cited by
Year
Handbook of elliptic and hyperelliptic curve cryptography
H Cohen, G Frey, R Avanzi, C Doche, T Lange, K Nguyen, F Vercauteren
CRC press, 2005
17582005
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
1222006
Extended double-base number system with applications to elliptic curve cryptography
C Doche, L Imbert
Progress in Cryptology-INDOCRYPT 2006: 7th International Conference on …, 2006
1152006
Efficient scalar multiplication by isogeny decompositions
C Doche, T Icart, DR Kohel
International Workshop on Public Key Cryptography, 191-206, 2006
942006
Extending scalar multiplication using double bases
R Avanzi, V Dimitrov, C Doche, F Sica
Advances in Cryptology–ASIACRYPT 2006: 12th International Conference on the …, 2006
662006
Double-base number system for multi-scalar multiplications
C Doche, DR Kohel, F Sica
Annual International Conference on the Theory and Applications of …, 2009
642009
A tree-based approach for computing double-base chains
C Doche, L Habsieger
Australasian Conference on Information Security and Privacy, 433-446, 2008
542008
Elliptic curve cryptography point multiplication core for hardware security module
MA Mehrabi, C Doche, A Jolfaei
IEEE Transactions on Computers 69 (11), 1707-1718, 2020
462020
Arithmetic of elliptic curves
C Doche, T Lange
Handbook of Elliptic and Hyperelliptic Curve Cryptography, 267-302, 2006
292006
Redundant trinomials for finite fields of characteristic 2
C Doche
Australasian Conference on Information Security and Privacy, 122-133, 2005
292005
Low-cost, low-power FPGA implementation of ED25519 and CURVE25519 point multiplication
MA Mehrabi, C Doche
Information 10 (9), 285, 2019
232019
Threshold verifiable multi‐secret sharing based on elliptic curves and Chinese remainder theorem
M Sheikhi‐Garjan, M Bahramian, C Doche
IET Information Security 13 (3), 278-284, 2019
232019
On the spectrum of the Zhang-Zagier height
C Doche
Mathematics of computation 70 (233), 419-430, 2001
162001
Moments of the Rudin–Shapiro polynomials
C Doche, L Habsieger
Journal of Fourier Analysis and Applications 10, 497-505, 2004
152004
Zhang-Zagier heights of perturbed polynomials
C Doche
Journal de théorie des nombres de Bordeaux 13 (1), 103-110, 2001
152001
On the enumeration of double-base chains with applications to elliptic curve cryptography
C Doche
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
122014
Equidistribution modulo 1 and Salem numbers
C Doche, MM France, JJ Ruch
Functiones et Approximatio Commentarii Mathematici 39 (2), 261-271, 2008
112008
Even moments of generalized Rudin–Shapiro polynomials
C Doche
Mathematics of computation 74 (252), 1923-1935, 2005
102005
Leadership and assessment: Strengthening the nexus
S Fraser, M Harvey, R Beirman, S Cassidy, C Doche, S Eaton, ...
Sydney: Australian Learning and Teaching Council, 2008
92008
Exponentiation
C Doche
Handbook of elliptic and hyperelliptic curve cryptography, 145-168, 2006
92006
The system can't perform the operation now. Try again later.
Articles 1–20