2008 |
25 | EE | Brian King:
wNAF*, an Efficient Left-to-Right Signed Digit Recoding Algorithm.
ACNS 2008: 429-445 |
24 | EE | Yvo Desmedt,
Brian King,
Berry Schoenmakers:
Revisiting the Karnin, Greene and Hellman Bounds.
ICITS 2008: 183-198 |
23 | EE | Brian King,
Chittibabu Guda:
Semi-supervised learning for classification of protein sequence data.
Scientific Programming 16(1): 5-29 (2008) |
2007 |
22 | EE | Brian King,
Xiaolan Zhang:
Securing the Pharmaceutical Supply Chain using RFID.
MUE 2007: 23-28 |
21 | EE | Xiaolan Zhang,
Brian King:
An Anti-Counterfeiting RFID Privacy Protection Protocol.
J. Comput. Sci. Technol. 22(3): 438-448 (2007) |
20 | EE | Sining Liu,
Brian King,
Wei Wang:
Hardware Organization to Achieve High-Speed Elliptic Curve Cryptography for Mobile Devices.
MONET 12(4): 271-279 (2007) |
2006 |
19 | EE | Sining Liu,
Brian King,
Wei Wang:
A CRT-RSA Algorithm Secure against Hardware Fault Attacks.
DASC 2006: 51-60 |
18 | EE | Sining Liu,
F. Bowen,
Brian King,
Wei Wang:
Elliptic curves cryptosystem implementation based on a look-up table sharing scheme.
ISCAS 2006 |
2005 |
17 | EE | Brian King:
An Efficient Implementation of a Threshold RSA Signature Scheme.
ACISP 2005: 382-393 |
16 | EE | Xiaolan Zhang,
Brian King:
Modeling RFID Security.
CISC 2005: 75-90 |
15 | EE | Brian King,
Yvo Desmedt:
Securing Abstention in an Electronic Legislature.
HICSS 2005 |
14 | EE | Xiaolan Zhang,
Brian King:
Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting.
ISC 2005: 474-481 |
13 | | Elias Haddad,
Brian King:
Anonymous Simple Secure M-Commerce Protocol.
PSC 2005: 199-205 |
12 | | Paul Salama,
Brian King:
Efficient secure image transmission: compression integrated with encryption.
Security, Steganography, and Watermarking of Multimedia Contents 2005: 47-58 |
2004 |
11 | EE | Brian King,
Ben Rubin:
Improvements to the Point Halving Algorithm.
ACISP 2004: 262-276 |
10 | EE | Brian King:
A Point Compression Method for Elliptic Curves Defined over GF(2 n).
Public Key Cryptography 2004: 333-345 |
2003 |
9 | EE | Brian King:
A Comment on Group Independent Threshold Sharing.
WISA 2003: 425-441 |
2002 |
8 | EE | Brian King:
Requirements for Group Independent Linear Threshold Secret Sharing Schemes.
ACISP 2002: 89-106 |
7 | EE | Yvo Desmedt,
Brian King:
Verifiable Democracy a Protocol to Secure an Electronic Legislature.
EGOV 2002: 460-463 |
2001 |
6 | EE | Brian King:
Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group.
ACISP 2001: 376-391 |
5 | EE | Brian King:
An Improved Implementation of Elliptic Curves over GF(2) when Using Projective Point Arithmetic.
Selected Areas in Cryptography 2001: 134-150 |
2000 |
4 | | Brian King:
Algorithms to Speed Up Computations in Threshold RSA.
ACISP 2000: 443-456 |
3 | EE | Brian King:
Improved Methods to Perform Threshold RSA.
ASIACRYPT 2000: 359-372 |
1999 |
2 | | Yvo Desmedt,
Brian King:
Verifiable Democracy.
Communications and Multimedia Security 1999: 53-70 |
1998 |
1 | EE | Yvo Desmedt,
Brian King,
Wataru Kishimoto,
Kaoru Kurosawa:
A Comment on the Efficiency of Secret Sharing Scheme over Any Finite Abelian Group.
ACISP 1998: 391-402 |