| 2009 |
| 27 | EE | Steven D. Galbraith,
Xibin Lin,
Michael Scott:
Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves.
EUROCRYPT 2009: 518-535 |
| 26 | EE | Piotr Szczechowiak,
Anton Kargl,
Michael Scott,
Martin Collier:
On the application of pairing based cryptography to wireless sensor networks.
WISEC 2009: 1-12 |
| 2008 |
| 25 | EE | Piotr Szczechowiak,
Leonardo B. Oliveira,
Michael Scott,
Martin Collier,
Ricardo Dahab:
NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks.
EWSN 2008: 305-320 |
| 24 | EE | Ezekiel J. Kachisa,
Edward F. Schaefer,
Michael Scott:
Constructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic Field.
Pairing 2008: 126-135 |
| 23 | EE | Steven D. Galbraith,
Michael Scott:
Exponentiation in Pairing-Friendly Groups Using Homomorphisms.
Pairing 2008: 211-224 |
| 22 | EE | Matthew L. Staten,
Steven E. Benzley,
Michael Scott:
A methodology for quadrilateral finite element mesh coarsening.
Eng. Comput. (Lond.) 24(3): 241-251 (2008) |
| 2007 |
| 21 | EE | Ali-Reza Adl-Tabatabai,
David Dice,
Maurice Herlihy,
Nir Shavit,
Christos Kozyrakis,
Christoph von Praun,
Michael Scott:
Potential show-stoppers for transactional synchronization.
PPOPP 2007: 55 |
| 20 | EE | Augusto Jun Devegili,
Michael Scott,
Ricardo Dahab:
Implementing Cryptographic Pairings over Barreto-Naehrig Curves.
Pairing 2007: 197-207 |
| 19 | EE | Claire Whelan,
Michael Scott:
The Importance of the Final Exponentiation in Pairings When Considering Fault Attacks.
Pairing 2007: 225-246 |
| 18 | EE | Paulo S. L. M. Barreto,
Steven D. Galbraith,
Colm O'Eigeartaigh,
Michael Scott:
Efficient pairing computation on supersingular Abelian varieties.
Des. Codes Cryptography 42(3): 239-271 (2007) |
| 17 | EE | Robert Ronan,
Colm O'Eigeartaigh,
Colin C. Murphy,
Michael Scott,
Tim Kerins:
Hardware acceleration of the Tate pairing on a genus 2 hyperelliptic curve.
Journal of Systems Architecture 53(2-3): 85-98 (2007) |
| 2006 |
| 16 | EE | Michael Scott,
Neil Costigan,
Wesam Abdulwahab:
Implementing Cryptographic Pairings on Smartcards.
CHES 2006: 134-147 |
| 15 | EE | Robert Ronan,
Colm O'Eigeartaigh,
Colin C. Murphy,
Michael Scott,
Tim Kerins,
William P. Marnane:
An Embedded Processor for a Pairing-Based Cryptosystem.
ITNG 2006: 192-197 |
| 14 | EE | Colm O'Eigeartaigh,
Michael Scott:
Pairing Calculation on Supersingular Genus 2 Curves.
Selected Areas in Cryptography 2006: 302-316 |
| 13 | EE | Claire Whelan,
Michael Scott:
Side Channel Analysis of Practical Pairing Implementations: Which Path Is More Secure?
VIETCRYPT 2006: 99-114 |
| 12 | EE | Michael Scott,
Paulo S. L. M. Barreto:
Generating More MNT Elliptic Curves.
Des. Codes Cryptography 38(2): 209-217 (2006) |
| 2005 |
| 11 | EE | Michael Scott:
Computing the Tate Pairing.
CT-RSA 2005: 293-304 |
| 10 | EE | Michael Scott,
Matthew Earp,
Steven E. Benzley,
Michael Stephenson:
Adaptive Sweeping Techniques.
IMR 2005: 417-432 |
| 9 | EE | Michael Scott:
Faster Pairings Using an Elliptic Curve with an Efficient Endomorphism.
INDOCRYPT 2005: 258-269 |
| 8 | EE | Anu Bhargava,
Michael Scott,
Ryan Traylor,
Roy Chung,
Kimberly Mrozek,
Jonathan Wolter,
Hong Z. Tan:
Effect of Cognitive Load on Tactor Location Identification in Zero-g.
WHC 2005: 56-62 |
| 2004 |
| 7 | EE | Michael Scott,
Paulo S. L. M. Barreto:
Compressed Pairings.
CRYPTO 2004: 140-156 |
| 6 | EE | Paulo S. L. M. Barreto,
Ben Lynn,
Michael Scott:
Efficient Implementation of Pairing-Based Cryptosystems.
J. Cryptology 17(4): 321-334 (2004) |
| 5 | EE | Michael Scott:
Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints.
Operating Systems Review 38(2): 73-75 (2004) |
| 2003 |
| 4 | EE | Paulo S. L. M. Barreto,
Ben Lynn,
Michael Scott:
On the Selection of Pairing-Friendly Groups.
Selected Areas in Cryptography 2003: 17-25 |
| 2002 |
| 3 | EE | Paulo S. L. M. Barreto,
Hae Yong Kim,
Ben Lynn,
Michael Scott:
Efficient Algorithms for Pairing-Based Cryptosystems.
CRYPTO 2002: 354-368 |
| 2 | EE | Paulo S. L. M. Barreto,
Ben Lynn,
Michael Scott:
Constructing Elliptic Curves with Prescribed Embedding Degrees.
SCN 2002: 257-267 |
| 1996 |
| 1 | | Paul Davern,
Michael Scott:
Fractal Based Image Steganography.
Information Hiding 1996: 279-294 |