dblp.uni-trier.dewww.uni-trier.de

Michael Scott

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
27EESteven D. Galbraith, Xibin Lin, Michael Scott: Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves. EUROCRYPT 2009: 518-535
26EEPiotr Szczechowiak, Anton Kargl, Michael Scott, Martin Collier: On the application of pairing based cryptography to wireless sensor networks. WISEC 2009: 1-12
2008
25EEPiotr Szczechowiak, Leonardo B. Oliveira, Michael Scott, Martin Collier, Ricardo Dahab: NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks. EWSN 2008: 305-320
24EEEzekiel J. Kachisa, Edward F. Schaefer, Michael Scott: Constructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic Field. Pairing 2008: 126-135
23EESteven D. Galbraith, Michael Scott: Exponentiation in Pairing-Friendly Groups Using Homomorphisms. Pairing 2008: 211-224
22EEMatthew L. Staten, Steven E. Benzley, Michael Scott: A methodology for quadrilateral finite element mesh coarsening. Eng. Comput. (Lond.) 24(3): 241-251 (2008)
2007
21EEAli-Reza Adl-Tabatabai, David Dice, Maurice Herlihy, Nir Shavit, Christos Kozyrakis, Christoph von Praun, Michael Scott: Potential show-stoppers for transactional synchronization. PPOPP 2007: 55
20EEAugusto Jun Devegili, Michael Scott, Ricardo Dahab: Implementing Cryptographic Pairings over Barreto-Naehrig Curves. Pairing 2007: 197-207
19EEClaire Whelan, Michael Scott: The Importance of the Final Exponentiation in Pairings When Considering Fault Attacks. Pairing 2007: 225-246
18EEPaulo S. L. M. Barreto, Steven D. Galbraith, Colm O'Eigeartaigh, Michael Scott: Efficient pairing computation on supersingular Abelian varieties. Des. Codes Cryptography 42(3): 239-271 (2007)
17EERobert Ronan, Colm O'Eigeartaigh, Colin C. Murphy, Michael Scott, Tim Kerins: Hardware acceleration of the Tate pairing on a genus 2 hyperelliptic curve. Journal of Systems Architecture 53(2-3): 85-98 (2007)
2006
16EEMichael Scott, Neil Costigan, Wesam Abdulwahab: Implementing Cryptographic Pairings on Smartcards. CHES 2006: 134-147
15EERobert Ronan, Colm O'Eigeartaigh, Colin C. Murphy, Michael Scott, Tim Kerins, William P. Marnane: An Embedded Processor for a Pairing-Based Cryptosystem. ITNG 2006: 192-197
14EEColm O'Eigeartaigh, Michael Scott: Pairing Calculation on Supersingular Genus 2 Curves. Selected Areas in Cryptography 2006: 302-316
13EEClaire Whelan, Michael Scott: Side Channel Analysis of Practical Pairing Implementations: Which Path Is More Secure? VIETCRYPT 2006: 99-114
12EEMichael Scott, Paulo S. L. M. Barreto: Generating More MNT Elliptic Curves. Des. Codes Cryptography 38(2): 209-217 (2006)
2005
11EEMichael Scott: Computing the Tate Pairing. CT-RSA 2005: 293-304
10EEMichael Scott, Matthew Earp, Steven E. Benzley, Michael Stephenson: Adaptive Sweeping Techniques. IMR 2005: 417-432
9EEMichael Scott: Faster Pairings Using an Elliptic Curve with an Efficient Endomorphism. INDOCRYPT 2005: 258-269
8EEAnu Bhargava, Michael Scott, Ryan Traylor, Roy Chung, Kimberly Mrozek, Jonathan Wolter, Hong Z. Tan: Effect of Cognitive Load on Tactor Location Identification in Zero-g. WHC 2005: 56-62
2004
7EEMichael Scott, Paulo S. L. M. Barreto: Compressed Pairings. CRYPTO 2004: 140-156
6EEPaulo S. L. M. Barreto, Ben Lynn, Michael Scott: Efficient Implementation of Pairing-Based Cryptosystems. J. Cryptology 17(4): 321-334 (2004)
5EEMichael Scott: Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints. Operating Systems Review 38(2): 73-75 (2004)
2003
4EEPaulo S. L. M. Barreto, Ben Lynn, Michael Scott: On the Selection of Pairing-Friendly Groups. Selected Areas in Cryptography 2003: 17-25
2002
3EEPaulo S. L. M. Barreto, Hae Yong Kim, Ben Lynn, Michael Scott: Efficient Algorithms for Pairing-Based Cryptosystems. CRYPTO 2002: 354-368
2EEPaulo S. L. M. Barreto, Ben Lynn, Michael Scott: Constructing Elliptic Curves with Prescribed Embedding Degrees. SCN 2002: 257-267
1996
1 Paul Davern, Michael Scott: Fractal Based Image Steganography. Information Hiding 1996: 279-294

Coauthor Index

1Wesam Abdulwahab [16]
2Ali-Reza Adl-Tabatabai [21]
3Paulo S. L. M. Barreto [2] [3] [4] [6] [7] [12] [18]
4Steven E. Benzley [10] [22]
5Anu Bhargava [8]
6Roy Chung [8]
7Martin Collier [25] [26]
8Neil Costigan [16]
9Ricardo Dahab [20] [25]
10Paul Davern [1]
11Augusto Jun Devegili [20]
12David Dice [21]
13Matthew Earp [10]
14Steven D. Galbraith [18] [23] [27]
15Maurice Herlihy [21]
16Ezekiel J. Kachisa [24]
17Anton Kargl [26]
18Tim Kerins [15] [17]
19Hae Yong Kim [3]
20Christoforos E. Kozyrakis (Christos Kozyrakis) [21]
21Xibin Lin [27]
22Ben Lynn [2] [3] [4] [6]
23William P. Marnane [15]
24Kimberly Mrozek [8]
25Colin C. Murphy [15] [17]
26Colm O'Eigeartaigh [14] [15] [17] [18]
27Leonardo B. Oliveira [25]
28Christoph von Praun [21]
29Robert Ronan [15] [17]
30Edward F. Schaefer [24]
31Nir Shavit [21]
32Matthew L. Staten [22]
33Michael Stephenson [10]
34Piotr Szczechowiak [25] [26]
35Hong Z. Tan [8]
36Ryan Traylor [8]
37Claire Whelan [13] [19]
38Jonathan Wolter [8]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)