Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
25
views
14
references
Top references
cited by
20
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,117
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Information Security and Cryptology — ICISC 2000
Characterization of Elliptic Curve Traces Under FR-Reduction
other
Author(s):
Atsuko Miyaji
,
Masaki Nakabayashi
,
Shunzo Takano
Publication date
(Online):
March 21 2001
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Model Reduction of Parametrized Systems 2015
Most cited references
14
Record
: found
Abstract
: not found
Book Chapter
: not found
Use of Elliptic Curves in Cryptography
Victor S. Miller
(1986)
0
comments
Cited
183
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Die Typen der Multiplikatorenringe elliptischer Funktionenkörper
Max Deuring
(1941)
0
comments
Cited
63
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Monte Carlo Methods for Index Computation (mod p)
J. M. Pollard
(1978)
0
comments
Cited
56
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2001
Publication date (Online):
March 21 2001
Pages
: 90-108
DOI:
10.1007/3-540-45247-8_8
SO-VID:
00ffad5b-1d4a-465c-abfa-8badc7377351
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 183
Efficient Sealed-bid Auction using Hash Chain
pp. 90
Characterization of Elliptic Curve Traces Under FR-Reduction
Similar content
3,117
Erratum à « Limboconjonctivite endémique des tropiques (LCET) et prise en charge allergologique : étude préliminaire chez l’enfant togolais » [J. Fr. Ophtalmol. 36 (8) (2013) 677–82]
Authors:
M Banla
,
N. Maneh
,
K. Vonor
…
Efeito de fontes e doses de nitrogênio sobre o crescimento inicial e qualidade de mudas de jacarandá-da-bahia (Dalbergia nigra (Vell.) Fr. All. Ex Benth.)
Authors:
V.B. Marques
,
H.N. Paiva
,
J.M. Gomes
…
Taxonomy, ecology and distribution of Hygrocybe (Fr.) P. Kumm. and Camarophyllopsis Herink (Fungi, Basidiomycota, Hygrocybeae) in Greenland. Meddelelser Om Grønland
Authors:
T Borgen
,
E Arnolds
See all similar
Cited by
20
Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption
Authors:
Yannis Rouselakis
,
Brent Waters
Scalable Zero Knowledge via Cycles of Elliptic Curves
Authors:
Eli Ben-Sasson
,
Alessandro Chiesa
,
Eran Tromer
…
Constructing Elliptic Curves with Prescribed Embedding Degrees
Authors:
Paulo Barreto
,
Ben Lynn
,
Michael R.D. Scott
See all cited by