Shantz, Michael; Teske, Edlyn Solving the elliptic curve discrete logarithm problem using Semaev polynomials, Weil descent and Gröbner basis methods – an experimental study. (English) Zbl 1320.11125 Fischlin, Marc (ed.) et al., Number theory and cryptography. Papers in honor of Johannes Buchmann on the occasion of his 60th birthday. Berlin: Springer (ISBN 978-3-642-42000-9/pbk). Lecture Notes in Computer Science 8260, 94-107 (2013). MSC: 11Y16 14G50 11G20 14G15 14H52 94A60 PDFBibTeX XMLCite \textit{M. Shantz} and \textit{E. Teske}, Lect. Notes Comput. Sci. 8260, 94--107 (2013; Zbl 1320.11125) Full Text: DOI
Mehrotra, Anuj; Shantz, Joseph; Trick, Michael A. Determining newspaper marketing zones using contiguous clustering. (English) Zbl 1090.90133 Nav. Res. Logist. 52, No. 1, 82-92 (2005). MSC: 90B90 62H30 90B60 PDFBibTeX XMLCite \textit{A. Mehrotra} et al., Nav. Res. Logist. 52, No. 1, 82--92 (2005; Zbl 1090.90133) Full Text: DOI
Gura, Nils; Patel, Arun; Wander, Arvinderpal; Eberle, Hans; Shantz, Sheueling Chang Comparing elliptic curve cryptography and RSA on 8-bit CPUs. (English) Zbl 1104.68476 Joye, Marc (ed.) et al., Cryptographic hardware and embedded systems – CHES 2004. 6th international workshop, Cambridge, MA, USA, August 11–13, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22666-4/pbk). Lecture Notes in Computer Science 3156, 119-132 (2004). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{N. Gura} et al., Lect. Notes Comput. Sci. 3156, 119--132 (2004; Zbl 1104.68476) Full Text: DOI
Weimerskirch, André; Stebila, Douglas; Shantz, Sheueling Chang Generic \(\text{GF}(2^m)\) arithmetic in software and its application to ECC. (English) Zbl 1042.12006 Safavi-Naini, Rei (ed.) et al., Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9–11, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40515-1/pbk). Lect. Notes Comput. Sci. 2727, 79-92 (2003). MSC: 12Y05 94A60 11T71 14G50 PDFBibTeX XMLCite \textit{A. Weimerskirch} et al., Lect. Notes Comput. Sci. 2727, 79--92 (2003; Zbl 1042.12006) Full Text: Link
Gura, Nils; Shantz, Sheueling Chang; Eberle, Hans; Gupta, Sumit; Gupta, Vipul; Finchelstein, Daniel; Goupy, Edouard; Stebila, Douglas An end-to-end systems approach to elliptic curve cryptography. (English) Zbl 1020.94519 Kaliski, Burton S. jun. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2002. 4th international workshop, Redwood Shores, CA, USA, August 13-15, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2523, 349-365 (2002). MSC: 94A60 14G50 11Y16 68M07 PDFBibTeX XMLCite \textit{N. Gura} et al., Lect. Notes Comput. Sci. 2523, 349--365 (2002; Zbl 1020.94519) Full Text: Link
Weimerskirch, André; Paar, Christof; Shantz, Sheueling Chang Elliptic curve cryptography on a Palm OS device. (English) Zbl 1008.94538 Varadharajan, Vijay (ed.) et al., Information security and privacy. 6th Australasian conference, ACISP 2001, Sydney, Australia, July 11-13, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2119, 502-513 (2001). MSC: 94A60 94A62 14G50 11T71 PDFBibTeX XMLCite \textit{A. Weimerskirch} et al., Lect. Notes Comput. Sci. 2119, 502--513 (2001; Zbl 1008.94538) Full Text: Link