New point addition formulae for ECC applications N Meloni Arithmetic of Finite Fields: First International Workshop, WAIFI 2007 …, 2007 | 143 | 2007 |
Block recombination approach for subquadratic space complexity binary field multiplication based on Toeplitz matrix-vector product MA Hasan, N Meloni, AH Namin, C Negre IEEE Transactions on Computers 61 (2), 151-163, 2010 | 50 | 2010 |
Efficient RNS bases for cryptography JC Bajard, N Meloni, T Plantard Proceedings of IMACS 2005 World Congress, Paris, France (July 2005), 2005 | 50 | 2005 |
SPA resistant elliptic curve cryptosystem using addition chains A Byrne, F Crowe, WP Marnane, N Meloni, A Tisserand, E Popovici International Journal of High Performance Systems Architecture 1 (2), 133-142, 2007 | 37 | 2007 |
Fast and secure elliptic curve scalar multiplication over prime fields using special addition chains M Nicolas Cryptology ePrint Archive, 2006 | 36 | 2006 |
Elliptic curve scalar multiplication combining Yao’s algorithm and double bases N Méloni, MA Hasan International Workshop on Cryptographic Hardware and Embedded Systems, 304-316, 2009 | 26 | 2009 |
Residue systems efficiency for modular products summation: Application to Elliptic Curves Cryptography JC Bajard, S Duquesne, M Ercegovac, N Meloni Advanced Signal Processing Algorithms, Architectures, and Implementations …, 2006 | 23 | 2006 |
Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve Cryptosystem. A Byrne, N Meloni, A Tisserand, EM Popovici, WP Marnane J. Comput. 2 (10), 52-62, 2007 | 21 | 2007 |
Arithmétique pour la Cryptographie basée sur les Courbes Elliptiques N Méloni These de Doctorat, Université Montpellier II, 2007 | 15 | 2007 |
Combining Montgomery ladder for elliptic curves defined over Fp and RNS representation JC Bajard, S Duquenne, N Méloni Research Report LIRMM 6041, 2006 | 14 | 2006 |
Efficient double bases for scalar multiplication N Méloni, MA Hasan IEEE Transactions on Computers 64 (8), 2204-2212, 2014 | 13 | 2014 |
Random euclidean addition chain generation and its application to point multiplication F Herbaut, PY Liardet, N Méloni, Y Téglia, P Véron Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010 | 13 | 2010 |
Computer Arithmetic-Block Recombination Approach for Subquadratic Space Complexity Binary Field Multiplication Based on Toeplitz Matrix-Vector Product MA Hasan, N Meloni, AH Namin, C Negre IEEE Transactions on Computers 61 (2), 151, 2012 | 9 | 2012 |
Random digit representation of integers N Méloni, MA Hasan 2016 IEEE 23nd Symposium on Computer Arithmetic (ARITH), 118-125, 2016 | 7 | 2016 |
Efficient RNS bases for Cryptography IMACS’05 JC Bajard, N Meloni, T Plantard Applied Mathematics and Simulation, 2005 | 7 | 2005 |
High performance GHASH function for long messages N Méloni, C Négre, MA Hasan International Conference on Applied Cryptography and Network Security, 154-167, 2010 | 6 | 2010 |
Study of modular inversion in RNS JC Bajard, N Meloni, T Plantard Advanced Signal Processing Algorithms, Architectures, and Implementations XV …, 2005 | 6 | 2005 |
Full hardware implementation of short addition chains recoding for ecc scalar multiplication J Proy, N Veyrat-Charvillon, A Tisserand, N Méloni Compas: Conférence d’informatique en Parallélisme, Architecture et Système, 2015 | 4 | 2015 |
High performance GHASH and impacts of a class of unconventional bases N Méloni, C Negre, MA Hasan Journal of Cryptographic Engineering 1 (3), 201-218, 2011 | 3 | 2011 |
An alternative approach to polynomial modular number system internal reduction N Méloni IEEE Transactions on Emerging Topics in Computing 10 (3), 1278-1288, 2022 | 2 | 2022 |