


Publications (20022007)
Articles to appear
 O. Ahmadi,
"The trace spectra of polynomial bases for GF(2^n)",
Applicable Algebra in Engineering, Communication and Computing,
to appear.
 O. Ahmadi and I. Shparlinski,
"Geometric progressions in sumsets over finite fields",
Monatshefte fur Mathematik,
to appear.
 O. Ahmadi and I. Shparlinski,
"Distribution of matrices wth restricted entries over finite fields",
Indagationes Mathematicae,
to appear.
 O. Ahmadi and G. Vega,
"On the parity of the number of irreducible factors of selfreciprocal
polynomials over finite fields",
Finite Fields and Their Applications,
to appear.
 O. Ahmadi, D. Hankerson and F. RodriguezHenriquez,
"On parallel formulations of scalar multiplications on Koblitz curves",
Journal of Universal Computer Science,
to appear.
 O. Ahmadi, I. Shparlinski and J. Voloch,
"On multiplicative order of Gauss periods",
submitted.
 M. Bauer, M. Jacobson , Y. Lee and R. Scheidler,
"Construction of Hyperelliptic Function Fields of High ThreeRank",
Mathematics of Computation,
to appear.
 K. Cheng and H. Williams,
"Some Results Concerning Certain Continued Fractions",
Acta Arithmetica, to appear.
 I. Dechene,
"On the security of generalized Jacobian cryptosystems",
Advances in Mathematics of Communications,
to appear.
 K. Hoeper and G. Gong,
"Preventing or utilizing key escrow in identitybased schemes employed in
mobile ad hoc networks", International Journal of Security and Jetworks, to
appear.
 K. Hoeper and G. Gong,
"Bootstrapping security in mobile ad hoc networks using identitybased
schemes",
Security in Distributed and Networking Systems,
to appear.
 K. Hoeper and G. Gong,
"Preauthentication and authentication model in ad hoc networks",
Wireless/Mobile Network security,
to appear.
Technical Reports (2007)
 B. Ansari and M. Anwar Hasan,
"Revisiting finite field multiplication using Dickson bases", 2007.
 S. Flon, R. Oyono and C. Ritzenthaler,
"Fast addition on nonhyperelliptic genus 3 curves", 2007.
 D. Freeman, M. Scott and E. Teske,
"A taxonomy of pairingfriendly elliptic curves", 2007.
 X. Fan and G. Gong,
"Efficient explicit formulae for genus 2 hyperelliptic curves over prime
fields and their implementations", 2007.
 A. Menezes and B. Ustaoglu,
"Security arguments for the UM key agreement protocol in the NIST
SP 80056A standard", 2007.
 M. Nandi,
"Improved security analysis of OMAC", 2007.
 M. Nandi,
"A simple security analysis of hashCBC and a new efficient onekey online
cipher", 2007.
 M. Nandi and A. Mandal,
"An improved collision probability for CBCMAC and PMAC", 2007.
 M. Nandi and A. Mandal,
"Improved security analysis of PMAC", 2007.
 B. Ustaoglu,
"Obtaining a secure and efficient key agreement protocol from (H)MQV and
NAXOS", 2007.
Theses (2007)
 R. deGraaf, M.Sc., "Enhancing Firewalls" Conveying User and
Application Identification to Network Firewalls".
 N. Ebeid, Ph.D., "Power Analysis Attacks on Elliptic Curve
Cryptosystems and Key Randomization Countermeasures".
 J. Hinek, Ph.D., "On the Security of Some Variants of RSA".
 K. Hoeper, Ph.D., "Authentication and Key Exchange in Mobile Ad
Hoc Networks".
 Y. Nawaz, Ph.D., "Design of Stream Ciphers and Cryptographic
Properties of Nonlinear Functions".
 N. Sullivan, M.Sc., "Fast Algorithms for Arithmetic on Elliptic
Curves Over Prime Fields".
 T. Krivoruchko, M.Sc., "Robust CoercionResistant Registration for
Remote Electronic Voting".
 A. Silvester, M.Sc., "Fast and Unconditional Principal Ideal
Testing".
 K. Bergmann, M.Sc., "Cryptanalysis Using NatureInspired
Optimization Algorithms".
Articles in Refereed Publications (2007)
 O. Ahmadi and A. Menezes,
"Irreducible polynomials of maximum weight"
Utilitas Mathematica, 72 (2007), 111123.
 O. Ahmadi,
"On the distribution of irreducible trinomials over F3",
Finite Fields and Their Applications,
13 (2007), 659664.
 O. Ahmadi, D. Hankerson and A. Menezes,
"Formulas for cube roots in GF(3^m)",
Discrete Applied Mathematics,
155 (2007), 260170.
 R. de Haan, M. Jacobson and H. Williams,
"A Fast, Rigorous Technique for Computing the Regulator of a Real Quadratic
Field", Mathematics of Computation, 76 (2007), 21392160.
 M. Jacobson, R. Scheidler and A. Stein,
"Cryptographic protocols on real hyperelliptic curves",
Advances in Mathematics of Communications,
1 (2007), 197221.
 M. Jacobson, R. Scheidler and A. Stein,
"Fast arithmetic on hyperelliptic curves via continued fraction expansions",
Advances in Coding Theory and Cryptology,
2007, 201244.
 N. Koblitz and A. Menezes,
"Another look at `provable security'",
Journal of Cryptology,
20 (2007), 337.
 N. Koblitz and A. Menezes,
"Another look at generic groups",
Advances in Mathematics of Communications,
1 (2007), 1328.
 A. Menezes,
"Another Look at HMQV",
Journal of Mathematical Cryptology,
1 (2007), 4764.
 M. Nandi and D. Stinson,
"Multicollision attacks on a class of generalized hash functions",
IEEE Transactions on Information Theory,
53, 2007.
 R. Scheidler and A. Stein,
"Class number approximation in cubic function fields",
Contributions to Discrete Mathematics,
2 (2007), 107132.
 Q. Wu and R. Scheidler,
"An explicit treatment of biquadratic function fields",
Contributions to Discrete Mathematics,
2 (2007), 4360.
Articles in Refereed Conference Proceedings (2007)
 O. Ahmadi, D. Hankerson and A. Menezes,
"Software implementation of arithmetic in GF(3^m)",
Proceedings of WAIFI 2007, Lecture Notes in Computer Science, 4547
(2007), 85102.
 J. Aycock, M. Jacobson and R. Vogt,
"Army of botnets",
Proceedings of NDSS 2007, 111123.
 V. Dimitrov, K. Jarvinen, M. Jacobson, W. Chan and
Z. Huang, "FPGA implementation of point multiplication on Koblitz curves
using Kleinian integers,
 S. Erikson, M. Jacobson, N. Shang, S. Shen and A. Stein,
"Explicit formulas for real hyperelliptic curves of genus 2 in affine
representation",
Proceedings of WAIFI 2007, Lecture Notes in Computer Science, 4547
(2007), 202218.
 R. Granger, F. Hess, N. Theriault, Oyono and F. Vercauteren,
"Ate pairing on hyperelliptic curves",
Proceedings of EUROCRYPT 2007, Lecture Notes in Computer Science, 4515
(2007), 430447.
 P. Mishra and V. Dimitrov, "Efficient quintuple formulas
for elliptic curves and efficient scalar multiplication using multibase
number representation", Proceedings of ISC 2007,
Lecture Notes in Computer Science, 4779 (2007), 390406.
 P. Mishra, P. Pal and P. Sarkar, "Towards
minimizing memory requirement for implementation of hyperelliptic curve
cryptosystems", Proceedings of ISPEC 2007,
Lecture Notes in Computer Science, 4464 (2007), 269283.
 D. Stebila and N. Theriault,
"Unified point addition formulae and sidechannel attacks",
Proceedings of CHES 2006,
Lecture Notes in Computer Science, 4249 (2007), 354368.
Technical Reports (2006)
 R. Avanzi, N. Theriault and Z. Wang,
"Rethinking low genus hyperelliptic jacobian arithmetic over binary fields:
Interplay of field arithmetic and explicit formulae", 2006.
 J. Chung and A. Hasan,
"Montgomery reduction algorithm for modular multiplication using
lowweight polynomial form integers", 2006.
Theses (2006)
 O. Ahmadi, Ph.D., "Distribution of irreducible polynomials over
finite fields".
 J. Chou, M.Sc., "Point counting algorithms on elliptic curves".
 J. Chung, Ph.D., "Montgomery reduction algorithm for modular
multiplication based on lowweight polynomial form integers.
 A. Feldman, M.Math., "A survey of attacks on multivariate
cryptosystems".
 C. Foster, M.Sc., "Catalan's conjecture is true".
 K. Karabina, M. Math., "On PrimeOrder Elliptic Curves
with Embedding Degrees 3, 4 and 6".
 S. Ramachandran, M.Sc., "Numerical results on class groups of
imaginary quartic fields".
Articles in Refereed Publications (2006)
 O. Ahmadi,
"SelfReciprocal Irreducible Pentanomials over F2",
Designs, Codes and Cryptography,
38 (2006), 395397.
 J. Aycock, R. deGraaf and M. Jacobson,
"Antidisassembly using cryptographic hash functions",
Journal of Computer Virology, 2 (2006), 7985.
 R. Dahab, D. Hankerson, F. Hu, M. Long, J. Lopez and A. Menezes,
"Software multiplication using Gaussian normal bases",
IEEE Transactions on Computers,
55 (2006), 974984.
 M. Jacobson, R. Sawilla and H. Williams,
"Efficient ideal reduction in real quadratic fields",
International Journal of Mathematics and Computer Science,
1 (2006), 83116.
 M. Jacobson, R. Scheidler and H.C. Williams,
"An Improved Real Quadratic Field Based Key Exchange Procedure",
Journal of Cryptology, 19 (2006), 211239.
 A. Menezes and E. Teske,
"Cryptographic Implications of Hess' Generalized GHS Attack",
Applicable Algebra in Engineering, Communication and Computing,
16 (2006), 439460.
 E. Teske,
"An elliptic curve trapdoor system",
Journal of Cryptology,
19 (2006), 115133.
Articles in Refereed Conference Proceedings (2006)
 A. Antipa, D. Brown, R. Gallant, R. Lambert, R. Struik and
S. Vanstone,
"Accelerated Verification of ECDSA Signatures",
Selected Areas in Cryptography  SAC 2005, Lecture Notes in Computer
Science, 3897 (2006), 307318.
 D. Chang, K. Gupta and M. Nandi,
"RC4Hash: A new hash function based on RC4",
Progress in Cryptology  INDOCRYPT 2006, Springer LNCS 4329, 2006.
 D. Chang, M. Nandi and M. Yung,
"Indifferentiable security analysis of popular hash function with
prefixfree padding",
Advances in Cryptology  ASIACRYPT 2006, Springer LNCS, 2006.
 K. Hoeper and G. Gong,
"Key revocation for identitybased schemes in mobile ad hoc networks",
Proceedings of 5th International Conference on ADHOC Networks},
Lecture Notes in Computer Science,
4104 (2006), 224237.
 M. Jacobson, S. Ramachandran and H. Williams,
"Numerical results on class groups of imaginary quadratic fields",
Algorithmic Number Teory  ANTSVII,
Lecture Notes in Computer Science,
4076 (2006), 87101.
 N. Koblitz and A. Menezes,
"Another look at `provable security'. II'',
Progress in Cryptology  INDOCRYPT 2006, Springer LNCS 4329, 2006, pp. 148175.
 J. Lee and D. Stinson,
"TreeBased Key Distribution Patterns",
Selected Areas in Cryptography  SAC 2005, Lecture Notes in Computer
Science, 3897 (2006), 189204.
 A. Menezes and B. Ustaoglu,
"On the importance of publickey validation in the MQV and HMQV key
agreement protocols'',
Progress in Cryptology  INDOCRYPT 2006, Springer LNCS 4329, 2006, pp. 133147.
 M. Nandi,
"A simple and unified method of proving indistinguishability",
Progress in Cryptology  INDOCRYPT 2006, Springer LNCS 4329, 2006.
 N. Theriault,
"SPA Resistant LefttoRight Integer Recodings",
Selected Areas in Cryptography  SAC 2005, Lecture Notes in Computer
Science, 3897 (2006), 345358.
 K. Wooding and H. Williams,
"Doublyfocused enumeration of pseudosquares and pseudocubes",
Algorithmic Number Teory  ANTSVII,
Lecture Notes in Computer Science,
4076 (2006), 208221.
Technical Reports (2005)
 K. Hoeper and G. Gong,
Efficient Key Exchange Protocols for Wireless Networks and Mobile Devices",
2005.
 M. Jacobson, R. Scheidler and A. Stein,
"Faster Cryptographic Key Exchange on Hyperelliptic Curves", 2005.
 S. Jiang and G. Gong,
"Security of a ServerAssisted Group PasswordAuthenticated Key Exchange
Protocol", 2005.
Theses (2005)
 N. Alexander, M.Math., "Algebraic Tori in Cryptography".
 K. Giuliani, Ph.D., "Sequences Over Finite Fields and Elliptic
Curves Over Rings in Cryptography".
 G. Jain, M.Sc., "Security Aspects of Mobile IP".
 S. Jiang, Ph.D., "A Study on Security of MultiUser Systems
and Stream Ciphers".
 J. Lee, Ph.D., "Combinatorial Approaches to Key Predistribution for
Distributed Sensor Networks".
 M. MacKague, M.Math., "Design and Analysis of RC4Like Stream
Ciphers".
 J. Muir, Ph.D., "Efficient Integer Representations for
Cryptographic Operations".
 E. Ng, M.Math., "Security Models and Proofs for Key Establishment
Protocols".
 C. Smith, M.Math., "Digital Signcryption".
Articles in Refereed Publications (2005)
 O. Ahmadi and A. Menezes,
"On the Number of Traceone Elements in Polynomial Bases for GF(2n)",
Designs, Codes and Cryptography, 37 (2005), 493507.
 M. Bauer, E. Teske and A. Weng,
"Point Counting on Picard Curves in Large Characteristics",
Mathematics of Computation,
74 (2005), 19832005.
 S. Galbraith and A. Menezes,
"Algebraic Curves and Cryptography",
Finite Fields and Their Applications, 11 (2005), 544577.
 E. Teske and A. Stein,
"Optimized Baby StepGiant Step Methods",
The Journal of the Ramanujan Mathematical Society, 20 (2005), 2758.
Articles in Refereed Conference Proceedings (2005)
 V. Dimitrov, L. Imbert and P. Mishra,
"Efficient and Secure Elliptic Curve Point Multiplication Using
DoubleBase Chains",
Advances in Cryptology  ASIACRYPT 2005,
3788 (2005), 5978.
 R. de Graaf, J. Aycock and M. Jacobson,
"Port Knocking with Strong Authentication",
ACSAC 2005, IEEE Computer Society, 2005, 109418.
 A. Hirt and J. Aycock,
"Anonymous and Malicious",
Virus Bulletin Conference, 2005, 28.
 A. Hirt, M. Jacobson and C. Williamson,
"A Practical Buses Protocol for Anonymous Network Communication",
Third Annual Conference on Privacy and Trust, 2005, 233236.
 N. Koblitz and A. Menezes,
"PairingBased Cryptography at High Security Levels",
Proceedings of the Tenth IMA International Conference on Cryptography and
Coding, Lecture Notes in Computer Science, 3796 (2005), 1336.
Articles in Refereed Publications (2004)
 K. Fong, D. Hankerson, J. Lopez and A. Menezes,
"Field Inversion and Point Halving Revisited",
IEEE Transactions on Computers, 53 (2004), 10471059.
 D. Hankerson, A. Menezes and S. Vanstone, Guide to Elliptic Curve
Cryptography, SpringerVerlag, 2004.
 M. Jacobson, A. Menezes, and A. Stein,
"Hyperelliptic Curves and Cryptography",
High Primes and Misdemeanors  Lectures in Honour of the
60th Birthday of Hugh Cowie Williams, Fields Institute Communications
Series, 41 (2004), 255282.
 N. Koblitz and A. Menezes,
"A Survey of Publickey Cryptosystems",
SIAM Review, 46 (2004), 599634.
 H. Koblitz and A. Menezes,
"Obstacles to the Torsionsubgroup Attack on the Decision DiffieHellman
Problem",
Mathematics of Computation, 73 (2004), 20272041.
 A. Menezes and N. Smart,
"Security of Signature Schemes in a Multiuser Setting",
Designs, Codes and Cryptography, 33 (2004), 261274.
 R.A. Mollin,
"A Continued Fraction Approach to the Diophantine Equation ax2by2=+1",
Journal of Algebra, Number Theory and Applications, 4 (2004), 159207.
 S. Mueller,
"On the Computation of Square Roots in Finite Fields",
Designs, Codes, and Cryptography,
31 (2004), 301312.
 S. Mueller,
"On the Computation of Cube Roots Modulo p",
High Primes and Misdemeanours  Lectures in Honour of the 60th Birthday
of Hugh Cowie Williams, Fields Institute Communications Series,
41 (2004), 293304.
 R. Patterson and A.J. van der Poorten,
"Jeepers, Creepers",
High Primes and Misdemeanours  Lectures in Honour of the 60th Birthday of
Hugh Cowie Williams, Fields Institute Communications Series,
41 (2004), 305316.
 E. Teske,
"An Elliptic Curve Trapdoor System",
High Primes and Misdemeanours  Lectures in Honour of the 60th Birthday of
Hugh Cowie Williams, Fields Institute Communications Series,
41 (2004), 341352.
Articles in Refereed Conference Proceedings (2004)
 P. Berrizbeitia, S. Mueller and H.C. Williams,
"Pseudocubes and Primality Testing",
Proceedings of Algorithmic Number Theory, Sixth International
Symposium, ANTS6, Lecture Notes in Computer Science 3076 (2004), 102116.
 K. Giuliani and G. Gong,
"Efficient Key Agreement and Signature Schemes Using Compact Representation
in $GF(p^{10})$", IEEE International Symposium on Information Theory,
June 28  July 2, 2004, Chicago, IL. 1313.
 K. Giuliani and G. Gong,
"New LFSRBased Cryptosystems and the Trace Discrete Logarithm Problem",
The Third International Conference on Sequences and Their Applications 
SETA'04.
 M. Jacobson,
"The Security of Cryptosystems Based on Class Semigroups of Imaginary
Quadratic Nonmaximal Orders",
Proceedings of ACISP 2004, Lecture Notes in Computer Science 3108 (2004),
149156.
 M. Jacobson, H. C. Williams, K. Wooding,
"Imaginary Cyclic Quartic Fields with Large Minus Class Numbers",
Proceedings of Algorithmic Number Theory, Sixth International Symposium,
ANTS6, Lecture Notes in Computer Science 3076 (2004), 280292.
 S. Jiang and G. Gong,
"Multiservice Oriented Broadcast Encryption", Australian Conference on
Information Security and Privacy, Lecture Notes in Computer Science,
3108 (2004), 112.
 C. Lam and Guang Gong,
"A Lower Bound for the Linear Span of Filtering Sequences",
Proceedings of the Conference on State of the Art of Stream Ciphers,
Brugge, Belgium, pp. 220233, 2004.
 A. Menezes, E. Teske and A. Weng,
"Weak fields for ECC",
Topics in Cryptology CTRSA 04, Lecture Notes in Computer Science,
2964 (2004), 366386.
 R. Scheidler,
"An Algorithmic Perspective of Cubic Function Fields",
Proceedings of Algorithmic Number Theory, Sixth International
Symposium, ANTS6, Lecture Notes in Computer Science 3076 (2004), 395410.
Articles in Refereed Publications (2003)
 D. Brown and A. Menezes, "A small subgroup attack on a key agreement
protocol of Arazi", Bulletin of the ICA, 37 (2003), 4550.
 J. Huhnlein, M. Jacobson, and D. Weber, "Towards Practical Noninteractive
Publickey Cryptosystems Using Nonmaximal Imaginary Quadratic Orders",
Designs, Codes, and Cryptography, vol. 30 (2003), No. 3, pp.281299.
 M. Jacobson, Jr., A. Pinter, and P. Walsh, "A Computational Approach for
Solving y2 = 1k + 2k +... + xk", Math. Comp. 72 (2003), no. 244, 20992110.
 L. Law, A. Menezes, M. Qu, J. Solinas and S. Vanstone, "An efficient
protocol for authenticated key agreement", Designs Codes and Cryptography,
28 (2003), 119134.
 Y. Lee, R. Scheidler and C. Yarrish,
"Computation of the Fundamental Units and the Regulator of a Cyclic
Cubic Function Field",
Experimental Mathematics 12 (2003), 211225.
 S. Mueller, "A Probable Prime Test with Very High Confidence for
n=3 mod 4", J. Cryptology, vol. 16, no. 2, 2003, pp. 117139.
 H. te Riele and H. Williams, "New Computations Concerning the
CohenLenstra Heuristics", Experimental Mathematics, 12(2003), 99113.
 E. Teske, "Computing discrete logarithms with the parallelized kangaroo
method", Discrete Applied Mathematics, 130 (2003), 6182.
Articles in Refereed Conference Proceedings (2003)
 A. Antipa, D. Brown, A. Menezes, R. Struik and S. Vanstone, "Validation of
elliptic curve public keys", Proceedings of PKC 2003, Lecture Notes in
Computer Science, 2567 (2003), 211223.
 M. Bauer and S. Hamdy,
"On Class Group Computations Using the Number Field Sieve",
Advances in CryptologyASIACRYPT 2003, Springer LNCS 2894, 2003, pp. 311325.
 G. Gong and K. Khoo,
"Additive Autocorrelation of Resilient Boolean Functions",
Proceedings of Tenth Annual Workshop on Selected Areas in Cryptography, 2003.
 G. Gong and S. Jiang,
"The Editing Generators and its Cryptanalysis",
Annual International Workshop on Cryptology and Network Security,
2003, 673678.
 J. Hinek, M. Low and E. Teske, "On some attacks on multiprime RSA",
Proceedings of SAC 2002, Lecture Notes in Computer Science, 2595 (2003),
385404.
Articles in Refereed Publications (2002)
 C. Blundo, B. Masucci, D. Stinson and R. Wei, Constructions and
bounds for unconditionally secure noninteractive commitment schemes,
Designs, Codes and Cryptography, 26 (2002), 97110.
 C. Carlet and P. Sarkar, Spectral Domain Analysis of Correlation
Immune and Resilient Boolean Functions, Finite Fields and their
Applications, 8(1) (2002), 120130.
 P. Eisen and D. Stinson, Threshold visual cryptography schemes with
specified whiteness levels of reconstructed pixels, Designs, Codes and
Cryptography, 25 (2002), 1561.
 L. Encinas, J. Masque and A. Menezes. Isomorphism classes of
genus2 hyperelliptic curves over finite fields, Applicable Algebra in
Engineering, Communication and Computing, 13 (2002), 5765.
 G. Gong, "New Designs for Signal Sets with Low Crosscorrelation, Balance
Property and Large Linear Span: GF(p) Case", IEEE Trans. on Inform. Theory,
vol.48, no.11, November 2002, pp. 28472867.
 G. Gong and A. Youssef, "Cryptographic Properties of the WelchGong
Transformation Sequence Generators", IEEE Trans. on Inform. Theory, vol.48,
no.11, November 2002, pp. 28372846.
 T. Helleseth and G. Gong, "New Nonbinary Sequences with Ideal Twolevel
Autocorrelation Functions", IEEE Trans. on Inform. Theory, vol.48, no.11,
November 2002, pp. 28682872.
 M. Jacobson and H. Williams, "New Quadratic Polynomials with High
Densities of Prime Values", Math. Comp., vol. 72, 2002, pp. 499519.
 M. Jacobson and H. Williams, "Modular Arithmetic on Elements of Small Norm
in Quadratic Orders", Designs, Codes and Cryptography, vol. 27, 2002, pp.
93110.
 S. Magliveras, D. Stinson and T. van Trung, New approaches to
designing public key cryptosystems using oneway functions and trapdoors in
finite groups, Journal of Cryptology, 15 (2002), 285297.
 S. Maitra and P. Sarkar, Cryptographic Modifications of
PattersonWeidemann Functions, IEEE Transactions on Information Theory,
48(1) (2002), 278284.
 F. Saidak,
"An Elementary Proof of a Theorem of Delange",
Comptes Rendus (Canada), 24 (2002), 144151.
 P. Sarkar and S. Maitra, CrossCorrelation Analysis of
Cryptographically Useful Boolean Functions and SBoxes, Theory of Computing
Systems, 31(1) (2002), 3957.
 A. Stein and E. Teske, The parallelized Pollard kangaroo method in
real quadratic function fields, Mathematics of Computation, 71 (2002),
793814.
 A. Stein and E. Teske, Explicit bounds and heuristics on class
numbers in hyperelliptic function fields, Mathematics of Computation, 71
(2002), 837861.
Articles in Refereed Conference Proceedings (2002)
 D. Brown, R. Gallant and S. Vanstone, Provably secure implicit
certificates schemes, Proceedings of Financial Cryptography 2001, Lecture
Notes in Computer Science, 2339 (2002), 178195.
 C. Blundo, P. D'Arco, A. de Santis and D. Stinson, New results on
unconditionally secure distributed oblivious transfer, Proceedings of SAC
2002, Lecture Notes in Computer Science, 2002.
 P. D'Arco and D. Stinson, On unconditionally secure robust
distributed key distribution centers, Proceedings of ASIACRYPT 2002,
Lecture Notes in Computer Science, 2002.
 P. Ebinger and E. Teske, Factoring N=pq2 with the elliptic curve
method, Proceedings of ANTS V, Lecture Notes in Computer Science, 2369
(2002), 475490.

