Alfred J Menezes


Ontology type: schema:Person     


Person Info

NAME

Alfred J

SURNAME

Menezes

Publications in SciGraph latest 50 shown

  • 2021-03-28 Elliptic Curve Key Agreement Schemes in ENCYCLOPEDIA OF CRYPTOGRAPHY, SECURITY AND PRIVACY
  • 2021-03-28 Koblitz Elliptic Curves in ENCYCLOPEDIA OF CRYPTOGRAPHY, SECURITY AND PRIVACY
  • 2021-03-28 Elliptic Curve Keys in ENCYCLOPEDIA OF CRYPTOGRAPHY, SECURITY AND PRIVACY
  • 2021-03-28 Elliptic Curve Signature Schemes in ENCYCLOPEDIA OF CRYPTOGRAPHY, SECURITY AND PRIVACY
  • 2021-03-28 NIST Elliptic Curves in ENCYCLOPEDIA OF CRYPTOGRAPHY, SECURITY AND PRIVACY
  • 2021-03-17 Elliptic Curves in ENCYCLOPEDIA OF CRYPTOGRAPHY, SECURITY AND PRIVACY
  • 2021-03-17 Elliptic Curve Discrete Logarithm Problem in ENCYCLOPEDIA OF CRYPTOGRAPHY, SECURITY AND PRIVACY
  • 2021-02-05 Elliptic Curve Point Multiplication Using Halving in ENCYCLOPEDIA OF CRYPTOGRAPHY, SECURITY AND PRIVACY
  • 2021-01-28 Elliptic Curve Cryptography in ENCYCLOPEDIA OF CRYPTOGRAPHY, SECURITY AND PRIVACY
  • 2021-01-06 Pairings in ENCYCLOPEDIA OF CRYPTOGRAPHY, SECURITY AND PRIVACY
  • 2019-01-13 On the Cost of Computing Isogenies Between Supersingular Elliptic Curves in SELECTED AREAS IN CRYPTOGRAPHY – SAC 2018
  • 2017-07-14 Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-Based Cryptography in PARADIGMS IN CRYPTOLOGY – MYCRYPT 2016. MALICIOUS AND EXPLORATORY CRYPTOLOGY
  • 2017-07-14 Another Look at Tightness II: Practical Issues in Cryptography in PARADIGMS IN CRYPTOLOGY – MYCRYPT 2016. MALICIOUS AND EXPLORATORY CRYPTOLOGY
  • 2015-11-23 Cryptocash, cryptocurrencies, and cryptocontracts in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2015-07-08 Guest Editorial: Special Issue in Honor of Scott A. Vanstone in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2015-05-13 The random oracle model: a twenty-year retrospective in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2015-02-22 Computing Discrete Logarithms in and Using Magma in ARITHMETIC OF FINITE FIELDS
  • 2015 Type 2 Structure-Preserving Signature Schemes Revisited in ADVANCES IN CRYPTOLOGY -- ASIACRYPT 2015
  • 2014-11-10 Another Look at Security Theorems for 1-Key Nested MACs in OPEN PROBLEMS IN MATHEMATICS AND COMPUTATIONAL SCIENCE
  • 2014 Weakness of for Discrete Logarithm Cryptography in PAIRING-BASED CRYPTOGRAPHY – PAIRING 2013
  • 2013 Implementing Pairings at the 192-Bit Security Level in PAIRING-BASED CRYPTOGRAPHY – PAIRING 2012
  • 2012 Another Look at Provable Security in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2012
  • 2012 Another Look at Tightness in SELECTED AREAS IN CRYPTOGRAPHY
  • 2011 Elliptic Curve Point Multiplication Using Halving in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Elliptic Curve Cryptography in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Pairings in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Elliptic Curve Signature Schemes in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Elliptic Curve Keys in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 NSA Suite B in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 NIST Elliptic Curves in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Elliptic Curve Key Agreement Schemes in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Elliptic Curves in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 ECC Challenges in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 A Generic Variant of NIST’s KAS2 Key Agreement Protocol in INFORMATION SECURITY AND PRIVACY
  • 2011 Parallelizing the Weil and Tate Pairings in CRYPTOGRAPHY AND CODING
  • 2011 Elliptic Curve Public-Key Encryption Schemes in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Koblitz Elliptic Curves in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Elliptic Curve Discrete Logarithm Problem in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2010 Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols in PROGRESS IN CRYPTOLOGY - INDOCRYPT 2010
  • 2010 On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings in ARITHMETIC OF FINITE FIELDS
  • 2009-10-16 Comparing two pairing-based aggregate signature schemes in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2009 A New Protocol for the Nearby Friend Problem in CRYPTOGRAPHY AND CODING
  • 2009 Reusing Static Keys in Key Agreement Protocols in PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009
  • 2008-01-01 Comparing the Pre- and Post-specified Peer Models for Key Agreement in INFORMATION SECURITY AND PRIVACY
  • 2008 The Elliptic Curve Discrete Logarithm Problem: State of the Art in ADVANCES IN INFORMATION AND COMPUTER SECURITY
  • 2007-01-01 Software Implementation of Arithmetic in in ARITHMETIC OF FINITE FIELDS
  • 2007-01-01 Supersingular Elliptic Curves in Cryptography in PAIRING-BASED CRYPTOGRAPHY – PAIRING 2007
  • 2006 On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols in PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006
  • 2006 Another Look at “Provable Security”. II in PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006
  • 2005-12 On the Number of Trace-One Elements in Polynomial Bases for in DESIGNS, CODES AND CRYPTOGRAPHY
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "affiliation": [
          {
            "affiliation": {
              "id": "http://www.grid.ac/institutes/grid.46078.3d", 
              "type": "Organization"
            }, 
            "isCurrent": true, 
            "type": "OrganizationRole"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.252546.2", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.439950.2", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.39591.37", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.451163.4", 
            "type": "Organization"
          }
        ], 
        "familyName": "Menezes", 
        "givenName": "Alfred J", 
        "id": "sg:person.012711653371.43", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012711653371.43"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2022-12-01T07:14", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/person/person_933.jsonl", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.012711653371.43'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.012711653371.43'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.012711653371.43'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.012711653371.43'


     




    Preview window. Press ESC to close (or click here)


    ...