Citation indices
 AllSince 2009
Citations89314734
h-index4733
i10-index9679
Citations to my articles
Citations to my articles
Show: 1-20Next >
Title / AuthorCited by Year
Elliptic curves in cryptography
IF Blake, G Seroussi, NP Smart
Cambridge Univ Pr
15821999
Identity-based authenticated key agreement protocol based on Weil pairing
NP Smart
Electronics Letters 38 (13), 630-632
4662002
Advances in elliptic curve cryptography
IF Blake, G Seroussi, NP Smart
Cambridge Univ Pr
4062005
The Eta pairing revisited
F Hess, NP Smart, F Vercauteren
Information Theory, IEEE Transactions on 52 (10), 4595-4602
3402006
Pairings for cryptographers
SD Galbraith, KG Paterson, NP Smart
Discrete Applied Mathematics 156 (16), 3113-3121
3362008
The discrete logarithm problem on elliptic curves of trace one
NP Smart
Journal of cryptology 12 (3), 193-196
3131999
Constructive and destructive facets of Weil descent on elliptic curves
P Gaudry, F Hess, NP Smart
Journal of Cryptology 15 (1), 19-46
3122002
Fully homomorphic encryption with relatively small key and ciphertext sizes
N Smart, F Vercauteren
Public Key Cryptography–PKC 2010, 420-443
2722010
Identity-based key agreement protocols from pairings
L Chen, Z Cheng, NP Smart
International Journal of Information Security 6 (4), 213-241
2702007
Preventing SPA/DPA in ECC systems using the Jacobi form
P Liardet, N Smart
Cryptographic Hardware and Embedded Systems—CHES 2001, 391-401
1802001
Secure two-party computation is practical
B Pinkas, T Schneider, N Smart, S Williams
Advances in Cryptology–ASIACRYPT 2009, 250-267
1652009
The algorithmic resolution of Diophantine equations
NP Smart
Cambridge Univ Pr
1631998
Applications of multiple trust authorities in pairing based cryptosystems
L Chen, K Harrison, D Soldera, N Smart
Infrastructure Security, 260-275
1532002
Cryptography: an introduction
NP Smart
McGraw-Hill
1512003
Lattice attacks on digital signature schemes
NA Howgrave-Graham, NP Smart
Designs, Codes and Cryptography 23 (3), 283-290
1252001
Generic constructions of identity-based and certificateless KEMs
K Bentahar, P Farshim, J Malone-Lee, NP Smart
Journal of Cryptology 21 (2), 178-199
1232008
Extending the GHS Weil descent attack
S Galbraith, F Hess, N Smart
Advances in Cryptology—EUROCRYPT 2002, 29-44
1002002
The Hessian form of an elliptic curve
N Smart
Cryptographic Hardware and Embedded Systems—CHES 2001, 118-125
992001
A cryptographic application of Weil descent
S Galbraith⋆, N Smart
Cryptography and coding, 799-799
961999
Fully Homomorphic Encryption with Polylog Overhead
C Gentry, S Halevi, NP Smart
Advances in Cryptology - EUROCRYPT, 2012
952012
Show: 1-20Next >
Dates and citation counts are estimated and are determined automatically by a computer program.
©2013 Google - About Google Scholar - All About Google - Provide feedback - My Citations