Handbook of elliptic and hyperelliptic curve cryptography H Cohen, G Frey, R Avanzi, C Doche, T Lange, K Nguyen, F Vercauteren CRC press, 2005 | 1778 | 2005 |

Extended double-base number system with applications to elliptic curve cryptography C Doche, L Imbert Progress in Cryptology-INDOCRYPT 2006: 7th International Conference on …, 2006 | 115 | 2006 |

Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ... Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006 | 108 | 2006 |

Efficient scalar multiplication by isogeny decompositions C Doche, T Icart, DR Kohel International Workshop on Public Key Cryptography, 191-206, 2006 | 96 | 2006 |

Extending scalar multiplication using double bases R Avanzi, V Dimitrov, C Doche, F Sica Advances in Cryptology–ASIACRYPT 2006: 12th International Conference on the …, 2006 | 68 | 2006 |

Double-base number system for multi-scalar multiplications C Doche, DR Kohel, F Sica Annual International Conference on the Theory and Applications of …, 2009 | 66 | 2009 |

A tree-based approach for computing double-base chains C Doche, L Habsieger Australasian Conference on Information Security and Privacy, 433-446, 2008 | 54 | 2008 |

Elliptic curve cryptography point multiplication core for hardware security module MA Mehrabi, C Doche, A Jolfaei IEEE Transactions on Computers 69 (11), 1707-1718, 2020 | 48 | 2020 |

Arithmetic of elliptic curves C Doche, T Lange Handbook of Elliptic and Hyperelliptic Curve Cryptography, 267-302, 2006 | 34 | 2006 |

Redundant trinomials for finite fields of characteristic 2 C Doche Australasian Conference on Information Security and Privacy, 122-133, 2005 | 29 | 2005 |

Low-cost, low-power FPGA implementation of ED25519 and CURVE25519 point multiplication MA Mehrabi, C Doche Information 10 (9), 285, 2019 | 24 | 2019 |

Threshold verifiable multi‐secret sharing based on elliptic curves and Chinese remainder theorem M Sheikhi‐Garjan, M Bahramian, C Doche IET Information Security 13 (3), 278-284, 2019 | 24 | 2019 |

On the spectrum of the Zhang-Zagier height C Doche Mathematics of computation 70 (233), 419-430, 2001 | 18 | 2001 |

Moments of the Rudin–Shapiro polynomials C Doche, L Habsieger Journal of Fourier Analysis and Applications 10, 497-505, 2004 | 15 | 2004 |

Zhang-Zagier heights of perturbed polynomials C Doche Journal de théorie des nombres de Bordeaux 13 (1), 103-110, 2001 | 15 | 2001 |

On the enumeration of double-base chains with applications to elliptic curve cryptography C Doche Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014 | 12 | 2014 |

Equidistribution modulo 1 and Salem numbers C Doche, MM France, JJ Ruch Functiones et Approximatio Commentarii Mathematici 39 (2), 261-271, 2008 | 12 | 2008 |

Exponentiation C Doche Handbook of elliptic and hyperelliptic curve cryptography, 145-168, 2006 | 10 | 2006 |

Even moments of generalized Rudin–Shapiro polynomials C Doche Mathematics of computation 74 (252), 1923-1935, 2005 | 10 | 2005 |

Leadership and assessment: Strengthening the nexus S Fraser, M Harvey, R Beirman, S Cassidy, C Doche, S Eaton, ... Sydney: Australian Learning and Teaching Council, 2008 | 9 | 2008 |