Damgård, I. B., Keller, M., Keller, E., Miles, C. & Smart, N. P. (2012).
Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol.
Lecture Notes in Computer Science,
7485, 241-263.
https://doi.org/10.1007/978-3-642-32928-9_14
Faust, S., Hazay, C.
, Nielsen, J. B., Nordholt, P. S. & Zottarel, A. (2012).
Signature Schemes Secure against Hard-to-Invert Leakage.
Lecture Notes in Computer Science,
7658, 98-115.
https://doi.org/10.1007/978-3-642-34961-4_8
Choudhury, A.
, Patra, A., Ashwinkumar, B. V., Srinathan, K. & Pandu Rangan, C. (2011).
Secure message transmission in asynchronous networks.
Journal of Parallel and Distributed Computing,
71(8), 1067-1074.
https://doi.org/10.1016/j.jpdc.2011.03.004
Oliveira, L. B., Kansal, A., Gouvea, C. P. L.
, Aranha, D. F., Lopez, J., Priyantha, B., Goraczko, M. & Zhao, F. (2011).
Secure-TWS: Authenticating Node to Multi-user Communication in Shared Sensor Networks.
The Computer Journal,
55(4), 384-396.
https://doi.org/10.1093/comjnl/bxr089
Taverne, J., Faz-Hernandez, A.
, Aranha, D. F., Rodriguez-henriquez, F., Hankerson, D. & Lopez, J. (2011).
Software Implementation of Binary Elliptic Curves: Impact of the Carry-Less Multiplier on Scalar Multiplication. In B. Preneel & T. Takagi (Eds.),
Cryptographic Hardware and Embedded Systems – CHES 2011 (pp. 108-123). Springer.
https://doi.org/10.1007/978-3-642-23951-9_8
Taverne, J., Faz-Hernandez, A.
, Aranha, D. F., Rodriguez-henriquez, F., Hankerson, D. & Lopez, J. (2011).
Speeding scalar multiplication over binary elliptic curves using the new carry-less multiplication instruction.
Journal of Cryptographic Engineering,
1, 187-199.
https://doi.org/10.1007/s13389-011-0017-8