On the computation of the optimal ate pairing at the 192-bit security level L Ghammam, E Fouotsa Cryptology ePrint Archive, 2016 | 24 | 2016 |
A new attack on RSA and Demytko’s elliptic curve cryptosystem A Nitaj, E Fouotsa Journal of Discrete Mathematical Sciences and Cryptography 22 (3), 391-409, 2019 | 21 | 2019 |
Optimal Ate Pairing on Elliptic Curves with Embedding Degree and E Fouotsa, N El Mrabet, A Pecha Journal of groups, complexity, cryptology 12, 2020 | 20 | 2020 |
Tate pairing computation on Jacobi’s elliptic curves S Duquesne, E Fouotsa Pairing-Based Cryptography–Pairing 2012: 5th International Conference …, 2013 | 15 | 2013 |
Parallelizing pairings on Hessian elliptic curves E Fouotsa Arab Journal of Mathematical Sciences 25 (1), 29-42, 2019 | 11 | 2019 |
Efficient computation of pairings on Jacobi quartic elliptic curves S Duquesne, N El Mrabet, E Fouotsa Journal of Mathematical Cryptology 8 (4), 331-362, 2014 | 11* | 2014 |
Isogenies on twisted Hessian curves FL Perez Broon, T Dang, E Fouotsa, D Moody Journal of mathematical cryptology 15 (1), 345-358, 2021 | 10 | 2021 |
Adequate Elliptic Curves for Computing the Product of n Pairings L Ghammam, E Fouotsa International workshop on the arithmetic of finite fields, 36-53, 2016 | 10 | 2016 |
Computing the optimal ate pairing over elliptic curves with embedding degrees 54 and 48 at the 256-bit security level NB Mbiang, DDF Aranha, E Fouotsa International Journal of Applied Cryptography 4 (1), 45-59, 2020 | 9 | 2020 |
Improving the computation of the optimal ate pairing for a high security level L Ghammam, E Fouotsa Journal of Applied Mathematics and Computing 59 (1), 21-36, 2019 | 9 | 2019 |
Arithmetic of the level four theta model of elliptic curves O Diao, E Fouotsa Afrika Matematika 26 (3), 283-301, 2015 | 7 | 2015 |
Beta Weil pairing revisited E Fouotsa, A Pecha, N El Mrabet Afrika Matematika 30 (3), 371-388, 2019 | 6 | 2019 |
A theta model for elliptic curves E Fouotsa, O Diao Mediterranean Journal of Mathematics 14 (2), 65, 2017 | 5 | 2017 |
Failure of the point blinding countermeasure against fault attack in pairing-based cryptography N El Mrabet, E Fouotsa International Conference on Codes, Cryptology, and Information Security, 259-273, 2015 | 5 | 2015 |
Generalization of low rank parity-check (LRPC) codes over the ring of integers modulo a positive integer FR Kamwa Djomou, H Talé Kalachi, E Fouotsa Arabian Journal of Mathematics 10 (2), 357-366, 2021 | 4 | 2021 |
Analogue of Vélu's Formulas for Computing Isogenies over Hessian Model of Elliptic Curves FLP Broon, E Fouotsa Cryptology ePrint Archive, 2019 | 4 | 2019 |
Edwards model of elliptic curves defined over any fields. O Diao, E Fouotsa IACR Cryptol. ePrint Arch. 2012, 346, 2012 | 4 | 2012 |
Calcul des couplages et arithmetique des courbes elliptiques pour la cryptographie E Fouotsa Rennes 1, 2013 | 3 | 2013 |
Low-rank parity-check codes over finite commutative rings HT Kamche, HT Kalachi, FRK Djomou, E Fouotsa Applicable Algebra in Engineering, Communication and Computing, 1-27, 2024 | 2 | 2024 |
x-superoptimal pairings on elliptic curves with odd prime embedding degrees: BW13-P310 and BW19-P286 E Fouotsa, LA Guimagang, R Ayissi Applicable Algebra in Engineering, Communication and Computing, 1-19, 2023 | 2 | 2023 |