Follow
Nicolas Méloni
Nicolas Méloni
Verified email at univ-tln.fr - Homepage
Title
Cited by
Cited by
Year
New point addition formulae for ECC applications
N Meloni
Arithmetic of Finite Fields: First International Workshop, WAIFI 2007 …, 2007
1372007
Block recombination approach for subquadratic space complexity binary field multiplication based on Toeplitz matrix-vector product
MA Hasan, N Meloni, AH Namin, C Negre
IEEE Transactions on Computers 61 (2), 151-163, 2010
492010
Efficient RNS bases for cryptography
JC Bajard, N Meloni, T Plantard
Proceedings of IMACS 2005 World Congress, Paris, France (July 2005), 2005
492005
SPA resistant elliptic curve cryptosystem using addition chains
A Byrne, F Crowe, WP Marnane, N Meloni, A Tisserand, E Popovici
International Journal of High Performance Systems Architecture 1 (2), 133-142, 2007
382007
Fast and secure elliptic curve scalar multiplication over prime fields using special addition chains
M Nicolas
Cryptology ePrint Archive, 2006
362006
Elliptic curve scalar multiplication combining Yao’s algorithm and double bases
N Méloni, MA Hasan
International Workshop on Cryptographic Hardware and Embedded Systems, 304-316, 2009
262009
Residue systems efficiency for modular products summation: Application to Elliptic Curves Cryptography
JC Bajard, S Duquesne, M Ercegovac, N Meloni
Advanced Signal Processing Algorithms, Architectures, and Implementations …, 2006
232006
Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve Cryptosystem.
A Byrne, N Meloni, A Tisserand, EM Popovici, WP Marnane
J. Comput. 2 (10), 52-62, 2007
212007
Arithmétique pour la Cryptographie basée sur les Courbes Elliptiques
N Méloni
These de Doctorat, Université Montpellier II, 2007
142007
Combining Montgomery ladder for elliptic curves defined over Fp and RNS representation
JC Bajard, S Duquenne, N Méloni
Research Report LIRMM 6041, 2006
142006
Random Euclidean addition chain generation and its application to point multiplication
F Herbaut, PY Liardet, N Méloni, Y Téglia, P Véron
Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010
132010
Efficient double bases for scalar multiplication
N Méloni, MA Hasan
IEEE Transactions on Computers 64 (8), 2204-2212, 2014
122014
Computer Arithmetic-Block Recombination Approach for Subquadratic Space Complexity Binary Field Multiplication Based on Toeplitz Matrix-Vector Product
MA Hasan, N Meloni, AH Namin, C Negre
IEEE Transactions on Computers 61 (2), 151, 2012
92012
Random digit representation of integers
N Méloni, MA Hasan
2016 IEEE 23nd Symposium on Computer Arithmetic (ARITH), 118-125, 2016
72016
Efficient RNS bases for Cryptography IMACS’05
JC Bajard, N Meloni, T Plantard
Applied Mathematics and Simulation, 2005
72005
High performance GHASH function for long messages
N Méloni, C Négre, MA Hasan
International Conference on Applied Cryptography and Network Security, 154-167, 2010
62010
Study of modular inversion in RNS
JC Bajard, N Meloni, T Plantard
Advanced Signal Processing Algorithms, Architectures, and Implementations XV …, 2005
62005
Full hardware implementation of short addition chains recoding for ecc scalar multiplication
J Proy, N Veyrat-Charvillon, A Tisserand, N Méloni
Compas: Conférence d’informatique en Parallélisme, Architecture et Système, 2015
42015
High performance GHASH and impacts of a class of unconventional bases
N Méloni, C Negre, MA Hasan
Journal of Cryptographic Engineering 1 (3), 201-218, 2011
32011
An alternative approach to polynomial modular number system internal reduction
N Méloni
IEEE Transactions on Emerging Topics in Computing 10 (3), 1278-1288, 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–20