Michael Lee Scott
#185,314
Most Influential Person Now
Michael Lee Scott's AcademicInfluence.com Rankings
Michael Lee Scottcomputer-science Degrees
Computer Science
#11951
World Rank
#12721
Historical Rank
Database
#9036
World Rank
#9500
Historical Rank

Download Badge
Computer Science
Why Is Michael Lee Scott Influential?
(Suggest an Edit or Addition)Michael Lee Scott's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Efficient Algorithms for Pairing-Based Cryptosystems (2002) (1121)
- A Taxonomy of Pairing-Friendly Elliptic Curves (2010) (519)
- Efficient pairing computation on supersingular Abelian varieties (2007) (514)
- NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks (2008) (309)
- TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks (2008) (292)
- Constructing Elliptic Curves with Prescribed Embedding Degrees (2002) (271)
- On the Selection of Pairing-Friendly Groups (2003) (209)
- Computing the Tate Pairing (2005) (200)
- Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves (2009) (185)
- Implementing Cryptographic Pairings on Smartcards (2006) (185)
- Efficient Implementation of Pairing-Based Cryptosystems (2004) (173)
- Implementing Cryptographic Pairings over Barreto-Naehrig Curves (2007) (169)
- Constructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic Field (2008) (163)
- On the Final Exponentiation for Calculating Pairings on Ordinary Elliptic Curves (2009) (151)
- Implementing cryptographic pairings (2007) (127)
- Compressed Pairings (2004) (118)
- Secure Delegation of Elliptic-Curve Pairing (2010) (109)
- On the application of pairing based cryptography to wireless sensor networks (2009) (101)
- Generating More MNT Elliptic Curves (2006) (95)
- On the Efficient Implementation of Pairing-Based Protocols (2011) (94)
- Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions (2010) (93)
- Software Implementation of Pairings (2009) (88)
- Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints (2004) (69)
- Exponentiation in Pairing-Friendly Groups Using Homomorphisms (2008) (68)
- Fractal Based Image Steganography (1996) (64)
- Multiplication and Squaring on Pairing-Friendly Fields (2006) (62)
- Constructing Tower Extensions of Finite Fields for Implementation of Pairing-Based Cryptography (2010) (52)
- Optimizing Multiprecision Multiplication for Public Key Cryptography (2007) (51)
- Optimal Irreducible Polynomials for GF(2m) Arithmetic (2007) (49)
- Side Channel Analysis of Practical Pairing Implementations: Which Path Is More Secure? (2006) (43)
- Faster Pairings Using an Elliptic Curve with an Efficient Endomorphism (2005) (43)
- The Importance of the Final Exponentiation in Pairings When Considering Fault Attacks (2007) (41)
- Fast Hashing to G2 on Pairing-Friendly Curves (2009) (35)
- Accelerating SSL using the Vector processors in IBM's Cell Broadband Engine for Sony's Playstation 3 (2007) (33)
- Steganography: Its History and Its Application to Computer Based Data Files (1995) (25)
- FPGA acceleration of the tate pairing in characteristic 2 (2006) (23)
- An Embedded Processor for a Pairing-Based Cryptosystem (2006) (21)
- Scaling security in pairing-based protocols (2005) (19)
- Unbalancing Pairing-Based Key Exchange Protocols (2013) (19)
- PKCS #12: Personal Information Exchange Syntax v1.1 (2014) (18)
- Constructing Tower Extensions for the implementation of Pairing-Based Cryptography (2009) (18)
- Pairing Calculation on Supersingular Genus 2 Curves (2006) (18)
- Securing wireless sensor networks: an identity-based cryptography approach (2010) (16)
- Faster identity based encryption (2004) (16)
- A Note on the Implementation of the Number Theoretic Transform (2017) (15)
- Faster ECC over 픽2521-1 (2014) (12)
- Pairing Implementation Revisited (2019) (12)
- Missing a trick: Karatsuba variations (2017) (11)
- A New Family of Pairing-Friendly elliptic curves (2018) (10)
- Faster ECC over F 2 521 -1 (2015) (9)
- Hardware acceleration of the Tate pairing on a genus 2 hyperelliptic curve (2007) (9)
- Implementing cryptographic pairings: a magma tutorial (2009) (7)
- Faster ECC over \mathbb F_2^521-1 (2015) (6)
- On the Deployment of curve based cryptography for the Internet of Things (2020) (5)
- Cryptanalysis of a recent two factor authentication scheme (2012) (5)
- A note on group membership tests for $\G_1$, $\G_2$ and $\G_T$ on BLS pairing-friendly curves (2021) (5)
- A note on the calculation of some functions in finite fields: Tricks of the Trade (2020) (4)
- Replacing Username / Password with Software-Only Two-Factor Authentication (2012) (4)
- A Dedicated Processor for the eta Pairing (2005) (4)
- Designing a Code Generator for Pairing Based Cryptographic Functions (2010) (4)
- Slothful reduction (2017) (3)
- On a (Flawed) Proposal to Build More Pairing-Friendly Curves (2005) (2)
- Security of ID-based key exchange scheme (1998) (1)
- M-Pin : A Multi-Factor Zero Knowledge Authentication Protocol (2015) (1)
- Client-Server Multi-Factor Authentication Using Pairings (2012) (1)
- Client-Server Authentication Using Pairings (2012) (0)
- M-PIN FULL : Zero Knowledge two-Factor Authentication and Key Exchange (2016) (0)
- Optimal Ate Pairing (2016) (0)
- M-PIN: Zero-Knowledge two-factor authentication for digital identity (2015) (0)
- The Carnac protocol - or how to read the contents of a sealed envelope (2015) (0)
- On inversion modulo pseudo-Mersenne primes (2018) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Michael Lee Scott?
Michael Lee Scott is affiliated with the following schools: