default search action
Sheueling Chang Shantz
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2010
- [c14]Douglas Stebila, Poornaprajna Udupi, Sheueling Chang Shantz:
Multi-Factor Password-Authenticated Key Exchange. AISC 2010: 56-66
2000 – 2009
- 2008
- [j3]Hans Eberle, Nils Gura, Sheueling Chang Shantz, Vipul Gupta:
A cryptographic processor for arbitrary elliptic curves over GF(2m). Int. J. Embed. Syst. 3(4): 241-255 (2008) - [i1]Douglas Stebila, Poornaprajna Udupi, Sheueling Chang Shantz:
Multi-Factor Password-Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2008: 214 (2008) - 2005
- [j2]Hans Eberle, Sheueling Chang Shantz, Vipul Gupta, Nils Gura, Leonard Rarick, Lawrence Spracklen:
Accelerating Next-Generation Public-Key Cryptosystems on General-Purpose CPUs. IEEE Micro 25(2): 52-59 (2005) - [j1]Vipul Gupta, Michael Wurm, Yu Zhu, Matthew Millard, Stephen Fung, Nils Gura, Hans Eberle, Sheueling Chang Shantz:
Sizzle: A standards-based end-to-end security architecture for the embedded Internet. Pervasive Mob. Comput. 1(4): 425-445 (2005) - [c13]Hans Eberle, Arvinderpal Wander, Nils Gura, Sheueling Chang Shantz, Vipul Gupta:
Architectural Extensions for Elliptic Curve Cryptography over GF(2m) on 8-bit Microprocessors. ASAP 2005: 343-349 - [c12]Vipul Gupta, Matthew Millard, Stephen Fung, Yu Zhu, Nils Gura, Hans Eberle, Sheueling Chang Shantz:
Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper). PerCom 2005: 247-256 - [c11]Arvinderpal Wander, Nils Gura, Hans Eberle, Vipul Gupta, Sheueling Chang Shantz:
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks. PerCom 2005: 324-328 - 2004
- [c10]Hans Eberle, Nils Gura, Sheueling Chang Shantz, Vipul Gupta, Leonard Rarick, Shreyas Sundaram:
A Public-Key Cryptographic Processor for RSA and ECC. ASAP 2004: 98-110 - [c9]Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle, Sheueling Chang Shantz:
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. CHES 2004: 119-132 - [c8]Vipul Gupta, Douglas Stebila, Stephen Fung, Sheueling Chang Shantz, Nils Gura, Hans Eberle:
Speeding up Secure Web Transactions Using Elliptic Curve Cryptography. NDSS 2004 - [c7]Vipul Gupta, Douglas Stebila, Sheueling Chang Shantz:
Integrating elliptic curve cryptography into the web's security infrastructure. WWW (Alternate Track Papers & Posters) 2004: 402-403 - 2003
- [c6]André Weimerskirch, Douglas Stebila, Sheueling Chang Shantz:
Generic GF(2) Arithmetic in Software and Its Application to ECC. ACISP 2003: 79-92 - [c5]Hans Eberle, Nils Gura, Sheueling Chang Shantz:
A Cryptograhpic Processor for Arbitrary Elliptic Curves over. ASAP 2003: 444-454 - 2002
- [c4]Nils Gura, Hans Eberle, Sheueling Chang Shantz:
Generic implementations of elliptic curve cryptography using partial reduction. CCS 2002: 108-116 - [c3]Nils Gura, Sheueling Chang Shantz, Hans Eberle, Sumit Gupta, Vipul Gupta, Daniel F. Finchelstein, Edouard Goupy, Douglas Stebila:
An End-to-End Systems Approach to Elliptic Curve Cryptography. CHES 2002: 349-365 - [c2]Vipul Gupta, Sumit Gupta, Sheueling Chang Shantz, Douglas Stebila:
Performance analysis of elliptic curve cryptography for SSL. Workshop on Wireless Security 2002: 87-94 - 2001
- [c1]André Weimerskirch, Christof Paar, Sheueling Chang Shantz:
Elliptic Curve Cryptography on a Palm OS Device. ACISP 2001: 502-513
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint