Projects per year

## Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

- 1 Similar Profiles

##
Network
Recent external collaboration on country level. Dive into details by clicking on the dots.

## Projects 2006 2021

## AntiPort - Educating the Public on the risks and prevention of Mobile Number Porting Scams

Trueck, S., Selby, J., Doche, C. & Boyd, M.

1/02/19 → 31/12/20

Project: Research

## Privacy-Preserving Online User Matching

Doche, C., Yi, X., Khalil, I. & Bertino, E.

8/03/18 → 7/03/21

Project: Research

## Optus Macquarie University Cyber Security Hub

Doche, C., Alazab, M., Hitchens, M., Johnson, M., Leung, P., McIver, A., Schreer, B., Selvadurai, R., Sheng, Q., Shevchenko, P., Tran, H., Trueck, S., Wiggins, M., Worner, J. & Yang, J.

2/12/16 → …

Project: Research

## Linear recurrence sequences over function fields and their applications in cryptography

27/06/16 → …

Project: Research

## Research Output 2000 2014

## A strong lightweight authentication protocol for low-cost RFID systems

Shi, Z., Pieprzyk, J., Doche, C., Xia, Y., Zhang, Y. & Dai, J., 2014, In : International Journal of Security and its Applications. 8, 6, p. 225-234 10 p.Research output: Contribution to journal › Article › Research › peer-review

## Faster repeated doublings on binary elliptic curves

Doche, C. & Sutantyo, D., 2014,*Selected Areas in Cryptography, SAC 2013 - 20th International Conference, Revised Selected Papers.*Lange, T., Lauter, K. & Lisoněk, P. (eds.). Heidelberg: Springer, Springer Nature, Vol. 8282 LNCS. p. 456-470 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8282 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference proceeding contribution › Research › peer-review

## New and improved methods to analyze and compute double-scalar multiplications

Doche, C. & Sutantyo, D., Jan 2014, In : IEEE Transactions on Computers. 63, 1, p. 230-242 13 p., 6256663.Research output: Contribution to journal › Article › Research › peer-review

## On the enumeration of double-base chains with applications to elliptic curve cryptography

Doche, C., Dec 2014,*Advances in Cryptology - ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I.*Sarkar, P. & Iwata, T. (eds.). Berlin; New York: Springer, Springer Nature, p. 297-316 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8873).

Research output: Chapter in Book/Report/Conference proceeding › Conference proceeding contribution › Research › peer-review

## Algorithms

Doche, C., 1 Jan 2013,*Handbook of finite fields.*Mullen, G. L. & Panario, D. (eds.). CRC Press, Taylor & Francis Group, p. 345-404 60 p. (Discrete mathematics and its applications).

Research output: Chapter in Book/Report/Conference proceeding › Chapter › Research › peer-review