|Born||Alfred J. Menezes|
1965 (age 52–53) 
|Known for||MOV attack on ECC|
MQV key agreement, co-founder of Centre for Applied Cryptographic Research
|Alma mater||University of Waterloo (B.Math, 1987; M.Math, 1989; Ph.D., 1992)|
|Doctoral advisor||Scott Vanstone|
|Institutions||University of Waterloo|
Alfred Menezes' family is from Goa, a state in western India, but he was born in Tanzania and grew up in Kuwait except for a few years at a boarding school in India. His undergraduate and post-graduate degrees are from the University of Waterloo.:302
After five years teaching at Auburn University, in 1997 he returned to the University of Waterloo, where he is now a professor of mathematics in the Department of Combinatorics and Optimization. He co-founded and is a member of the Centre for Applied Cryptographic Research, and has served as its Managing Director. Menezes' main areas of research are Elliptic Curve Cryptography (ECC), provable security, and related areas. He is a Canadian citizen.
Menezes' book Elliptic Curve Public Key Cryptosystems, published in 1993, was the first book devoted entirely to ECC. He co-authored the widely-used reference book Handbook of Applied Cryptography. Menezes has been a conference organizer or program committee member for approximately fifty conferences on Cryptography. He was Program Chair for Crypto 2007, and in 2012 he was an invited speaker at Eurocrypt.
- Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone (1996). Handbook of Applied Cryptography. CRC Press. ISBN 0-8493-8523-7.
- Hankerson, D.; Vanstone, S.; Menezes, A. (2004). Guide to Elliptic Curve Cryptography. Springer Professional Computing. New York: Springer. doi:10.1007/b97644. ISBN 0-387-95273-X.
- Alfred J. Menezes (1993). Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers. ISBN 0-7923-9368-6.
- Alfred Menezes, Ian Blake, Shuhong Gao, Ron Mullin, Scott Vanstone, and Tomik Yaghoobian (1993). Applications of Finite Fields. Kluwer Academic Publishers. ISBN 0-7923-9282-5.
- "Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields" (with G. Adj, I. Canales-Martinez, N. Cruz-Cortes, T. Oliveira, L. Rivera-Zamarripa and F. Rodriguez-Henriquez), Cryptology ePrint Archive: Report 2016/914. https://eprint.iacr.org/2016/914
- "Another look at tightness II: Practical issues in cryptography" (with S. Chatterjee, N. Koblitz and P. Sarkar), Mycrypt 2016, Lecture Notes in Computer Science, 10311 (2017), 21-55. https://doi.org/10.1007/978-3-319-61273-7_3
- "Another look at HMAC" (with N. Koblitz), Journal of Mathematical Cryptology, 7 (2013), 225-251. https://doi.org/10.1515/jmc-2013-5004
- "Elliptic curve cryptography: The serpentine course of a paradigm shift" (with A. H. Koblitz and N. Koblitz), Journal of Number Theory, 131 (2011), 781-814. https://doi.org/10.1016/j.jnt.2009.01.006
- "Another look at `provable security'" (with N. Koblitz), Journal of Cryptology, 20 (2007), 3-37. https://doi.org/10.1007/s00145-005-0432-z
- "An efficient protocol for authenticated key agreement" (with L. Law, M. Qu, J. Solinas and S. Vanstone), Designs, Codes and Cryptography, 28 (2003), 119-134. https://doi.org/10.1023/A:1022595222606
- "Solving elliptic curve discrete logarithm problems using Weil descent" (with M. Jacobson and A. Stein), Journal of the Ramanujan Mathematical Society, 16 (2001), 231-260. https://eprint.iacr.org/2001/041
- "The elliptic curve digital signature algorithm (ECDSA)" (with D. Johnson and S. Vanstone), International Journal on Information Security, 1 (2001), 36-63. https://doi.org/10.1007/s102070100002
- "Analysis of the Weil descent attack of Gaudry, Hess and Smart" (with M. Qu), Topics in Cryptology - CT-RSA 2001, Lecture Notes in Computer Science, 2020 (2001), 308-318. https://doi.org/10.1007/3-540-45353-9_23
- "Unknown key-share attacks on the station-to-station (STS) protocol" (with S. Blake-Wilson), Proceedings of PKC '99, Lecture Notes in Computer Science, 1560 (1999), 154-170. https://doi.org/10.1007/3-540-49162-7_12
- "Reducing elliptic curve logarithms to logarithms in a finite field" (with T. Okamoto and S. Vanstone), IEEE Transactions on Information Theory, 39 (1993), 1639-1646. https://doi.org/10.1109/18.259647
- Cf. Library of Congress catalog data
- "Alfred Menezes: Mini-biography", Certicom company website
- Koblitz, Neal (2008). Random Curves: Journeys of a Mathematician. Springer-Verlag. ISBN 9783540740773.
- "Alfred Menezes". Retrieved 11 April 2018.
- Menezes, Alfred J. (1993). Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publisher. ISBN 9780792393689.
- Menezes, Alfred J.; van Oorschot, Paul; Vanstone, Scott A. (1996). Handbook of Applied Cryptography. CRC Press. ISBN 0-8493-8523-7.
- "Professional Activities". Retrieved 11 April 2018.
- "Another look at provable security". Retrieved 11 April 2018.