-
1
-
-
0027614379
-
135
-
135," IEEE J. Sel. Areas Commun., vol.11, no.5, pp.804-813, 1993.
-
(1993)
IEEE J. Sel. Areas Commun.
, vol.11
, Issue.5
, pp. 804-813
-
-
Agnew, G.B.1
Mullin, R.C.2
Vanstone, S.A.3
-
2
-
-
0003735741
-
Public key cryptography for the financial services industry
-
ANSI X9.62
-
ANSI X9.62, "Public key cryptography for the financial services industry," The Elliptic Curve Digital Signature Algorithm(ECDSA), 1999.
-
(1999)
The Elliptic Curve Digital Signature Algorithm(ECDSA)
-
-
-
3
-
-
84957677506
-
Optimal extension fields for fast arithmetic in public-key algorithms
-
Advances in Cryptology-CRYPTO'98
-
D.V. Bailey and C. Paar, "Optimal extension fields for fast arithmetic in public-key algorithms," Advances in Cryptology-CRYPTO'98, LNCS1462, pp.472-485, 1998.
-
(1998)
LNCS
, vol.1462
, pp. 472-485
-
-
Bailey, D.V.1
Paar, C.2
-
6
-
-
84947743704
-
Efficient elliptic curve exponentiation using mixed coordinates
-
Advances in Cryptology-ASIACRYPT'98
-
H. Cohen, A. Miyaji, and T. Ono, "Efficient elliptic curve exponentiation using mixed coordinates," Advances in Cryptology-ASIACRYPT'98, LNCS1514, pp.51-65, 1998.
-
(1998)
LNCS
, vol.1514
, pp. 51-65
-
-
Cohen, H.1
Miyaji, A.2
Ono, T.3
-
7
-
-
0003202609
-
A course in computational algebraic number theory
-
Springer-Verlag, New York
-
H. Cohen, A course in computational algebraic number theory, GTM138, Springer-Verlag, New York, 1993.
-
(1993)
GTM
, vol.138
-
-
Cohen, H.1
-
8
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inf. Theory, vol.31, no.4, pp.469-472, 1985.
-
(1985)
IEEE Trans. Inf. Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
10
-
-
0038670954
-
Software implementation of elliptic curve cryptography over binary fields
-
D. Hankerson, J.L. Hernandez, and A. Menezes, "Software implementation of elliptic curve cryptography over binary fields," Pre-Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES2000), pp.1-24, 2000.
-
(2000)
Pre-Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES2000)
, pp. 1-24
-
-
Hankerson, D.1
Hernandez, J.L.2
Menezes, A.3
-
12
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz, "Elliptic curve cryptosystems," Math. Comp., vol.48, pp.203-209, 1987.
-
(1987)
Math. Comp.
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
14
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
Advances in Cryptology-CRYPTO'96
-
C. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems," Advances in Cryptology-CRYPTO'96, LNCS1109, pp.104-113, 1996.
-
(1996)
LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, C.1
-
15
-
-
84947913604
-
m) without precomputation
-
Cryptographic Hardware and Embedded Systems (CHES'99)
-
m) without precomputation," Cryptographic Hardware and Embedded Systems (CHES'99), LNCS1717, pp.316-327; 1999.
-
(1999)
LNCS
, vol.1717
, pp. 316-327
-
-
López, J.1
Dahab, R.2
-
16
-
-
84905916064
-
m)
-
Proc. PKC'00
-
m)," Proc. PKC'00 LNCS1751, pp.405-421, 2000.
-
(2000)
LNCS
, vol.1751
, pp. 405-421
-
-
Lim, C.H.1
Hwang, H.S.2
-
17
-
-
84955368946
-
More flexible exponentiation with precomputation
-
Advances in Cryptology-CRYPTO'94
-
C. Lira and P. Lee, "More flexible exponentiation with precomputation," Advances in Cryptology-CRYPTO'94, LNCS839, pp.95-107, 1994.
-
(1994)
LNCS
, vol.839
, pp. 95-107
-
-
Lira, C.1
Lee, P.2
-
18
-
-
84957812088
-
Selecting cryptographic key sizes
-
Proc. PKC'00
-
A.K. Lenstra and E.R. Verheul, "Selecting cryptographic key sizes," Proc. PKC'00 LNCS1751, pp.446-465, 2000.
-
(2000)
LNCS
, vol.1751
, pp. 446-465
-
-
Lenstra, A.K.1
Verheul, E.R.2
-
19
-
-
85015402934
-
Use of elliptic curves in cryptography
-
Advances in Cryptology-CRYPTO'85
-
V.S. Miller, "Use of elliptic curves in cryptography," Advances in Cryptology-CRYPTO'85, LNCS218, pp.417426, 1986.
-
(1986)
LNCS
, vol.218
, pp. 417-426
-
-
Miller, V.S.1
-
20
-
-
84968484435
-
Speeding the pollard and elliptic curve methods of factorizations
-
P.L. Montgomery, "Speeding the pollard and elliptic curve methods of factorizations," Math. Comp. 48, pp.243-264, 1987.
-
(1987)
Math. Comp.
, vol.48
, pp. 243-264
-
-
Montgomery, P.L.1
-
22
-
-
0012022916
-
Elliptic curve signature scheme with no y coordinate
-
W4-1.3
-
K. Ohgishi, R. Sakai, and M. Kasahara, "Elliptic curve signature scheme with no y coordinate," Proc. SCIS'99, W4-1.3, pp.285-287, 1999.
-
(1999)
Proc. SCIS'99
, pp. 285-287
-
-
Ohgishi, K.1
Sakai, R.2
Kasahara, M.3
-
23
-
-
84957794840
-
Elliptic curves with the Montgomery-form and their cryptographic applications
-
Public Key Cryptography (PKC2000)
-
K. Okeya, H. Kurumatani, and K. Sakurai, "Elliptic curves with the Montgomery-form and their cryptographic applications," Public Key Cryptography (PKC2000), LNCS1751, pp.238-257, 2000.
-
(2000)
LNCS
, vol.1751
, pp. 238-257
-
-
Okeya, K.1
Kurumatani, H.2
Sakurai, K.3
-
24
-
-
84947733936
-
Power analysis breaks elliptic curve cryptosystems even secure against the timing attack
-
Progress in Cryptology-INDOCRYPT 2000
-
K. Okeya and K. Sakurai, "Power analysis breaks elliptic curve cryptosystems even secure against the timing attack," Progress in Cryptology-INDOCRYPT 2000, LNCS1977, pp.178-190, 2000.
-
(2000)
LNCS
, vol.1977
, pp. 178-190
-
-
Okeya, K.1
Sakurai, K.2
-
25
-
-
85027128268
-
Standards for efficient cryptography
-
Standards for Efficient Cryptography, Elliptic Curve Cryptography Ver.1.0, 2000, Available at http://www.secg.org/secg_docs.htm.
-
(2000)
Elliptic Curve Cryptography Ver.1.0
-
-
|