메뉴 건너뛰기




Volumn 13, Issue 6, 2003, Pages 485-497

Point multiplication on ordinary elliptic curves over fields of characteristic three

Author keywords

Characteristic three; Elliptic curve cryptography; Hessian form

Indexed keywords

ALGORITHMS; COMPUTATIONAL METHODS; CURVE FITTING; MAPPING; NUMBER THEORY;

EID: 0038341705     PISSN: 09381279     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00200-002-0114-0     Document Type: Article
Times cited : (34)

References (22)
  • 6
    • 0038080567 scopus 로고    scopus 로고
    • February
    • National Institute of Standards and Technology Digital Signature Standard, FIPS Publication 186-2, February 2000
    • (2000) FIPS Publication 186-2
  • 8
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption form the Weil pairing
    • Advances in Cryptology - CRYPTO 2001, Springer
    • Boneh, D., Franklin, M.: Identity-based encryption form the Weil pairing. In: Advances in Cryptology - CRYPTO 2001, Springer LNCS 2139, pp. 213-229, 2001
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 9
    • 84937564555 scopus 로고    scopus 로고
    • Software implementation of NIST elliptic curves over prime fields
    • Topics in Cryptology - CT-RSA 2001, Springer
    • Brown, M., Hankerson, D., López, J., Menezes, A. J.: Software implementation of NIST elliptic curves over prime fields. In: Topics in Cryptology - CT-RSA 2001, Springer LNCS 2020, pp. 250-265, 2001
    • (2001) LNCS , vol.2020 , pp. 250-265
    • Brown, M.1    Hankerson, D.2    López, J.3    Menezes, A.J.4
  • 10
    • 0000267548 scopus 로고
    • Sequences of numbers generated by addition in formal groups and new primality and factorisation tests
    • Chudnovsky, D. V., Chudnovsky, G. V.: Sequences of numbers generated by addition in formal groups and new primality and factorisation tests. Adv. Appl. Math. 7, 385-434 (1987)
    • (1987) Adv. Appl. Math. , vol.7 , pp. 385-434
    • Chudnovsky, D.V.1    Chudnovsky, G.V.2
  • 11
    • 0038757176 scopus 로고
    • Résolution en nombres entiers et sous sa forme la plus générale, de l'équation cubique, homogéne á trois inconnue
    • Desboves, A.: Résolution en nombres entiers et sous sa forme la plus générale, de l'équation cubique, homogéne á trois inconnue. Nouv. Ann. de la Math. 5, 545-579 (1886)
    • (1886) Nouv. Ann. de la Math. , vol.5 , pp. 545-579
    • Desboves, A.1
  • 12
    • 0001113371 scopus 로고    scopus 로고
    • An extension of Satoh's algorithm and its implementation
    • Fouqet, M., Gaudry, P., Harley, R.: An extension of Satoh's algorithm and its implementation. J. Ramanujan Math. Soc. 15, 281-318 (2000)
    • (2000) J. Ramanujan Math. Soc. , vol.15 , pp. 281-318
    • Fouqet, M.1    Gaudry, P.2    Harley, R.3
  • 14
    • 0038670954 scopus 로고    scopus 로고
    • Software implementation of elliptic curve cryptography over binary fields
    • Cryptographic Hardware and Embedded Systems - CHES 2000, Springer
    • Hankerson, D., Hernandez, J. L., Menezes, A. J.: Software implementation of elliptic curve cryptography over binary fields. In: Cryptographic Hardware and Embedded Systems - CHES 2000, Springer LNCS 1965, pp. 1-24, 2000
    • (2000) LNCS , vol.1965 , pp. 1-24
    • Hankerson, D.1    Hernandez, J.L.2    Menezes, A.J.3
  • 15
    • 0037743010 scopus 로고    scopus 로고
    • Software implementation of finite fields of characteristic three
    • Harrison, K., Page, D., Smart, N. P.: Software implementation of finite fields of characteristic three. LMS J. Comput. Math. 5, 181-193 (2002)
    • (2002) LMS J. Comput. Math. , vol.5 , pp. 181-193
    • Harrison, K.1    Page, D.2    Smart, N.P.3
  • 16
    • 84949224514 scopus 로고    scopus 로고
    • n)
    • Selected Areas in Cryptography - SAC '98, Springer-Verlag
    • n). In Selected Areas in Cryptography - SAC '98, Springer-Verlag, LNCS 1556, pp. 201-212, 1999
    • (1999) LNCS , vol.1556 , pp. 201-212
    • López, J.1    Dahab, R.2
  • 17
    • 84944884283 scopus 로고    scopus 로고
    • Hessian elliptic curves and side-channel attacks
    • Cryptographic Hardware and Embedded Systems - CHES 2001, Springer
    • Joye, M., Quisquater, J. -J.: Hessian elliptic curves and side-channel attacks. In: Cryptographic Hardware and Embedded Systems - CHES 2001, Springer LNCS 2162, pp. 402-410, 2001
    • (2001) LNCS , vol.2162 , pp. 402-410
    • Joye, M.1    Quisquater, J.-J.2
  • 18
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48, 203-209 (1987)
    • (1987) Math. Comput. , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 19
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography
    • Advances in Cryptology - CRYPTO '85, Springer
    • Miller, V.: Use of elliptic curves in cryptography. In: Advances in Cryptology - CRYPTO '85, Springer LNCS 218, pp. 417-426, 1986
    • (1986) LNCS , vol.218 , pp. 417-426
    • Miller, V.1
  • 21
    • 0001100056 scopus 로고    scopus 로고
    • The canonical lift of an ordinary elliptic curve over a finite field and its point counting
    • Satoh, T.: The canonical lift of an ordinary elliptic curve over a finite field and its point counting. J. Ramanujan Math. Soc. 15, 247-270 (2000)
    • (2000) J. Ramanujan Math. Soc. , vol.15 , pp. 247-270
    • Satoh, T.1
  • 22
    • 84944876350 scopus 로고    scopus 로고
    • The Hessian form of an elliptic curve
    • Cryptographic Hardware and Embedded Systems - CHES 2001, Springer
    • Smart, N. P.: The Hessian form of an elliptic curve. In: Cryptographic Hardware and Embedded Systems - CHES 2001, Springer LNCS 2162, pp. 118-125, 2001
    • (2001) LNCS , vol.2162 , pp. 118-125
    • Smart, N.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.