-
1
-
-
0025824903
-
An Implementation for a Fast Public-Key Cryptosystem
-
G.B. Agnew, R.C. Mullin, I.M. Onyszchuk, and S.A. Vanstone, "An Implementation for a Fast Public-Key Cryptosystem," J. Cryptology, vol. 3, pp. 63-79, 1991.
-
(1991)
J. Cryptology
, vol.3
, pp. 63-79
-
-
Agnew, G.B.1
Mullin, R.C.2
Onyszchuk, I.M.3
Vanstone, S.A.4
-
2
-
-
0027614379
-
2155
-
June
-
2155," IFEE J. Selected Areas in Comm., vol. 11, no. 5, pp. 804-813, June 1993.
-
(1993)
IFEE J. Selected Areas in Comm.
, vol.11
, Issue.5
, pp. 804-813
-
-
Agnew, G.B.1
Mullin, R.C.2
Vanstone, S.A.3
-
4
-
-
0000753472
-
Low Complexity Normal Bases
-
D.W. Ash, I.F. Blake, and S.A. Vanstone, "Low Complexity Normal Bases," Discrete Applied Math., vol. 25, pp. 191-210, 1989.
-
(1989)
Discrete Applied Math.
, vol.25
, pp. 191-210
-
-
Ash, D.W.1
Blake, I.F.2
Vanstone, S.A.3
-
5
-
-
84974687517
-
A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography
-
Dec.
-
M. Ciet and J.-J. Quisquater, F. Sica, "A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography," Proc. Indocrypt 2001, pp. 108-116, Dec. 2001.
-
(2001)
Proc. Indocrypt 2001
, pp. 108-116
-
-
Ciet, M.1
Quisquater, J.-J.2
Sica, F.3
-
7
-
-
0001057132
-
Optimal Normal Bases
-
S. Gao and H.W. Lenstra Jr., "Optimal Normal Bases," Designs, Codes and Cryptography, vol. 2, pp. 315-323, 1992.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 315-323
-
-
Gao, S.1
Lenstra Jr., H.W.2
-
9
-
-
0034216098
-
Look-Up Table-Based Large Finite Field Multiplication in Memory Constrained Cryptosystems
-
July
-
M.A. Hasan, "Look-Up Table-Based Large Finite Field Multiplication in Memory Constrained Cryptosystems," IEEE Trans. Computers, vol. 49, no. 7, pp. 749-758, July 2000.
-
(2000)
IEEE Trans. Computers
, vol.49
, Issue.7
, pp. 749-758
-
-
Hasan, M.A.1
-
10
-
-
0001492981
-
A Modified Massey-Omura Parallel Multiplier for a Class of Finite Fields
-
Oct.
-
M.A. Hasan, M.Z. Wang, and V.K. Bhargava, "A Modified Massey-Omura Parallel Multiplier for a Class of Finite Fields," IEEE Trans. Computers, vol. 42, no. 10, pp. 1278-1280, Oct. 1993.
-
(1993)
IEEE Trans. Computers
, vol.42
, Issue.10
, pp. 1278-1280
-
-
Hasan, M.A.1
Wang, M.Z.2
Bhargava, V.K.3
-
12
-
-
0142002511
-
The Elliptic Curve Digital Signature Algorithm (ECDSA)
-
D. Johnson, A. Menezes, and S. Vanstone, "The Elliptic Curve Digital Signature Algorithm (ECDSA)," Int'l J. Information Security, vol. 1, pp. 36-63, 2001.
-
(2001)
Int'l J. Information Security
, vol.1
, pp. 36-63
-
-
Johnson, D.1
Menezes, A.2
Vanstone, S.3
-
13
-
-
0010058718
-
Elliptic Scalar Multiplication Using Point Halving
-
E. Knudsen, "Elliptic Scalar Multiplication Using Point Halving," Proc. ASIACRYPT 1999, pp. 135-149, 1999.
-
(1999)
Proc. ASIACRYPT 1999
, pp. 135-149
-
-
Knudsen, E.1
-
14
-
-
84968503742
-
Elliptic Curve Cryptosystems
-
N. Koblitz, "Elliptic Curve Cryptosystems," Math. Computation, vol. 48, pp. 203-209, 1987.
-
(1987)
Math. Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
15
-
-
0002842804
-
k)
-
k)," Designs, Codes, and Cryptography, vol. 14, pp. 57-69, 1998.
-
(1998)
Designs, Codes, and Cryptography
, vol.14
, pp. 57-69
-
-
Koc, C.K.1
Acar, T.2
-
18
-
-
0031369480
-
A Search of Minimal Key Functions for Normal Basis Multipliers
-
May
-
C.-C. Lu, "A Search of Minimal Key Functions for Normal Basis Multipliers," IEEE Trans. Computers, vol. 46, no. 5, pp. 588-592, May 1997.
-
(1997)
IEEE Trans. Computers
, vol.46
, Issue.5
, pp. 588-592
-
-
Lu, C.-C.1
-
20
-
-
84974693377
-
Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree
-
Dec.
-
M. Maurer, A. Menezes, and E. Teske, "Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree," Proc. Indocrypt 2001, pp. 195-213, Dec. 2001.
-
(2001)
Proc. Indocrypt 2001
, pp. 195-213
-
-
Maurer, M.1
Menezes, A.2
Teske, E.3
-
21
-
-
0004129394
-
-
Kluwer Academic
-
A.J. Menezes, I.F. Blake, X. Gao, R.C. Mullin, S.A. Vanstone, and T. Yaghoobian, Applications of Finite Fields, Kluwer Academic, 1993.
-
(1993)
Applications of Finite Fields
-
-
Menezes, A.J.1
Blake, I.F.2
Gao, X.3
Mullin, R.C.4
Vanstone, S.A.5
Yaghoobian, T.6
-
22
-
-
85015402934
-
Use of Elliptic Curves in Cryptography
-
V.S. Miller, "Use of Elliptic Curves in Cryptography," Proc. Crypto '85, pp. 417-426, 1986.
-
(1986)
Proc. Crypto '85
, pp. 417-426
-
-
Miller, V.S.1
-
23
-
-
45549114790
-
n)
-
n)," Discrete Applied Math., vol. 22, pp. 149-161, 1988/1989.
-
(1988)
Discrete Applied Math.
, vol.22
, pp. 149-161
-
-
Mullin, R.C.1
Onyszchuk, I.M.2
Vanstone, S.A.3
Wilson, R.M.4
-
24
-
-
84956974817
-
Efficient Software Implementation for Finite Field Multiplication in Normal Basis
-
Nov.
-
P. Ning and Y.L. Yin, "Efficient Software Implementation for Finite Field Multiplication in Normal Basis," Proc. Information and Commu. Security (ICICS 2001), pp. 177-181, Nov. 2001.
-
(2001)
Proc. Information and Commu. Security (ICICS 2001)
, pp. 177-181
-
-
Ning, P.1
Yin, Y.L.2
-
25
-
-
0003508562
-
-
FIPS Publication 186-2
-
Nat'l Inst. of Standards and Technology, Digital Signature Standard, FIPS Publication 186-2, 2000.
-
(2000)
Digital Signature Standard
-
-
-
26
-
-
0034291075
-
Efficient Normal Basis Multipliers in Composite Fields
-
Oct.
-
S. Oh, C.H. Kim, J. Lim, and D.H. Cheon, "Efficient Normal Basis Multipliers in Composite Fields," IEEE Trans. Computers, vol. 49, no. 10, pp. 1133-1138, Oct. 2000.
-
(2000)
IEEE Trans. Computers
, vol.49
, Issue.10
, pp. 1133-1138
-
-
Oh, S.1
Kim, C.H.2
Lim, J.3
Cheon, D.H.4
-
27
-
-
0033204715
-
Fast Arithmetic for Public-Key Algorithms in Galois Fields with Composite Exponents
-
Oct.
-
C. Paar, P. Fleishmann, and P. Soria-Rodriguez, "Fast Arithmetic for Public-Key Algorithms in Galois Fields with Composite Exponents," IEEE Trans. Computers, vol. 48, no. 10, pp. 1025-1034, Oct. 1999.
-
(1999)
IEEE Trans. Computers
, vol.48
, Issue.10
, pp. 1025-1034
-
-
Paar, C.1
Fleishmann, P.2
Soria-Rodriguez, P.3
-
29
-
-
0011579285
-
Fast Normal Basis Multiplication Using General Purpose Processors
-
Dept. of C & O, Univ. of Waterloo, Canada, Apr.
-
A. Reyhani-Masoleh and M.A. Hasan, "Fast Normal Basis Multiplication Using General Purpose Processors," Technical Report CORR 2001-25, Dept. of C & O, Univ. of Waterloo, Canada, Apr. 2001.
-
(2001)
Technical Report
, vol.CORR 2001-25
-
-
Reyhani-Masoleh, A.1
Hasan, M.A.2
-
31
-
-
0036566216
-
m)
-
May
-
m)," IEEE Trans. Computers, vol. 51, no. 5, pp. 511-520, May 2002.
-
(2002)
IEEE Trans. Computers
, vol.51
, Issue.5
, pp. 511-520
-
-
Reyhani-Masoleh, A.1
Hasan, M.A.2
-
33
-
-
84957657892
-
Fast Key Exchange with Elliptic Curve Systems
-
R. Schroeppel, H. Orman, S.W. O'Malley, and O. Spatscheck, "Fast Key Exchange with Elliptic Curve Systems," Proc. CRYPTO '95, pp. 43-56, 1995.
-
(1995)
Proc. CRYPTO '95
, pp. 43-56
-
-
Schroeppel, R.1
Orman, H.2
O'Malley, S.W.3
Spatscheck, O.4
-
34
-
-
84945129506
-
How Secure Are Elliptic Curves over Composite Extension Fields?
-
N.P. Smart, "How Secure Are Elliptic Curves over Composite Extension Fields?" Proc. Eurocrypt 2001, pp. 30-39, 2001.
-
(2001)
Proc. Eurocrypt 2001
, pp. 30-39
-
-
Smart, N.P.1
-
35
-
-
0035107422
-
An Efficient Optimal Normal Basis Type II Multiplier
-
Jan.
-
B. Sunar and C.K. Koc, "An Efficient Optimal Normal Basis Type II Multiplier," IEEE Trans. Computers, vol. 50, no. 1, pp. 83-88, Jan. 2001.
-
(2001)
IEEE Trans. Computers
, vol.50
, Issue.1
, pp. 83-88
-
-
Sunar, B.1
Koc, C.K.2
|