-
1
-
-
84958979095
-
Weierstrass Elliptic Curves and Side-Channel Attacks
-
Public Key Cryptography
-
Brier, E., Joye, M.: Weierstrass Elliptic Curves and Side-Channel Attacks, Public Key Cryptography, Lecture Notes in Computer Science, 2274 (2002)
-
(2002)
Lecture Notes in Computer Science
, vol.2274
-
-
Brier, E.1
Joye, M.2
-
2
-
-
84968494137
-
Computing on the Jacobian of a hyperelliptic curve
-
Cantor, D. G.: Computing on the Jacobian of a hyperelliptic curve. Math. Comp., 48 (1987) 95-101
-
(1987)
Math. Comp.
, vol.48
, pp. 95-101
-
-
Cantor, D.G.1
-
4
-
-
84947743704
-
Efficient elliptic curve exponentiation using mixed coordinates
-
Asiacrypt'98
-
Cohen, H., Miyaji, A., Ono, T.: Efficient elliptic curve exponentiation using mixed coordinates, Asiacrypt'98, Lecture Notes in Computer Science, 1514 (1998) 51-65
-
(1998)
Lecture Notes in Computer Science
, vol.1514
, pp. 51-65
-
-
Cohen, H.1
Miyaji, A.2
Ono, T.3
-
5
-
-
84880293917
-
Resistance against differential power analysis for elliptic curve cryptosystems
-
CHES'99
-
Coron, J. S.: Resistance against differential power analysis for elliptic curve cryptosystems, CHES'99, Lecture Notes in Computer Science, 1717 (1999) 292-302
-
(1999)
Lecture Notes in Computer Science
, vol.1717
, pp. 292-302
-
-
Coron, J.S.1
-
6
-
-
35048860636
-
Manual for the elliptic curve library
-
Doche, C., Duquesne, S.: Manual for the elliptic curve library, Arehcc report (2003)
-
(2003)
Arehcc Report
-
-
Doche, C.1
Duquesne, S.2
-
8
-
-
0003375494
-
The group law on the Jacobian of a curve of genus 2
-
Flynn, E. V.: The group law on the Jacobian of a curve of genus 2, J. reine angew. Math., 439 (1993), 45-69
-
(1993)
J. Reine Angew. Math.
, vol.439
, pp. 45-69
-
-
Flynn, E.V.1
-
9
-
-
35048872459
-
-
ftp site
-
Flynn, E. V.: ftp site, ftp://ftp.liv.ac.uk/pub/genus2/kummer
-
-
-
Flynn, E.V.1
-
11
-
-
35048820123
-
Construction of secure random curves of genus 2 over prime fields
-
Eurocrypt'04
-
Gaudry, P., Schost, E.: Construction of secure random curves of genus 2 over prime fields, Eurocrypt'04, Lecture Notes in Computer Science (2004)
-
(2004)
Lecture Notes in Computer Science
-
-
Gaudry, P.1
Schost, E.2
-
14
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz, N.: Elliptic curve cryptosystems, Math. Comp., 48 (1987) 203-209
-
(1987)
Math. Comp.
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
16
-
-
84943632039
-
Timing attacks on implementations of DH, RSA, DSS and other systems
-
CRYPTO'96
-
Kocher, P. C.: Timing attacks on implementations of DH, RSA, DSS and other systems, CRYPTO'96, Lecture Notes in Computer Science, 1109 (1996), 104-113
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
17
-
-
84939573910
-
Differential power analysis
-
CRYPTO'99
-
Kocher, P. C., Jaffe, J., Jun, B.: Differential power analysis, CRYPTO'99, Lecture Notes in Computer Science, 1666 (1999) 388-397
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
18
-
-
84957354181
-
Speeding up elliptic cryptosystems by using a signed binary window method
-
Crypto'92
-
Koyama, K., Tsuruoka, Y.: Speeding up elliptic cryptosystems by using a signed binary window method, Crypto'92, Lecture Notes in Computer Science, 740 (1993) 345-357
-
(1993)
Lecture Notes in Computer Science
, vol.740
, pp. 345-357
-
-
Koyama, K.1
Tsuruoka, Y.2
-
19
-
-
21744445228
-
Efficient Arithmetic on Genus 2 Hyperelliptic Curves over Finite Fields via Explicit Formulae
-
Lange, T.: Efficient Arithmetic on Genus 2 Hyperelliptic Curves over Finite Fields via Explicit Formulae, Cryptology ePrint Archive, 121 (2002)
-
(2002)
Cryptology ePrint Archive
, vol.121
-
-
Lange, T.1
-
20
-
-
21444461295
-
Inversion-Free Arithmetic on Genus 2 Hyperelliptic Curves
-
Lange, T.: Inversion-Free Arithmetic on Genus 2 Hyperelliptic Curves, Cryptology ePrint Archive, 147 (2002)
-
(2002)
Cryptology ePrint Archive
, vol.147
-
-
Lange, T.1
-
21
-
-
23044490544
-
Weighted Coordinates on Genus 2 Hyperelliptic Curves
-
Lange, T.: Weighted Coordinates on Genus 2 Hyperelliptic Curves, Cryptology ePrint Archive, 153 (2002)
-
(2002)
Cryptology ePrint Archive
, vol.153
-
-
Lange, T.1
-
22
-
-
84958532498
-
An improved baby step giant step algorithm for point counting of hyperelliptic curves over finite fields
-
ANTS-V
-
Matsuo, K. Chao, J. Tsujii, S.: An improved baby step giant step algorithm for point counting of hyperelliptic curves over finite fields, ANTS-V, Lecture Notes in Computer Science, 2369 (2002) 461-474
-
(2002)
Lecture Notes in Computer Science
, vol.2369
, pp. 461-474
-
-
Matsuo, K.1
Chao, J.2
Tsujii, S.3
-
23
-
-
85015402934
-
Use of elliptic curves in cryptography
-
Crypto'85
-
Miller, V. S.: Use of elliptic curves in cryptography, Crypto'85, Lecture Notes in Computer Science, 218 (1986) 417-426
-
(1986)
Lecture Notes in Computer Science
, vol.218
, pp. 417-426
-
-
Miller, V.S.1
-
24
-
-
84968484435
-
Speeding the Pollard and elliptic curve methods of factorization
-
Montgomery, P. L.: Speeding the Pollard and elliptic curve methods of factorization, Math. Comp., 48 (1987) 243-164
-
(1987)
Math. Comp.
, vol.48
, pp. 243-1164
-
-
Montgomery, P.L.1
-
26
-
-
84957794840
-
Elliptic curves with the Montgomery-form and their cryptographic applications
-
Public Key Cryptography
-
Okeya, K., Kurumatani, H., Sakurai, K.: Elliptic curves with the Montgomery-form and their cryptographic applications, Public Key Cryptography, Lecture Notes in Computer Science, 1751 (2000) 238-257
-
(2000)
Lecture Notes in Computer Science
, vol.1751
, pp. 238-257
-
-
Okeya, K.1
Kurumatani, H.2
Sakurai, K.3
-
27
-
-
84944875437
-
Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve
-
Cryptographic Hardware and Embedded Systems
-
Okeya, O., Sakurai, K.: Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve, Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, 2162 (2001) 126-141
-
(2001)
Lecture Notes in Computer Science
, vol.2162
, pp. 126-141
-
-
Okeya, O.1
Sakurai, K.2
-
28
-
-
78650238574
-
ElectroMagnetic Analysis (EMA): Measures and Countermeasures for Smart Cards
-
e-smart 2001
-
Quisquater, J. J., Samyde, D.: ElectroMagnetic Analysis (EMA): Measures and Countermeasures for Smart Cards, e-smart 2001, Lecture Notes in Computer Science, 2140, (2001), 200-210
-
(2001)
Lecture Notes in Computer Science
, vol.2140
, pp. 200-210
-
-
Quisquater, J.J.1
Samyde, D.2
|