메뉴 건너뛰기




Volumn 3076, Issue , 2004, Pages 153-168

Montgomery scalar multiplication for genus 2 curves

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; NUMBER THEORY; SMART CARDS;

EID: 21144448858     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24847-7_11     Document Type: Article
Times cited : (15)

References (28)
  • 1
    • 84958979095 scopus 로고    scopus 로고
    • Weierstrass Elliptic Curves and Side-Channel Attacks
    • Public Key Cryptography
    • Brier, E., Joye, M.: Weierstrass Elliptic Curves and Side-Channel Attacks, Public Key Cryptography, Lecture Notes in Computer Science, 2274 (2002)
    • (2002) Lecture Notes in Computer Science , vol.2274
    • Brier, E.1    Joye, M.2
  • 2
    • 84968494137 scopus 로고
    • Computing on the Jacobian of a hyperelliptic curve
    • Cantor, D. G.: Computing on the Jacobian of a hyperelliptic curve. Math. Comp., 48 (1987) 95-101
    • (1987) Math. Comp. , vol.48 , pp. 95-101
    • Cantor, D.G.1
  • 4
    • 84947743704 scopus 로고    scopus 로고
    • Efficient elliptic curve exponentiation using mixed coordinates
    • Asiacrypt'98
    • Cohen, H., Miyaji, A., Ono, T.: Efficient elliptic curve exponentiation using mixed coordinates, Asiacrypt'98, Lecture Notes in Computer Science, 1514 (1998) 51-65
    • (1998) Lecture Notes in Computer Science , vol.1514 , pp. 51-65
    • Cohen, H.1    Miyaji, A.2    Ono, T.3
  • 5
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against differential power analysis for elliptic curve cryptosystems
    • CHES'99
    • Coron, J. S.: Resistance against differential power analysis for elliptic curve cryptosystems, CHES'99, Lecture Notes in Computer Science, 1717 (1999) 292-302
    • (1999) Lecture Notes in Computer Science , vol.1717 , pp. 292-302
    • Coron, J.S.1
  • 6
    • 35048860636 scopus 로고    scopus 로고
    • Manual for the elliptic curve library
    • Doche, C., Duquesne, S.: Manual for the elliptic curve library, Arehcc report (2003)
    • (2003) Arehcc Report
    • Doche, C.1    Duquesne, S.2
  • 8
    • 0003375494 scopus 로고
    • The group law on the Jacobian of a curve of genus 2
    • Flynn, E. V.: The group law on the Jacobian of a curve of genus 2, J. reine angew. Math., 439 (1993), 45-69
    • (1993) J. Reine Angew. Math. , vol.439 , pp. 45-69
    • Flynn, E.V.1
  • 9
    • 35048872459 scopus 로고    scopus 로고
    • ftp site
    • Flynn, E. V.: ftp site, ftp://ftp.liv.ac.uk/pub/genus2/kummer
    • Flynn, E.V.1
  • 11
    • 35048820123 scopus 로고    scopus 로고
    • Construction of secure random curves of genus 2 over prime fields
    • Eurocrypt'04
    • Gaudry, P., Schost, E.: Construction of secure random curves of genus 2 over prime fields, Eurocrypt'04, Lecture Notes in Computer Science (2004)
    • (2004) Lecture Notes in Computer Science
    • Gaudry, P.1    Schost, E.2
  • 14
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz, N.: Elliptic curve cryptosystems, Math. Comp., 48 (1987) 203-209
    • (1987) Math. Comp. , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 16
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of DH, RSA, DSS and other systems
    • CRYPTO'96
    • Kocher, P. C.: Timing attacks on implementations of DH, RSA, DSS and other systems, CRYPTO'96, Lecture Notes in Computer Science, 1109 (1996), 104-113
    • (1996) Lecture Notes in Computer Science , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 18
    • 84957354181 scopus 로고
    • Speeding up elliptic cryptosystems by using a signed binary window method
    • Crypto'92
    • Koyama, K., Tsuruoka, Y.: Speeding up elliptic cryptosystems by using a signed binary window method, Crypto'92, Lecture Notes in Computer Science, 740 (1993) 345-357
    • (1993) Lecture Notes in Computer Science , vol.740 , pp. 345-357
    • Koyama, K.1    Tsuruoka, Y.2
  • 19
    • 21744445228 scopus 로고    scopus 로고
    • Efficient Arithmetic on Genus 2 Hyperelliptic Curves over Finite Fields via Explicit Formulae
    • Lange, T.: Efficient Arithmetic on Genus 2 Hyperelliptic Curves over Finite Fields via Explicit Formulae, Cryptology ePrint Archive, 121 (2002)
    • (2002) Cryptology ePrint Archive , vol.121
    • Lange, T.1
  • 20
    • 21444461295 scopus 로고    scopus 로고
    • Inversion-Free Arithmetic on Genus 2 Hyperelliptic Curves
    • Lange, T.: Inversion-Free Arithmetic on Genus 2 Hyperelliptic Curves, Cryptology ePrint Archive, 147 (2002)
    • (2002) Cryptology ePrint Archive , vol.147
    • Lange, T.1
  • 21
    • 23044490544 scopus 로고    scopus 로고
    • Weighted Coordinates on Genus 2 Hyperelliptic Curves
    • Lange, T.: Weighted Coordinates on Genus 2 Hyperelliptic Curves, Cryptology ePrint Archive, 153 (2002)
    • (2002) Cryptology ePrint Archive , vol.153
    • Lange, T.1
  • 22
    • 84958532498 scopus 로고    scopus 로고
    • An improved baby step giant step algorithm for point counting of hyperelliptic curves over finite fields
    • ANTS-V
    • Matsuo, K. Chao, J. Tsujii, S.: An improved baby step giant step algorithm for point counting of hyperelliptic curves over finite fields, ANTS-V, Lecture Notes in Computer Science, 2369 (2002) 461-474
    • (2002) Lecture Notes in Computer Science , vol.2369 , pp. 461-474
    • Matsuo, K.1    Chao, J.2    Tsujii, S.3
  • 23
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography
    • Crypto'85
    • Miller, V. S.: Use of elliptic curves in cryptography, Crypto'85, Lecture Notes in Computer Science, 218 (1986) 417-426
    • (1986) Lecture Notes in Computer Science , vol.218 , pp. 417-426
    • Miller, V.S.1
  • 24
    • 84968484435 scopus 로고
    • Speeding the Pollard and elliptic curve methods of factorization
    • Montgomery, P. L.: Speeding the Pollard and elliptic curve methods of factorization, Math. Comp., 48 (1987) 243-164
    • (1987) Math. Comp. , vol.48 , pp. 243-1164
    • Montgomery, P.L.1
  • 26
    • 84957794840 scopus 로고    scopus 로고
    • Elliptic curves with the Montgomery-form and their cryptographic applications
    • Public Key Cryptography
    • Okeya, K., Kurumatani, H., Sakurai, K.: Elliptic curves with the Montgomery-form and their cryptographic applications, Public Key Cryptography, Lecture Notes in Computer Science, 1751 (2000) 238-257
    • (2000) Lecture Notes in Computer Science , vol.1751 , pp. 238-257
    • Okeya, K.1    Kurumatani, H.2    Sakurai, K.3
  • 27
    • 84944875437 scopus 로고    scopus 로고
    • Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve
    • Cryptographic Hardware and Embedded Systems
    • Okeya, O., Sakurai, K.: Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve, Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, 2162 (2001) 126-141
    • (2001) Lecture Notes in Computer Science , vol.2162 , pp. 126-141
    • Okeya, O.1    Sakurai, K.2
  • 28
    • 78650238574 scopus 로고    scopus 로고
    • ElectroMagnetic Analysis (EMA): Measures and Countermeasures for Smart Cards
    • e-smart 2001
    • Quisquater, J. J., Samyde, D.: ElectroMagnetic Analysis (EMA): Measures and Countermeasures for Smart Cards, e-smart 2001, Lecture Notes in Computer Science, 2140, (2001), 200-210
    • (2001) Lecture Notes in Computer Science , vol.2140 , pp. 200-210
    • Quisquater, J.J.1    Samyde, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.