-
2
-
-
84966219173
-
Elliptic curves and primality proving
-
A. Atkin and F. Morain, "Elliptic curves and primality proving," Mathematics of Computation, Vol. 61 (1993), pp. 29-68.
-
(1993)
Mathematics of Computation
, vol.61
, pp. 29-68
-
-
Atkin, A.1
Morain, F.2
-
3
-
-
84957677506
-
Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms
-
H. Krawczyk, Ed., Springer-Verlag
-
D. Bailey and C. Paar, "Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms," Advances in Cryptology, Proc. Crypto'98, LNCS 1462, H. Krawczyk, Ed., Springer-Verlag, 1998, pp. 472-485.
-
(1998)
Advances in Cryptology, Proc. Crypto'98, LNCS 1462
, pp. 472-485
-
-
Bailey, D.1
Paar, C.2
-
4
-
-
84955600081
-
n)
-
K. Kim and T. Matsumoto, Eds., Springer-Verlag
-
n)," Advances in Cryptology, Proc. Asiacrypt'96, LNCS 1163, K. Kim and T. Matsumoto, Eds., Springer-Verlag, 1996, pp. 65-76.
-
(1996)
Advances in Cryptology, Proc. Asiacrypt'96, LNCS 1163
, pp. 65-76
-
-
De Win, E.1
Bosselaers, A.2
Vandenberghe, S.3
De Gersem, P.4
Vandewalle, J.5
-
5
-
-
84947730530
-
On the performance of signature schemes based on elliptic curves
-
J. Buhler, Ed., Springer-Verlag
-
E. De Win, S. Mister, B. Preneel and M. Wiener, "On the performance of signature schemes based on elliptic curves," Proceedings of the ANTS III conference, LNCS 1423, J. Buhler, Ed., Springer-Verlag, 1998, pp. 252-266.
-
(1998)
Proceedings of the ANTS III conference, LNCS 1423
, pp. 252-266
-
-
De Win, E.1
Mister, S.2
Preneel, B.3
Wiener, M.4
-
6
-
-
0000490812
-
A survey of fast exponentiation methods
-
D.M. Gordon, "A survey of fast exponentiation methods," Journal of Algorithms, Vol. 27, pp. 129-146, 1998.
-
(1998)
Journal of Algorithms
, vol.27
, pp. 129-146
-
-
Gordon, D.M.1
-
7
-
-
84958670390
-
Efficient algorithms for elliptic curve cryptosystems
-
B. Kaliski, Ed., Springer-Verlag
-
J. Guajardo and C. Paar, "Efficient algorithms for elliptic curve cryptosystems," Advances in Cryptology, Proc. Crypto'97, LNCS 1294, B. Kaliski, Ed., Springer-Verlag, 1997, pp. 342-356.
-
(1997)
Advances in Cryptology, Proc. Crypto'97, LNCS 1294
, pp. 342-356
-
-
Guajardo, J.1
Paar, C.2
-
8
-
-
85048643420
-
Public-key cryptosystems with very small key length
-
R.A. Ruep-pel, Ed., Springer-Verlag
-
G. Harper, A. Menezes and S. Vanstone, "Public-key cryptosystems with very small key length," Advances in Cryptology, Proc. Eurocrypt'92, LNCS 658, R.A. Ruep-pel, Ed., Springer-Verlag, 1993, pp. 163-173.
-
(1993)
Advances in Cryptology, Proc. Eurocrypt'92, LNCS 658
, pp. 163-173
-
-
Harper, G.1
Menezes, A.2
Vanstone, S.3
-
10
-
-
0003657590
-
-
nd Edition, Addison-Wesley, Reading, Mass
-
nd Edition, Addison-Wesley, Reading, Mass., 1981.
-
(1981)
The Art of Computer Programming, Vol. 2, Semi-Numerical Algorithms
-
-
Knuth, D.1
-
12
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz, "Elliptic curve cryptosystems," Mathematics of Computation, Vol. 48, no. 177 (1987), pp. 203-209.
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
13
-
-
0001258323
-
Factoring integers with elliptic curves
-
H.W. Lenstra Jr., "Factoring integers with elliptic curves," Annals of Mathematics, Vol. 126 (1987), pp. 649-673.
-
(1987)
Annals of Mathematics
, vol.126
, pp. 649-673
-
-
Lenstra, H.W.1
-
15
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
A. Menezes, T. Okamoto and S. Vanstone, "Reducing elliptic curve logarithms to logarithms in a finite field," IEEE Transactions on Information Theory, Vol. 39 (1993), pp. 1639-1646.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, pp. 1639-1646
-
-
Menezes, A.1
Okamoto, T.2
Vanstone, S.3
-
17
-
-
85015402934
-
Use of elliptic curves in cryptography
-
H.C. Williams, Ed., Springer-Verlag
-
V.S. Miller, "Use of elliptic curves in cryptography," Advances in Cryptology Proc. Crypto'85, LNCS 218, H.C. Williams, Ed., Springer-Verlag, 1985, pp. 417-426.
-
(1985)
Advances in Cryptology Proc. Crypto'85, LNCS 218
, pp. 417-426
-
-
Miller, V.S.1
-
18
-
-
2142786147
-
Efficient elliptic curve exponentiation
-
Y. Han, T. Okamoto and S. Qing, Eds., Springer-Verlag
-
A. Miyaji, T. Ono and H. Cohen, "Efficient elliptic curve exponentiation," Proceedings of ICICS'97, LNCS 1334, Y. Han, T. Okamoto and S. Qing, Eds., Springer-Verlag, 1997, pp. 282-290.
-
(1997)
Proceedings of ICICS'97, LNCS 1334
, pp. 282-290
-
-
Miyaji, A.1
Ono, T.2
Cohen, H.3
-
20
-
-
84979045830
-
-
http://grouper.ieee.org/groups/1363/.
-
-
-
-
21
-
-
0343623059
-
Fermat quotients and the polynomial time discrete log algorithm for anomalous elliptic curves
-
T. Satoh and K. Araki, "Fermat quotients and the polynomial time discrete log algorithm for anomalous elliptic curves," Commentarii Math. Univ. St. Pauli, Vol. 47 (1998), pp. 81-92.
-
(1998)
Commentarii Math. Univ. St. Pauli
, vol.47
, pp. 81-92
-
-
Satoh, T.1
Araki, K.2
-
23
-
-
84957657892
-
Fast key exchange with elliptic curve systems
-
D. Coppersmith, Ed., Springer-Verlag
-
R. Schroeppel, H. Orman, S. O'Malley and O. Spatscheck, "Fast key exchange with elliptic curve systems," Advances in Cryptology, Proc. Crypto'95, LNCS 963, D. Coppersmith, Ed., Springer-Verlag, 1995, pp. 43-56.
-
(1995)
Advances in Cryptology, Proc. Crypto'95, LNCS 963
, pp. 43-56
-
-
Schroeppel, R.1
Orman, H.2
O'Malley, S.3
Spatscheck, O.4
-
24
-
-
0002474948
-
Performance comparison of public-key cryptosystems
-
Summer
-
M. Wiener, "Performance comparison of public-key cryptosystems," Crypto Bytes, Vol. 4., No. 1, Summer 1998, pp. 1-5.
-
(1998)
Crypto Bytes
, vol.4
, Issue.1
, pp. 1-5
-
-
Wiener, M.1
-
25
-
-
84978998250
-
-
http://www.x9.org/.
-
-
-
|