-
5
-
-
84947743704
-
Efficient elliptic curve exponentiation using mixed coordinates
-
"Advances in Cryptology - ASIACRYPT '98", MR1726152
-
H. Cohen, A. Miyaji and T. Ono. Efficient Elliptic Curve Exponentiation Using Mixed Coordinates, in "Advances in Cryptology - ASIACRYPT '98", Lecture. Notes in Computer Science 1514 (1998), 51-65. MR1726152
-
(1998)
Lecture. Notes in Computer Science
, vol.1514
, pp. 51-65
-
-
Cohen, H.1
Miyaji, A.2
Ono, T.3
-
6
-
-
0000490812
-
A survey of fast exponentiation methods
-
MR1613189 (99g:94014)
-
D. M. Gordon. A Survey of Fast Exponentiation Methods. Journal of Algorithms 27 (1998), 129-146. MR1613189 (99g:94014)
-
(1998)
Journal of Algorithms
, vol.27
, pp. 129-146
-
-
Gordon, D.M.1
-
9
-
-
84957354181
-
Speeding up elliptic cryptosystems by using a signed binary window method
-
"Advances in Cryptology - CRYPTO '92", MR1287864
-
K. Koyama and Y. Tsuruoka. Speeding up Elliptic Cryptosystems by Using a Signed Binary Window Method, in "Advances in Cryptology - CRYPTO '92", Lecture Notes in Computer Science 740 (1993). 345-357. MR1287864
-
(1993)
Lecture Notes in Computer Science
, vol.740
, pp. 345-357
-
-
Koyama, K.1
Tsuruoka, Y.2
-
11
-
-
2142786147
-
Efficient elliptic curve exponentiation
-
"Information and Communication Security - ICICS '97"
-
A. Miyaji, T. Ono and H. Cohen. Efficient Elliptic Curve Exponentiation, in "Information and Communication Security - ICICS '97". Lecture Notes in Computer Science 1334 (1997), 282-290.
-
(1997)
Lecture Notes in Computer Science
, vol.1334
, pp. 282-290
-
-
Miyaji, A.1
Ono, T.2
Cohen, H.3
-
12
-
-
35248820671
-
Improved techniques for fast exponentiation
-
"Information Security and Cryptology - ICISC 2002", MR2080830
-
B. Möller. Improved Techniques for Fast Exponentiation, in "Information Security and Cryptology - ICISC 2002", Lecture Notes in Computer Science 2587 (2002), 298-312. MR2080830
-
(2002)
Lecture Notes in Computer Science
, vol.2587
, pp. 298-312
-
-
Möller, B.1
-
13
-
-
24144492572
-
New minimal weight representations for left-to-right window methods
-
Centre for Applied Cryptographic Research.
-
J. A. Muir and D. R. Stinson. New Minimal Weight Representations for Left-to-Right Window Methods, Technical Report CORR 2004-19, Centre for Applied Cryptographic Research. Available from http://www.cacr.math.uwaterloo.ca/ techreports/2004.
-
Technical Report CORR
, vol.2004
, Issue.19
-
-
Muir, J.A.1
Stinson, D.R.2
-
14
-
-
35048856946
-
Signed binary representations revisited
-
"Advances in Cryptology - CRYPTO 2004"
-
K. Okeya, K. Schmidt-Samoa, C. Spahn and T. Takagi. Signed Binary Representations Revisited, in "Advances in Cryptology - CRYPTO 2004", Lecture Notes in Computer Science 3152 (2004), 123-139.
-
(2004)
Lecture Notes in Computer Science
, vol.3152
, pp. 123-139
-
-
Okeya, K.1
Schmidt-Samoa, K.2
Spahn, C.3
Takagi, T.4
-
15
-
-
77957223221
-
Binary arithmetic
-
Academic Press, MR0122018 (22:12745)
-
G. W. Reitwiesner. Binary Arithmetic, in Advances in Computers, Vol. 1. Academic Press, 1960, pp. 231-308. MR0122018 (22:12745)
-
(1960)
Advances in Computers
, vol.1
, pp. 231-308
-
-
Reitwiesner, G.W.1
-
16
-
-
0010029876
-
Efficient arithmetic on Koblitz curves
-
MR.1759617 (2002k:14039)
-
J. A. Solinas. Efficient arithmetic on Koblitz curves. Designs, Codes and Cryptography 19 (2000), 195-249. MR.1759617 (2002k:14039)
-
(2000)
Designs, Codes and Cryptography
, vol.19
, pp. 195-249
-
-
Solinas, J.A.1
|