-
1
-
-
27244460362
-
n"
-
n," Designs, Codes, and Cryptography, vol. 37, pp. 493-507, 2005.
-
(2005)
Designs, Codes, and Cryptography
, vol.37
, pp. 493-507
-
-
Ahmadi, O.1
Menezes, A.2
-
2
-
-
33747067531
-
"Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA)"
-
ANSI X.962
-
ANSI X.962, "Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA ,"Am. Nat'l Standards Inst., 1999.
-
(1999)
Am. Nat'l Standards Inst.
-
-
-
3
-
-
0000753472
-
"Low Complexity Normal Bases"
-
D.W. Ash, I.F. Blake, and S.A. Vanstone, "Low Complexity Normal Bases," Discrete Applied Math., vol. 25, pp. 191-210, 1989.
-
(1989)
Discrete Applied Math.
, vol.25
, pp. 191-210
-
-
Ash, D.W.1
Blake, I.F.2
Vanstone, S.A.3
-
4
-
-
0012703743
-
n) through Palindromic Representation"
-
Technical Report HPL-98-134, Hewlett-Packard
-
n) through Palindromic Representation," Technical Report HPL-98-134, Hewlett-Packard, 1998.
-
(1998)
-
-
Blake, I.F.1
Roth, R.M.2
Seroussi, G.3
-
5
-
-
0000895310
-
m )Yielding Small Complexity Arithmetic Circuits"
-
Sept
-
m)Yielding Small Complexity Arithmetic Circuits," IEEE Trans. Computers, vol. 47, no. 9, pp. 938-946, Sept. 1998.
-
(1998)
IEEE Trans. Computers
, vol.47
, Issue.9
, pp. 938-946
-
-
Drolet, G.1
-
6
-
-
33747082235
-
n)"
-
Cryptology ePrint Archive, Report 2004/126
-
n)," Cryptology ePrint Archive, Report 2004/126, 2004.
-
(2004)
-
-
Fan, H.1
Dai, Y.2
-
7
-
-
77952404217
-
"Digital Signature Standard (DSS)"
-
FIPS 186-2, Nat'l Inst. of Standards and Technology
-
FIPS 186-2, "Digital Signature Standard (DSS),"Federal Information Processing Standards Publication 186-2, Nat'l Inst. of Standards and Technology, 2000.
-
(2000)
Federal Information Processing Standards Publication 186-2
-
-
-
8
-
-
3242670828
-
"Field Inversion and Point Halving Revisited"
-
Aug
-
K. Fong, D. Hankerson, J. López, and A. Menezes, "Field Inversion and Point Halving Revisited," IEEE Trans. Computers, vol. 53, no. 8, pp. 1047-1059, Aug. 2004.
-
(2004)
IEEE Trans. Computers
, vol.53
, Issue.8
, pp. 1047-1059
-
-
Fong, K.1
Hankerson, D.2
López, J.3
Menezes, A.4
-
9
-
-
0000185837
-
"Algorithms for Exponentiation in Finite Fields"
-
S. Gao, J. von zur Gathen, D. Panario, and V. Shoup, "Algorithms for Exponentiation in Finite Fields," J. Symbolic Computation, vol. 29, pp. 879-889, 2000.
-
(2000)
J. Symbolic Computation
, vol.29
, pp. 879-889
-
-
Gao, S.1
von zur Gathen, J.2
Panario, D.3
Shoup, V.4
-
10
-
-
0001788567
-
"Constructive and Destructive Facets of Weil Descent on Elliptic Curves"
-
P. Gaudry, F. Hess, and N. Smart, "Constructive and Destructive Facets of Weil Descent on Elliptic Curves," J. Cryptology, vol. 15, pp. 19-46, 2002.
-
(2002)
J. Cryptology
, vol.15
, pp. 19-46
-
-
Gaudry, P.1
Hess, F.2
Smart, N.3
-
11
-
-
23044475619
-
"Hardware and Software Normal Basis Arithmetic for Pairing Based Cryptography in Characteristic Three"
-
July
-
R. Granger, D. Page, and M. Stam, "Hardware and Software Normal Basis Arithmetic for Pairing Based Cryptography in Characteristic Three," IEEE Trans. Computers, vol. 54, no. 7, pp. 852-860, July 2005.
-
(2005)
IEEE Trans. Computers
, vol.54
, Issue.7
, pp. 852-860
-
-
Granger, R.1
Page, D.2
Stani, M.3
-
13
-
-
0038670954
-
"Software Implementation of Elliptic Curve Cryptography over Binary Fields"
-
D. Hankerson, J. López, and A. Menezes, "Software Implementation of Elliptic Curve Cryptography over Binary Fields," Proc. Cryptographic Hardware and Embedded Systems (CHES 2000), pp. 1-24, 2000.
-
(2000)
Proc. Cryptographic Hardware and Embedded Systems (CHES 2000)
, pp. 1-24
-
-
Hankerson, D.1
López, J.2
Menezes, A.3
-
15
-
-
0001492981
-
"A Modified Massy-Omura Parallel Multiplier for a Class of Finite Fields"
-
Oct
-
M.A. Hasan, M.Z. Wang, and V.K. Bhargava, "A Modified Massy-Omura Parallel Multiplier for a Class of Finite Fields," IEEE Trans. Computers, vol. 42, no. 10, pp. 1278-1280, Oct. 1993.
-
(1993)
IEEE Trans. Computers
, vol.42
, Issue.10
, pp. 1278-1280
-
-
Hasan, M.A.1
Wang, M.Z.2
Bhargava, V.K.3
-
16
-
-
0038639373
-
"Low Complexity Multiplication in a Finite Field Using Ring Representation"
-
Apr
-
R. Katti and J. Brennan, "Low Complexity Multiplication in a Finite Field Using Ring Representation," IEEE Trans. Computers, vol. 52, no. 4, pp. 418-427, Apr. 2003.
-
(2003)
IEEE Trans. Computers
, vol.52
, Issue.4
, pp. 418-427
-
-
Katti, R.1
Brennan, J.2
-
19
-
-
0002842804
-
k)"
-
k)," Designs, Codes, and Cryptography, vol. 14, pp. 57-69, 1998.
-
(1998)
Designs, Codes, and Cryptography
, vol.14
, pp. 57-69
-
-
Koç, Ç.1
Acar, T.2
-
22
-
-
0004216195
-
"Computational Method and Apparatus for Finite Field Arithmetic"
-
US Patent No. 4,587,627
-
J.L. Massey and J.K. Omura, "Computational Method and Apparatus for Finite Field Arithmetic," US Patent No. 4,587,627, 1986.
-
(1986)
-
-
Massey, J.L.1
Omura, J.K.2
-
23
-
-
11344252143
-
"Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree"
-
M. Maurer, A. Menezes, and E. Teske, "Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree," LMS J. Computation and Math., vol. 5, pp. 127-174, 2002.
-
(2002)
LMS J. Computation and Math.
, vol.5
, pp. 127-174
-
-
Maurer, M.1
Menezes, A.2
Teske, E.3
-
24
-
-
45549114790
-
n)"
-
n)," Discrete Applied Math., vol. 22, pp. 149-161, 1988/1989.
-
(1988)
Discrete Applied Math.
, vol.22
, pp. 149-161
-
-
Mullin, R.1
Onyszchuk, I.2
Vanstone, S.3
Wilson, R.4
-
25
-
-
84956974817
-
"Efficient Software Implementation for Finite Field Multiplication in Normal Basis"
-
P. Ning and Y. Yin, "Efficient Software Implementation for Finite Field Multiplication in Normal Basis," Proc. Information and Comm. Security 2001, pp. 177-189, 2001.
-
(2001)
Proc. Information and Comm. Security 2001
, pp. 177-189
-
-
Ning, P.1
Yin, Y.2
-
26
-
-
33747034323
-
"Efficient Algorithms and Architectures for Field Multiplication Using Gaussian Normal Bases"
-
Technical Report CACR 2004-04, Univ. of Waterloo, Canada, 2004, revised in Jan
-
A. Reyhani-Masoleh, "Efficient Algorithms and Architectures for Field Multiplication Using Gaussian Normal Bases," Technical Report CACR 2004-04, Univ. of Waterloo, Canada, 2004, revised in IEEE Trans. Computers, vol. 55, no. 1, pp. 34-47, Jan. 2006.
-
(2006)
IEEE Trans. Computers
, vol.55
, Issue.1
, pp. 34-47
-
-
Reyhani-Masoleh, A.1
-
27
-
-
0242493840
-
"Fast Normal Basis Multiplication Using General Purpose Processors"
-
Nov
-
A. Reyhani-Masoleh and M.A. Hasan, "Fast Normal Basis Multiplication Using General Purpose Processors," IEEE Trans. Computers, vol. 52, no. 11, pp. 1379-1390, Nov. 2003.
-
(2003)
IEEE Trans. Computers
, vol.52
, Issue.11
, pp. 1379-1390
-
-
Reyhani-Masoleh, A.1
Hasan, M.A.2
-
28
-
-
33747037361
-
"Elliptic Curves: Twice as Fast!"
-
Presentation at the CRYPTO 2000 Rump Session
-
R. Schroeppel, "Elliptic Curves: Twice as Fast!" Presentation at the CRYPTO 2000 Rump Session, 2000.
-
(2000)
-
-
Schroeppel, R.1
-
29
-
-
0010029876
-
"Efficient Arithmetic on Koblitz Curves"
-
J. Solinas, "Efficient Arithmetic on Koblitz Curves," Designs, Codes, and Cryptography, vol. 19, pp. 195-249, 2000.
-
(2000)
Designs, Codes, and Cryptography
, vol.19
, pp. 195-249
-
-
Solinas, J.1
-
30
-
-
0035107422
-
"An Efficient Optimal Normal Basis Type II Multiplier"
-
Jan
-
B. Sunar and Ç.K. Koç, "An Efficient Optimal Normal Basis Type II Multiplier," IEEE Trans. Computers, vol. 50, no. 1, pp. 83-87, Jan. 2001.
-
(2001)
IEEE Trans. Computers
, vol.50
, Issue.1
, pp. 83-87
-
-
Sunar, B.1
Koç, Ç.K.2
-
32
-
-
24944589102
-
"Polynomial and Normal Bases for Finite Fields"
-
J. von zur Gathen and M. Nöcker, "Polynomial and Normal Bases for Finite Fields, " J. Cryptology, 2005.
-
(2005)
J. Cryptology
-
-
von zur Gathen, J.1
Nöcker, M.2
-
33
-
-
0036859286
-
"Finite Field Multiplier Using Redundant Representation"
-
Nov
-
H. Wu, A. Hasan, I.F. Blake, and S. Gao, "Finite Field Multiplier Using Redundant Representation," IEEE Trans. Computers, vol. 51, no. 11, pp. 1306-1316, Nov. 2002.
-
(2002)
IEEE Trans. Computers
, vol.51
, Issue.11
, pp. 1306-1316
-
-
Wu, H.1
Hasan, A.2
Blake, I.F.3
Gao, S.4
|