메뉴 건너뛰기




Volumn , Issue , 2006, Pages 3374-3377

Faster elliptic curve point multiplication based on a novel greedy base-2,3 method

Author keywords

[No Author keywords available]

Indexed keywords

ELLIPTIC CURVE POINT MULTIPLICATION; ELLIPTIC CURVES; PRE-COMPUTATION TECHNIQUE;

EID: 34547311264     PISSN: 02714310     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (1)

References (16)
  • 1
    • 0017930809 scopus 로고
    • A method for Obtaining Digital Signatures and Public-key Cryptosystem
    • February
    • R. L. Rivest, A. Shamir, and L. Adleman, "A method for Obtaining Digital Signatures and Public-key Cryptosystem," Communications of ACM, vol. 21, no. 2, pp. 120-126, February 1978.
    • (1978) Communications of ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 2
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Online, Available
    • W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, vol. IT-22, no. 6, pp. 644-654, 1976. [Online]. Available: citeseer.ist.psu.edu/diffie76new.html
    • (1976) IEEE Transactions on Information Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 4
    • 84968503742 scopus 로고
    • Elliptic Curve Cryptosystems
    • January
    • N. Koblitz, "Elliptic Curve Cryptosystems," Mathematics of Computation, vol. 48, no. 177, pp. 203 209, January 1987.
    • (1987) Mathematics of Computation , vol.48 , Issue.177 , pp. 203-209
    • Koblitz, N.1
  • 5
    • 4243378405 scopus 로고    scopus 로고
    • An overview of elliptic curve cryptography
    • Technical Report, Online, Available
    • J. Lopez and R. Dahab, "An overview of elliptic curve cryptography," Technical Report, 2000. [Online]. Available: citeseer.ist.psu.edu/lop00overview.html
    • (2000)
    • Lopez, J.1    Dahab, R.2
  • 6
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
    • Proceedings of the 16th Annual International Cryptology Conference CRYPTO, Santa Barbara, CA, Aug
    • P. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," in Proceedings of the 16th Annual International Cryptology Conference (CRYPTO), ser. Lecture Notes in Computer Science, vol. 1109, Santa Barbara, CA, Aug. 1996, pp. 104-113.
    • (1996) ser. Lecture Notes in Computer Science , vol.1109 , pp. 104-113
    • Kocher, P.1
  • 7
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Online, Available
    • P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," Lecture Notes in Computer Science, vol. 1666, pp. 388-397, 1999. [Online]. Available: citeseer.ist.psu.edu/kocher99.differential.html
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 8
    • 84858083651 scopus 로고    scopus 로고
    • Online, Available
    • Acoustic Cryptanalysis. [Online]. Available: http://www.wisdom.weizmann. ac.il/~tromier/acoustic/
    • Acoustic Cryptanalysis
  • 9
    • 84958979095 scopus 로고    scopus 로고
    • Weierstraß Elliptic Curves and Side-Channel Attacks
    • Public Key Cryptography: 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC, Paris, France, Feb
    • E. Brier and M. Joye, "Weierstraß Elliptic Curves and Side-Channel Attacks," in Public Key Cryptography: 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, ser. Lecture Notes in Computer Science, vol. 2274, Paris, France, Feb. 2002, pp. 335-345.
    • (2002) ser. Lecture Notes in Computer Science , vol.2274 , pp. 335-345
    • Brier, E.1    Joye, M.2
  • 10
    • 84968484435 scopus 로고
    • Speeding the Pollard and Elliptic Curve Methods of Factorization
    • January
    • P. L. Montgomery, "Speeding the Pollard and Elliptic Curve Methods of Factorization," Mathematics of Computation, vol. 48, no. 177, pp. 243-264, January 1987.
    • (1987) Mathematics of Computation , vol.48 , Issue.177 , pp. 243-264
    • Montgomery, P.L.1
  • 13
    • 34547378052 scopus 로고    scopus 로고
    • M. Ciet, M. Joye, K. Lauter, and P. L. Montgomery, Trading Inversions for Multiplications in Elliptic Curve Cryptography, 2003. [Online]. Available: eprint.iacr.org/2003/257/
    • M. Ciet, M. Joye, K. Lauter, and P. L. Montgomery, "Trading Inversions for Multiplications in Elliptic Curve Cryptography," 2003. [Online]. Available: eprint.iacr.org/2003/257/
  • 14
    • 25544451391 scopus 로고    scopus 로고
    • An Efficient Procedure to Double and Add Points on an Elliptic Curve
    • Online, Available: research.microsoft.com/crypto
    • K. Eisentrager, K. Lauter, and P. L. Montgomery, "An Efficient Procedure to Double and Add Points on an Elliptic Curve," 2002. [Online]. Available: research.microsoft.com/crypto/
    • (2002)
    • Eisentrager, K.1    Lauter, K.2    Montgomery, P.L.3
  • 16
    • 13244286640 scopus 로고    scopus 로고
    • A hardware algorithm for modular multiplication/division
    • M. E. Kaihara and N. Takagi, "A hardware algorithm for modular multiplication/division," IEEE Transactions on Computers, vol. 54, no. 1, pp. 12-21, 2005.
    • (2005) IEEE Transactions on Computers , vol.54 , Issue.1 , pp. 12-21
    • Kaihara, M.E.1    Takagi, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.