-
2
-
-
0003442756
-
-
[BSS99] Cambridge University Press
-
[BSS99] Blake, I., Seroussi, G., and Smart, N., Elliptic Curves in Cryptography, Cambridge University Press, 1999.
-
(1999)
Elliptic Curves in Cryptography
-
-
Blake, I.1
Seroussi, G.2
Smart, N.3
-
3
-
-
84937564555
-
-
[BHLM01] Topics in Cryptology - CT-RSA 2001, LNCS 2020, (2001)
-
[BHLM01] Brown, M., Hankerson, D., Lopez, J., and Menezes, A., Software Implementation of the NIST Elliptic Curves Over Prime Fields, Topics in Cryptology - CT-RSA 2001, LNCS 2020, (2001), 250-265.
-
Software Implementation of the NIST Elliptic Curves over Prime Fields
, pp. 250-265
-
-
Brown, M.1
Hankerson, D.2
Lopez, J.3
Menezes, A.4
-
4
-
-
0001146101
-
-
[Boo51]
-
[Boo51] Booth, A., A signed binary multiplication technique, Journ. Mech. and Applied Math., 4(2), (1951), 236-240.
-
(1951)
A Signed Binary Multiplication Technique, Journ. Mech. and Applied Math.
, vol.4
, Issue.2
, pp. 236-240
-
-
Booth, A.1
-
5
-
-
84947743704
-
-
[CMO98] LNCS1514
-
[CMO98] Cohen, H., Miyaji, A., and Ono, T., Efficient Elliptic Curve Exponentiation Using Mixed Coordinates, Advances in Cryptology - ASIACRYPT '98, LNCS1514, (1998), 51-65.
-
(1998)
Efficient Elliptic Curve Exponentiation Using Mixed Coordinates, Advances in Cryptology - ASIACRYPT '98
, pp. 51-65
-
-
Cohen, H.1
Miyaji, A.2
Ono, T.3
-
6
-
-
0028764220
-
-
[EK94]
-
[EK94] Egecioglu, Ö, and Koc, C, Exponentiation using Canonical Recoding, Theoretical Computer Science, 129(2), (1994), 407-417.
-
(1994)
Exponentiation Using Canonical Recoding, Theoretical Computer Science
, vol.129
, Issue.2
, pp. 407-417
-
-
Egecioglu, Ö.1
Koc, C.2
-
7
-
-
0000490812
-
-
[Gor98]
-
[Gor98] Gordon, D., A survey of fast exponentiation methods, Journal of Algorithms, vol.27, (1998), 129-146.
-
(1998)
A Survey of Fast Exponentiation Methods, Journal of Algorithms
, vol.27
, pp. 129-146
-
-
Gordon, D.1
-
9
-
-
0024715942
-
-
[JM89]
-
[JM89] Jedwab, J., and Mitchell, C.J., Minimum Weight Modified Signed-digit Representations and Fast Exponentiation, Electronics Letters 25, (1989), 1171-1172.
-
(1989)
Minimum Weight Modified Signed-digit Representations and Fast Exponentiation, Electronics Letters
, vol.25
, pp. 1171-1172
-
-
Jedwab, J.1
Mitchell, C.J.2
-
10
-
-
0034215450
-
-
[JY00]
-
[JY00] Joye, M., and Yen, S.-M., Optimal Left-to-Right Binary Signed-digit Exponent Recoding, IEEE Transactions on Computers 49(7), (2000), 740-748.
-
(2000)
Optimal Left-to-Right Binary Signed-digit Exponent Recoding, IEEE Transactions on Computers
, vol.49
, Issue.7
, pp. 740-748
-
-
Joye, M.1
Yen, S.-M.2
-
11
-
-
0003657590
-
-
[Knu81] Seminumerical Algorithms, 2nd ed., Addison-Wesley, Reading, Mass.
-
[Knu81] Knuth, D. E., The art of computer programmming, vol. 2, Seminumerical Algorithms, 2nd ed., Addison-Wesley, Reading, Mass. (1981).
-
(1981)
The Art of Computer Programmming
, vol.2
-
-
Knuth, D.E.1
-
13
-
-
84957354181
-
-
[KT92]
-
[KT92] Koyama, K. and Tsuruoka, Y., Speeding Up Elliptic Curve Cryptosystems using a Signed Binary Windows Method, Advances in Cryptology -CRYPTO '92, LNCS740, (1992), 345-357.
-
(1992)
Speeding Up Elliptic Curve Cryptosystems Using A Signed Binary Windows Method, Advances in Cryptology -CRYPTO '92, LNCS740
, pp. 345-357
-
-
Koyama, K.1
Tsuruoka, Y.2
-
14
-
-
85015402934
-
-
[Mil86]
-
[Mil86] Miller, V.S., Use of Elliptic Curves in Cryptography, Advances in Cryptology - CRYPTO '85, LNCS218, (1986), 417-426.
-
(1986)
Use of Elliptic Curves in Cryptography, Advances in Cryptology - CRYPTO '85, LNCS218
, pp. 417-426
-
-
Miller, V.S.1
-
15
-
-
0000266095
-
-
[MO90]
-
[MO90] Morain, P., Olivos, J., Speeding Up the Computations on an Elliptic Curve using Addition-Subtraction Chains, Informa. Theor. Appl., 24, (1990), pp.531-543.
-
(1990)
Speeding Up the Computations on An Elliptic Curve Using Addition-Subtraction Chains, Informa. Theor. Appl.
, vol.24
, pp. 531-543
-
-
Morain, P.1
Olivos, J.2
-
16
-
-
2142786147
-
-
[MOC97] ICICS 1997, LNCS 1334
-
[MOC97] Miyaji, A., Ono, T., and Cohen, H., Efficient Elliptic Curve Exponentiation, Information and Communication Security, ICICS 1997, LNCS 1334, (1997), 282-291.
-
(1997)
Efficient Elliptic Curve Exponentiation, Information and Communication Security
, pp. 282-291
-
-
Miyaji, A.1
Ono, T.2
Cohen, H.3
-
17
-
-
84944878354
-
-
[MOV96] CRC Press
-
[MOV96] Menezes, A., van Oorschot, P. and Vanstone, S., Handbook of Applied Cryptography, CRC Press, 1996.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
18
-
-
35248820671
-
-
[Möl02] The 5th International Conference on Information Security and Cryptology (ICISC 2002), LNCS 2587
-
[Möl02] Möller, B., Improved Techniques for Fast Exponentiation, The 5th International Conference on Information Security and Cryptology (ICISC 2002), LNCS 2587, (2003), 298-312.
-
(2003)
Improved Techniques for Fast Exponentiation
, pp. 298-312
-
-
Möller, B.1
-
19
-
-
84957671552
-
-
[OCo99]
-
[OCo99] O'Connor, L., An Analysis of Exponentiation Based on Formal Languages, Advances in Cryptology - EUROCRYPT '99, LNCS1592, (1999), 375-388.
-
(1999)
An Analysis of Exponentiation Based on Formal Languages, Advances in Cryptology - EUROCRYPT '99, LNCS1592
, pp. 375-388
-
-
O'Connor, L.1
-
20
-
-
33947678491
-
-
[OSST04]
-
[OSST04] Okeya, K., Schmidt-Samoa, K., Spahn, C., Takagi, T., Signed Binary Representations Revisited, Cryptology ePrint Archive (2004). http://eprint.iacr.org/
-
Signed Binary Representations Revisited, Cryptology EPrint Archive
, vol.2004
-
-
Okeya, K.1
Schmidt-Samoa, K.2
Spahn, C.3
Takagi, T.4
-
22
-
-
77957223221
-
-
[Rei60]
-
[Rei60] Reitwiesner, G. W., Binary arithmetic, Advances in Computers, vol.1, (1960), 231-308.
-
(1960)
Binary Arithmetic, Advances in Computers
, vol.1
, pp. 231-308
-
-
Reitwiesner, G.W.1
-
23
-
-
0010029876
-
-
[SolOO]
-
[SolOO] Solinas, J.A., Efficient Arithmetic on Koblitz Curves, Designs, Codes and Cryptography, 19, (2000), 195-249.
-
(2000)
Efficient Arithmetic on Koblitz Curves, Designs, Codes and Cryptography
, vol.19
, pp. 195-249
-
-
Solinas, J.A.1
-
24
-
-
84947730530
-
-
[WMPW98]
-
[WMPW98] Win, E., Mister, S., Preneel, B., and Wiener, M., On the Performance of Signature Schemes Based on Elliptic Curves, Algorithmic Number Theory, ANTS-III, LNCS 1423, (1998), 252-266.
-
(1998)
On the Performance of Signature Schemes Based on Elliptic Curves, Algorithmic Number Theory, ANTS-III, LNCS 1423
, pp. 252-266
-
-
Win, E.1
Mister, S.2
Preneel, B.3
Wiener, M.4
|