-
3
-
-
84957677506
-
Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms
-
H. Krawczyk, editor, Advances in Cryptology - CRYPTO '98, Berlin, Germany, Springer-Verlag
-
D. V. Bailey and C. Paar. Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms. In H. Krawczyk, editor, Advances in Cryptology - CRYPTO '98, volume LNCS 1462, pages 472-485, Berlin, Germany, 1998. Springer-Verlag.
-
(1998)
LNCS
, vol.1462
, pp. 472-485
-
-
Bailey, D.V.1
Paar, C.2
-
4
-
-
0001224411
-
Efficient arithmetic in finite held extensions with application in elliptic curve cryptography
-
D. V. Bailey and C. Paar. Efficient arithmetic in finite held extensions with application in elliptic curve cryptography. Journal of Cryptology, 14(3):153-176, 2001.
-
(2001)
Journal of Cryptology
, vol.14
, Issue.3
, pp. 153-176
-
-
Bailey, D.V.1
Paar, C.2
-
5
-
-
84937428623
-
Efficient Algorithms for Pairing-Based Cryptosystems
-
M. Yung, editor, Advances in Cryptology - CRYPTO 2002, Springer-Verlag
-
P. S. L. M. Barreto, H. Y. Kim, B. Lynn, and M. Scott. Efficient Algorithms for Pairing-Based Cryptosystems. In M. Yung, editor, Advances in Cryptology - CRYPTO 2002, volume LNCS 2442, pages 354-368. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 354-368
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Lynn, B.3
Scott, M.4
-
6
-
-
21344485198
-
Constructive problems for irreducible polynomials over finite fields
-
Springer-Verlag
-
Blake, Gao, and Lambert. Constructive problems for irreducible polynomials over finite fields. In Information Theory and Applications, pages 1-23. Springer-Verlag, 1993.
-
(1993)
Information Theory and Applications
, pp. 1-23
-
-
Blake1
Gao2
Lambert3
-
7
-
-
84946840347
-
Short signatures from the Weil pairing
-
J. Boyd, editor, Advances in Cryptology - Asiacrypt 2001, Springer-Verlag
-
D. Boneh, B.Lynn, and H. Shacham. Short signatures from the Weil pairing. In J. Boyd, editor, Advances in Cryptology - Asiacrypt 2001, volume LNCS 2148, pages 514-532. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2148
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
8
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
J. Kilian, editor, Advances in Cryptology - CRYPTO 2001, Springer-Verlag
-
D. Boneh and M. Franklin. Identity-Based Encryption from the Weil Pairing. In J. Kilian, editor, Advances in Cryptology - CRYPTO 2001, volume LNCS 2139, pages 213-229. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
9
-
-
0029308383
-
Fast Combinatorial RNS Processors for DSP Applications
-
May
-
E. D. Di Claudio, F. Piazza, and G. Orlandi. Fast Combinatorial RNS Processors for DSP Applications. IEEE Transactions on Computers, 44(5):624-633, May 1995.
-
(1995)
IEEE Transactions on Computers
, vol.44
, Issue.5
, pp. 624-633
-
-
Di Claudio, E.D.1
Piazza, F.2
Orlandi, G.3
-
10
-
-
82955246861
-
Implementing the Tate Pairing
-
C. Fieker and D. Kohel, editors, Algorithmic Number Theory - ANTS-V, Springer-Verlag
-
S. D. Galbraith, K. Harrison, and D. Soldera. Implementing the Tate Pairing. In C. Fieker and D. Kohel, editors, Algorithmic Number Theory - ANTS-V, volume LNCS 2369, pages 324-337. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2369
, pp. 324-337
-
-
Galbraith, S.D.1
Harrison, K.2
Soldera, D.3
-
12
-
-
31244434390
-
Itoh-Tsujii Inversion in Standard Basis and Its Application in Cryptography and Codes
-
February
-
J. Guajardo and C. Paar. Itoh-Tsujii Inversion in Standard Basis and Its Application in Cryptography and Codes. Design, Codes, and Cryptography, 25(2):207-216, February 2002.
-
(2002)
Design, Codes, and Cryptography
, vol.25
, Issue.2
, pp. 207-216
-
-
Guajardo, J.1
Paar, C.2
-
15
-
-
84957797971
-
Exponentiation in Finite Fields: Theory and Practice
-
T. Mora and H. Mattson, editors, Applied Algebra, Agebraic Algorithms and Error Correcting Codes - AAECC-12, Springer-Verlag
-
J. von zur Gathen and M. Nöcker. Exponentiation in Finite Fields: Theory and Practice. In T. Mora and H. Mattson, editors, Applied Algebra, Agebraic Algorithms and Error Correcting Codes - AAECC-12, volume LNCS 1255, pages 88-113. Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1255
, pp. 88-113
-
-
Von Zur Gathen, J.1
Nöcker, M.2
-
17
-
-
84946844750
-
A one-round protocol for tripartite Diffie-Hellman
-
W. Bosma, editor, Algorithmic Number Theory - ANTS-IV, Springer-Verlag
-
A. Joux. A one-round protocol for tripartite Diffie-Hellman. In W. Bosma, editor, Algorithmic Number Theory - ANTS-IV, volume LNCS 1838, pages 385-394. Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1838
, pp. 385-394
-
-
Joux, A.1
-
19
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz. Elliptic curve cryptosystems. Mathematics of Computation, 48:203-209, 1987.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
20
-
-
0024864204
-
Hyperelliptic cryptosystems
-
N. Koblitz. Hyperelliptic cryptosystems. Journal of Cryptology, 1(3):129-150, 1989.
-
(1989)
Journal of Cryptology
, vol.1
, Issue.3
, pp. 129-150
-
-
Koblitz, N.1
-
21
-
-
84957705004
-
An elliptic curve implementation of the finite field digital signature algorithm
-
H. Krawczyk, editor, Advances in Cryptology - CRYPTO 98, Springer-Verlag
-
N. Koblitz. An elliptic curve implementation of the finite field digital signature algorithm. In H. Krawczyk, editor, Advances in Cryptology - CRYPTO 98, volume LNCS 1462, pages 327-337. Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1462
, pp. 327-337
-
-
Koblitz, N.1
-
22
-
-
0001936794
-
Finite Fields
-
Addison-Wesley, Reading, Massachusetts, USA
-
R. Lidl and H. Niederreiter. Finite Fields, volume 20 of Encyclopedia of Mathematics and its Applications. Addison-Wesley, Reading, Massachusetts, USA, 1983.
-
(1983)
Encyclopedia of Mathematics and Its Applications
, vol.20
-
-
Lidl, R.1
Niederreiter, H.2
-
23
-
-
0002912404
-
-
Rapport de recherche no. 3918, INRIA, April
-
3. Rapport de recherche no. 3918, INRIA, April 2000.
-
(2000)
3
-
-
Loidreau, P.1
-
24
-
-
85015402934
-
Uses of elliptic curves in cryptography
-
H. C. Williams, editor, Advances in Cryptology - CRYPTO '85, Berlin, Germany, Springer-Verlag
-
V. Miller. Uses of elliptic curves in cryptography. In H. C. Williams, editor, Advances in Cryptology - CRYPTO '85, volume LNCS 218, pages 417-426, Berlin, Germany, 1986. Springer-Verlag.
-
(1986)
LNCS
, vol.218
, pp. 417-426
-
-
Miller, V.1
-
27
-
-
68549097842
-
m)
-
C. K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2000, Springer-Verlag
-
m). In C. K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2000, volume LNCS 1965, pages 41-56. Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1965
, pp. 41-56
-
-
Orlando, G.1
Paar, C.2
-
29
-
-
3142668308
-
Hardware implementation of finite fields of characteristic three
-
B. S. Kaliski, Jr., Ç. K. Koç, and C. Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, Springer-Verlag
-
D. Page and N. P. Smart. Hardware implementation of finite fields of characteristic three. In B. S. Kaliski, Jr., Ç. K. Koç, and C. Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, volume LNCS. Springer-Verlag, 2002.
-
(2002)
LNCS
-
-
Page, D.1
Smart, N.P.2
-
30
-
-
0002904957
-
A Low-Complexity Combinatorial RNS Multiplier
-
July
-
V. Paliouras, K. Karagianni, and T. Stouraitis. A Low-Complexity Combinatorial RNS Multiplier. IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, 48(7):675-683, July 2001.
-
(2001)
IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing
, vol.48
, Issue.7
, pp. 675-683
-
-
Paliouras, V.1
Karagianni, K.2
Stouraitis, T.3
-
32
-
-
0000702044
-
Elliptic Curve Cryptosystems over Small Fields of Odd Characteristic
-
Spring
-
N. Smart. Elliptic Curve Cryptosystems over Small Fields of Odd Characteristic. Journal of Cryptology, 12(2):141-151, Spring 1999.
-
(1999)
Journal of Cryptology
, vol.12
, Issue.2
, pp. 141-151
-
-
Smart, N.1
-
33
-
-
0032115233
-
Low energy digit-serial/parallel finite field multipliers
-
June
-
L. Song and K. K. Parhi. Low energy digit-serial/parallel finite field multipliers. Journal of VLSI Signal Processing, 19(2):149-166, June 1998.
-
(1998)
Journal of VLSI Signal Processing
, vol.19
, Issue.2
, pp. 149-166
-
-
Song, L.1
Parhi, K.K.2
-
34
-
-
84946849368
-
Self-blindable Credential Certificates from the Weil Pairing
-
C. Boyd, editor, Advances in Cryptology - Asiacrypt 2001, Springer-Verlag
-
E. Verheul. Self-blindable Credential Certificates from the Weil Pairing. In C. Boyd, editor, Advances in Cryptology - Asiacrypt 2001, volume LNCS 2248, pages 533-551. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 533-551
-
-
Verheul, E.1
|