-
2
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
2
-
Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120-126
-
(1978)
Commun ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
3
-
-
0000112683
-
Elliptic curve cryptosystem
-
Koblitz N (1987) Elliptic curve cryptosystem. Math Comput 48:203-209
-
(1987)
Math Comput
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
4
-
-
85015402934
-
Uses of elliptic curves in cryptography
-
Williams HC (ed) Advances in cryptology: Proceedings of CRYPTO'85. Springer
-
Miller V (1985) Uses of elliptic curves in cryptography. In: Williams HC (ed) Advances in cryptology: Proceedings of CRYPTO'85, number 218 in lecture notes in computer science. Springer, pp 417-426
-
(1985)
Lecture Notes in Computer Science
, vol.218
, pp. 417-426
-
-
Miller, V.1
-
6
-
-
33645232695
-
Area-throughput trade-offs for fully pipelined 30 to 70 Gbits/s AES processors
-
4. April
-
Hodjat A, Verbauwhede I (2006) Area-throughput trade-offs for fully pipelined 30 to 70 Gbits/s AES processors. IEEE Trans Comput 55(4):366-372, April
-
(2006)
IEEE Trans Comput
, vol.55
, pp. 366-372
-
-
Hodjat, A.1
Verbauwhede, I.2
-
9
-
-
84876375076
-
Low-cost elliptic curve cryptography for wireless sensor networks
-
Proceedings of Third European Workshop on Security and Privacy in Ad Hoc and Sensor Networks. Springer
-
Batina L, Mentens N, Sakiyama K, Preneel B, Verbauwhede I (2006) Low-cost elliptic curve cryptography for wireless sensor networks. In: Proceedings of Third European Workshop on Security and Privacy in Ad Hoc and Sensor Networks, number 4357 in lecture notes in computer science. Springer, pp 415-429
-
(2006)
Lecture Notes in Computer Science
, vol.4357
, pp. 415-429
-
-
Batina, L.1
Mentens, N.2
Sakiyama, K.3
Preneel, B.4
Verbauwhede, I.5
-
10
-
-
33144457479
-
RFID security and privacy: A research survey
-
2. February
-
Juels A (2006) RFID security and privacy: a research survey. IEEE J Sel Areas Commun 24(2):381-394, February
-
(2006)
IEEE J Sel Areas Commun
, vol.24
, pp. 381-394
-
-
Juels, A.1
-
11
-
-
84957715741
-
Universally verifiable mix-net with verification work independent of the number of mix-servers
-
Nyberg N (ed) Advances in cryptology: proceedings of EUROCRYPT'98. Springer
-
Abe M (1998) Universally verifiable mix-net with verification work independent of the number of mix-servers. In: Nyberg N (ed) Advances in cryptology: proceedings of EUROCRYPT'98, number 1403 in lecture notes in computer science. Springer, pp 437-447
-
(1998)
Lecture Notes in Computer Science
, vol.1403
, pp. 437-447
-
-
Abe, M.1
-
13
-
-
33745177806
-
Private searching on streaming data
-
Shoup V (ed) Advances in cryptology: proceedings of CRYPTO'05. Springer
-
Ostrovsky R, WE Skeith III (2005) Private searching on streaming data. In: Shoup V (ed) Advances in cryptology: proceedings of CRYPTO'05, number 3621 in lecture notes in computer science. Springer, pp 223-240
-
(2005)
Lecture Notes in Computer Science
, vol.3621
, pp. 223-240
-
-
Ostrovsky, R.1
Skeith Iii, W.E.2
-
14
-
-
84944876350
-
The Hessian form of an elliptic curve
-
Koç ÇK, Naccache D, Paar C (eds), Springer Paris, France. May 14-16
-
Smart NP (2001) The Hessian form of an elliptic curve. In: Koç ÇK, Naccache D, Paar C (eds) Proceedings of 3rd International Workshop on Cryptograpic Hardware and Embedded Systems (CHES), number 2162 in lecture notes in computer science. Springer, Paris, France, pp 121-128, May 14-16
-
(2001)
Proceedings of 3rd International Workshop on Cryptograpic Hardware and Embedded Systems (CHES), Number 2162 in Lecture Notes in Computer Science
, pp. 121-128
-
-
Smart, N.P.1
-
16
-
-
0003508562
-
-
US Department of Commerce and National Institute of Standards and Technology, FIPS PUB 186-2, January
-
US Department of Commerce and National Institute of Standards and Technology (2000) Digital signature standard (DSS), FIPS PUB 186-2, January
-
(2000)
Digital Signature Standard (DSS)
-
-
-
17
-
-
84968484435
-
Speeding the Pollard and elliptic curve methods of factorization
-
177
-
Montgomery P (1987) Speeding the Pollard and elliptic curve methods of factorization. Math Comput 48(177):243-264
-
(1987)
Math Comput
, vol.48
, pp. 243-264
-
-
Montgomery, P.1
-
18
-
-
0010029876
-
Efficient arithmetic on koblitz curves
-
Solinas J (2000) Efficient arithmetic on koblitz curves. Designs Codes Cryptogr 19:195-249
-
(2000)
Designs Codes Cryptogr
, vol.19
, pp. 195-249
-
-
Solinas, J.1
-
19
-
-
0038462786
-
A fast elliptic curve cryptosystem
-
Quisquater J-J, Vandewalle J (eds) Advances in cryptology: proceedings of EUROCRYPT'89. Springer
-
Agnew GB, Mullin RC, Vanstone SA (1989) A fast elliptic curve cryptosystem. In: Quisquater J-J, Vandewalle J (eds) Advances in cryptology: proceedings of EUROCRYPT'89, number 434 in lecture notes in computer science. Springer, pp 706-708
-
(1989)
Lecture Notes in Computer Science
, vol.434
, pp. 706-708
-
-
Agnew, G.B.1
Mullin, R.C.2
Vanstone, S.A.3
-
21
-
-
68549097842
-
m )
-
Koç ÇK, Paar C (eds) Proceedings of 2nd International Workshop on Cryptograpic Hardware and Embedded Systems (CHES). Springer-Verlag
-
m ). In: Koç ÇK, Paar C (eds) Proceedings of 2nd International Workshop on Cryptograpic Hardware and Embedded Systems (CHES), number 1965 in lecture notes in computer science. Springer-Verlag, pp 41-56
-
(2000)
Lecture Notes in Computer Science
, vol.1965
, pp. 41-56
-
-
Orlando, G.1
Paar, C.2
-
22
-
-
84942521638
-
m )
-
Schulte M, Bhattacharyya S, Burgess N, Schreiber R (eds), June 24-26
-
m ). In: Schulte M, Bhattacharyya S, Burgess N, Schreiber R (eds) Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures, and Processors (ASAP), pp 444-454, June 24-26
-
(2003)
Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures, and Processors (ASAP)
, pp. 444-454
-
-
Eberle, H.1
Gura, N.2
Shantz, S.C.3
-
24
-
-
0141831855
-
A scalable architecture for modular multiplication based on Montgomerys algorithm
-
9. September
-
Tenca AF, Koç ÇK (2003) A scalable architecture for modular multiplication based on Montgomerys algorithm. IEEE Trans Comput 52(9):1215-1221, September
-
(2003)
IEEE Trans Comput
, vol.52
, pp. 1215-1221
-
-
Tenca, A.F.1
Koç, Ç.K.2
-
25
-
-
27944450455
-
An improved unified scalable radix-2 montgomery multiplier
-
Harris D, Krishnamurthy R, Andres M, Mathew S, Hsu S (2005) An improved unified scalable radix-2 montgomery multiplier. In: Proceedings of 14th IEEE Symposium on Computer Arithmetic (ARITH-17), pp 172-178
-
(2005)
Proceedings of 14th IEEE Symposium on Computer Arithmetic (ARITH-17)
, pp. 172-178
-
-
Harris, D.1
Krishnamurthy, R.2
Andres, M.3
Mathew, S.4
Hsu, S.5
-
26
-
-
33750738116
-
A reconfigurable processor for high speed point multiplication in elliptic curves
-
2005
-
Saqib NA, Rodríguez-Henruez F, Díaz-Prez, A (2005) A reconfigurable processor for high speed point multiplication in elliptic curves. Int J of Embed Syst 2005 1(3/4):237-249
-
(2005)
Int J of Embed Syst
, vol.1
, Issue.3-4
, pp. 237-249
-
-
Saqib, N.A.1
Rodríguez-Henruez, F.2
Díaz-Prez, A.3
-
28
-
-
33750695616
-
Superscalar coprocessor for high-speed curve-based cryptography
-
Goublin L, Matsui M (eds) Proceedings of 8th International Workshop on Cryptographic Hardware and Embedded Systems (CHES). Springer
-
Sakiyama K, Batina L, Preneel B, Verbauwhede I (2006) Superscalar coprocessor for high-speed curve-based cryptography. In: Goublin L, Matsui M (eds) Proceedings of 8th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), number 4249 in lecture notes in computer science. Springer, pp 415-429
-
(2006)
Lecture Notes in Computer Science
, vol.4249
, pp. 415-429
-
-
Sakiyama, K.1
Batina, L.2
Preneel, B.3
Verbauwhede, I.4
-
30
-
-
15544368414
-
An elementary introduction to hyperelliptic curves-appendix
-
Koblitz N (ed). Springer
-
Menezes A, Wu Y-H, Zuccherato R (1998) An elementary introduction to hyperelliptic curves-appendix. In: Koblitz N (ed) Algebraic aspects of cryptography. Springer, pp 155-178
-
(1998)
Algebraic Aspects of Cryptography
, pp. 155-178
-
-
Menezes, A.1
Wu, Y.-H.2
Zuccherato, R.3
-
32
-
-
84947913604
-
m )
-
Koç ÇK, Paar C (eds) Proceedings of 1st International Workshop on Cryptographic Hardware and Embedded Systems (CHES). Springer
-
m ). In: Koç ÇK, Paar C (eds) Proceedings of 1st International Workshop on Cryptographic Hardware and Embedded Systems (CHES), vol 1717 of lecture notes in computer science. Springer, pp 316-327
-
(1999)
Lecture Notes in Computer Science
, vol.1717
, pp. 316-327
-
-
López, J.1
Dahab, R.2
-
36
-
-
34547423255
-
An adaptable and scalable asymmetric cryptographic processor
-
IEEE Computer Society
-
Smyth N, McLoone M, McCanny JV (2006) An adaptable and scalable asymmetric cryptographic processor. In: Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures, And Processors (ASAP). IEEE Computer Society, pp 341-346
-
(2006)
Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures, and Processors (ASAP)
, pp. 341-346
-
-
Smyth, N.1
McLoone, M.2
McCanny, J.V.3
|