-
1
-
-
33750740159
-
Scalar Multiplication on Koblitz Curves using Double Bases
-
Tech Report. Available at
-
Avanzi, R.M., Sica, F.: Scalar Multiplication on Koblitz Curves using Double Bases. Tech Report. Available at http://eprint.iacr.org/2006/067
-
-
-
Avanzi, R.M.1
Sica, F.2
-
2
-
-
77649268304
-
Extending Scalar Multiplication to Double Bases
-
Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
-
Avanzi, R.M., Dimitrov, V., Doche, C., Sica, F.: Extending Scalar Multiplication to Double Bases. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 130-144. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 130-144
-
-
Avanzi, R.M.1
Dimitrov, V.2
Doche, C.3
Sica, F.4
-
3
-
-
85057426796
-
-
Cohen, H, Frey, G, eds, CRC Press, Boca Raton
-
Cohen, H., Frey, G. (eds.): Handbook of Elliptic and Hyperelliptic Curve Cryptography. CRC Press, Boca Raton (2005)
-
(2005)
Handbook of Elliptic and Hyperelliptic Curve Cryptography
-
-
-
4
-
-
0003442756
-
-
Cambridge University Press, Cambridge
-
Blake, I.F., Seroussi, G., Smart, N.P.: Elliptic Curves in Cryptography. Cambridge University Press, Cambridge (1999)
-
(1999)
Elliptic Curves in Cryptography
-
-
Blake, I.F.1
Seroussi, G.2
Smart, N.P.3
-
5
-
-
23044483770
-
-
Blake, I.F, Seroussi, G, Smart, N.P, eds, Cambridge University Press, Cambridge
-
Blake, I.F., Seroussi, G., Smart, N.P. (eds.): Advances in Elliptic Curves Cryptography. Cambridge University Press, Cambridge (2005)
-
(2005)
Advances in Elliptic Curves Cryptography
-
-
-
6
-
-
3042527150
-
Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity
-
Chevalier-Mames, B., Ciet, M., Joye, M.: Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity. IEEE Transactions on Computers 53(6), 760-768 (2004)
-
(2004)
IEEE Transactions on Computers
, vol.53
, Issue.6
, pp. 760-768
-
-
Chevalier-Mames, B.1
Ciet, M.2
Joye, M.3
-
7
-
-
33645106690
-
Trading inversions for multiplications in elliptic curve cryptography
-
Ciet, M., Lauter, K., Joye, M., Montgomery, P.L.: Trading inversions for multiplications in elliptic curve cryptography. Designs, Codes and Cryptography 39(2), 189-206 (2006)
-
(2006)
Designs, Codes and Cryptography
, vol.39
, Issue.2
, pp. 189-206
-
-
Ciet, M.1
Lauter, K.2
Joye, M.3
Montgomery, P.L.4
-
8
-
-
33646198552
-
-
Ciet, M., Sica, F.: An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, 3715, pp. 171-182. Springer, Heidelberg (2005)
-
Ciet, M., Sica, F.: An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 171-182. Springer, Heidelberg (2005)
-
-
-
-
9
-
-
84947743704
-
Efficient Elliptic Curve Exponentiation Using Mixed coordinates
-
Ohta, K, Pei, D, eds, ASIACRYPT 1998, Springer, Heidelberg
-
Cohen, H., Miyaji, A., Ono, T.: Efficient Elliptic Curve Exponentiation Using Mixed coordinates. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 51-65. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1514
, pp. 51-65
-
-
Cohen, H.1
Miyaji, A.2
Ono, T.3
-
10
-
-
84880293917
-
-
Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptography. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, 1717, pp. 292-302. Springer, Heidelberg (1999)
-
Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptography. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 292-302. Springer, Heidelberg (1999)
-
-
-
-
11
-
-
0012342367
-
An Improvement of Guajardo-Paar Method for Multiplicar tion on non-supersingular Elliptic Curves
-
Antofagasta, Chile, November 12-14, IEEE Computer Society Press, Los Alamitos () 1998
-
Dahab, R., Lopez, J.: An Improvement of Guajardo-Paar Method for Multiplicar tion on non-supersingular Elliptic Curves. In: Proceedings of the XVIII International Conference of the Chilean Computer Science Society (SCCC 1998), Antofagasta, Chile, November 12-14, 1998, pp. 91-95. IEEE Computer Society Press, Los Alamitos (1998)
-
(1998)
Proceedings of the XVIII International Conference of the Chilean Computer Science Society (SCCC
, pp. 91-95
-
-
Dahab, R.1
Lopez, J.2
-
12
-
-
33646759248
-
Efficient and Secure Elliptic Curve Point Multiplication Using Double Base Chain
-
Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
-
Dimitrov, V., Imbert, L., Mishra, P.K.: Efficient and Secure Elliptic Curve Point Multiplication Using Double Base Chain. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 59-79. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 59-79
-
-
Dimitrov, V.1
Imbert, L.2
Mishra, P.K.3
-
13
-
-
33750681266
-
-
Dimitrov, V., Järvinen, K.U., Jacobson, M.J., Chan, W.F., Huang, Z.: FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, 4249, pp. 445-459. Springer, Heidelberg (2006)
-
Dimitrov, V., Järvinen, K.U., Jacobson, M.J., Chan, W.F., Huang, Z.: FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 445-459. Springer, Heidelberg (2006)
-
-
-
-
14
-
-
0002535157
-
An algorithm for modular exponentiation
-
Dimitrov, V.S., Jullien, G.A., Miller, W.C.: An algorithm for modular exponentiation. Information Processing Letters 66(3), 155-159 (1998)
-
(1998)
Information Processing Letters
, vol.66
, Issue.3
, pp. 155-159
-
-
Dimitrov, V.S.1
Jullien, G.A.2
Miller, W.C.3
-
15
-
-
0033204523
-
Theory and applications of the doublebase number system
-
Dimitrov, V.S., Jullien, G.A., Miller, W.C.: Theory and applications of the doublebase number system. IEEE Transactions on Computers 48(10), 1098-1106 (1999)
-
(1999)
IEEE Transactions on Computers
, vol.48
, Issue.10
, pp. 1098-1106
-
-
Dimitrov, V.S.1
Jullien, G.A.2
Miller, W.C.3
-
16
-
-
38149082675
-
-
Doche, C., Imbert, L.: Extended Double-Base Number System with applications to Elliptic Curve Cryptography. Tech Report, Conference version to appear in Indocrypt (2006), Available at http://eprint.iacr.org/2006/330
-
Doche, C., Imbert, L.: Extended Double-Base Number System with applications to Elliptic Curve Cryptography. Tech Report, Conference version to appear in Indocrypt (2006), Available at http://eprint.iacr.org/2006/330
-
-
-
-
17
-
-
33745856887
-
-
Doche, C., Icart, T., Kohel, D.: Efficient Scalar Multiplication by Isogeny Decompositions. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, 3958, pp. 191-206. Springer, Heidelberg (2006)
-
Doche, C., Icart, T., Kohel, D.: Efficient Scalar Multiplication by Isogeny Decompositions. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 191-206. Springer, Heidelberg (2006)
-
-
-
-
18
-
-
3242670828
-
Field inversion and point halving revisited
-
Fong, K., Hankerson, D., Lopez, J., Menezes, A.: Field inversion and point halving revisited. IEEE Transactions on Computers 53(8), 1047-1059 (2004)
-
(2004)
IEEE Transactions on Computers
, vol.53
, Issue.8
, pp. 1047-1059
-
-
Fong, K.1
Hankerson, D.2
Lopez, J.3
Menezes, A.4
-
19
-
-
38149023406
-
-
Guajardo, J., Paar, C.: Efficient Algorithms for Elliptic Curve Cryptosystems over binary fields. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, 1965, pp. 342-356. Springer, Heidelberg (2000)
-
Guajardo, J., Paar, C.: Efficient Algorithms for Elliptic Curve Cryptosystems over binary fields. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 342-356. Springer, Heidelberg (2000)
-
-
-
-
20
-
-
11244267013
-
-
Springer, Heidelberg
-
Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)
-
(2004)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.1
Menezes, A.2
Vanstone, S.3
-
21
-
-
85099427145
-
-
Hankerson, D., Lòpez Hernandez, J., Menezes, A.: Software implementation of elliptic curve cryptography over binary fields. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, 1965, pp. 1-24. Springer, Heidelberg (2000)
-
Hankerson, D., Lòpez Hernandez, J., Menezes, A.: Software implementation of elliptic curve cryptography over binary fields. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 1-24. Springer, Heidelberg (2000)
-
-
-
-
22
-
-
84949515158
-
-
Itoh, K., Takenaka, M., Torii, N., Temma, S., Kurihara, Y.: Fast implementation of public-key cryptography on a DSP TMS320C6201. In: Koç, Ç.K., Paar, C (eds.) CHES 1999. LNCS, 1717, pp. 61-72. Springer, Heidelberg (1999)
-
Itoh, K., Takenaka, M., Torii, N., Temma, S., Kurihara, Y.: Fast implementation of public-key cryptography on a DSP TMS320C6201. In: Koç, Ç.K., Paar, C (eds.) CHES 1999. LNCS, vol. 1717, pp. 61-72. Springer, Heidelberg (1999)
-
-
-
-
23
-
-
27544457322
-
Fast elliptic curve multiplications resistant against side channel attacks
-
Izu, T., Takagi, T.: Fast elliptic curve multiplications resistant against side channel attacks. IEICE Transactions Fundamentals E88-A(1), 161-171 (2005)
-
(2005)
IEICE Transactions Fundamentals
, vol.E88-A
, Issue.1
, pp. 161-171
-
-
Izu, T.1
Takagi, T.2
-
24
-
-
84944901711
-
-
Joye, M., Tymen, C.: Protections against differential analysis for elliptic curve cryptography - an algebraic approach. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, 2162, pp. 377-390. Springer, Heidelberg (2001)
-
Joye, M., Tymen, C.: Protections against differential analysis for elliptic curve cryptography - an algebraic approach. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 377-390. Springer, Heidelberg (2001)
-
-
-
-
25
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 48(177), 203-209 (1987)
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
26
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
-
Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
27
-
-
84939573910
-
Differential power analysis
-
Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
-
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
28
-
-
85015402934
-
Uses of elliptic curves in cryptography
-
Williams, H.C ed, CRYPTO 1985, Springer, Heidelberg
-
Miller, V.S.: Uses of elliptic curves in cryptography. In: Williams, H.C (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417-428. Springer, Heidelberg (1986)
-
(1986)
LNCS
, vol.218
, pp. 417-428
-
-
Miller, V.S.1
-
29
-
-
0042775601
-
On the maximal distance between integers composed of small primes
-
Tijdeman, R.: On the maximal distance between integers composed of small primes. Compositio Mathematica 28, 159-162 (1974)
-
(1974)
Compositio Mathematica
, vol.28
, pp. 159-162
-
-
Tijdeman, R.1
|