-
1
-
-
38149015841
-
-
Antipa, A., Brown, D.R.L., Gallant, R.P., Lambert, R.J., Struik, R., Vanstone, S.A.: Accelerated verification of ECDSA signatures, in [43], pp. 307-318 (2006). MR 2007d:94044, www.cacr.math.uwaterloo.ca/techreports/2005/ tech_reports2005.html (Cited in §7)
-
Antipa, A., Brown, D.R.L., Gallant, R.P., Lambert, R.J., Struik, R., Vanstone, S.A.: Accelerated verification of ECDSA signatures, in [43], pp. 307-318 (2006). MR 2007d:94044, www.cacr.math.uwaterloo.ca/techreports/2005/ tech_reports2005.html (Cited in §7)
-
-
-
-
2
-
-
25144458058
-
-
Avanzi, R.M.: The complexity of certain multi-exponentiation techniques in cryptography. Journal of Cryptology 18, 357-373 (2005). MR 2007f:94027, www.eprint.iacr.org/2002/154 (Cited in §6, §7)
-
Avanzi, R.M.: The complexity of certain multi-exponentiation techniques in cryptography. Journal of Cryptology 18, 357-373 (2005). MR 2007f:94027, www.eprint.iacr.org/2002/154 (Cited in §6, §7)
-
-
-
-
3
-
-
38149089887
-
On the automatic construction of indistinguishable operations
-
Cited in §8
-
Barbosa, M., Page, D.: On the automatic construction of indistinguishable operations (2005), www.eprint.iacr.org/2005/174 (Cited in §8)
-
-
-
Barbosa, M.1
Page, D.2
-
4
-
-
38149087160
-
-
Bellare, M., Garay, J.A., Rabin, T.: Batch verification with applications to cryptography and checking, in [35], pp. 170-191 (1998). MR 99h:94043. (Cited in §7)
-
Bellare, M., Garay, J.A., Rabin, T.: Batch verification with applications to cryptography and checking, in [35], pp. 170-191 (1998). MR 99h:94043. (Cited in §7)
-
-
-
-
5
-
-
38149001210
-
A software implementation of NIST P-224
-
Cited in §5
-
Bernstein, D.J.: A software implementation of NIST P-224 (2001), www.cr.yp.to/talks.html#2001.10.29 (Cited in §5)
-
-
-
Bernstein, D.J.1
-
6
-
-
84864163645
-
Differential addition chains
-
Cited in §7, §8
-
Bernstein, D.J.: Differential addition chains (2006), www.cr.yp.to/papers.html#diffchain (Cited in §7, §8)
-
-
-
Bernstein, D.J.1
-
7
-
-
38149070563
-
-
Bernstein, D.J.: Curve25519: new Diffie-Hellman speed records, in [45], pp. 207-228 (2006), www.cr.yp.to/papers.html#curve25519 (Cited in §1, §2,§4, §5, §8)
-
Bernstein, D.J.: Curve25519: new Diffie-Hellman speed records, in [45], pp. 207-228 (2006), www.cr.yp.to/papers.html#curve25519 (Cited in §1, §2,§4, §5, §8)
-
-
-
-
8
-
-
38149108690
-
Explicit-formulas database
-
Cited in §2, §3, §3,§5
-
Bernstein, D.J., Lange, T.: Explicit-formulas database (2007), www. hyperelliptic.org/EFD (Cited in §2, §3, §3,§5)
-
-
-
Bernstein, D.J.1
Lange, T.2
-
9
-
-
38149083032
-
-
Billet, O., Joye, M.: The Jacobi model of an elliptic curve and side-channel analysis, in [26], pp. 34-42 (2003). MR 2005c:94045, www.eprint.iacr.org/2002/125 (Cited in §1, §5)
-
Billet, O., Joye, M.: The Jacobi model of an elliptic curve and side-channel analysis, in [26], pp. 34-42 (2003). MR 2005c:94045, www.eprint.iacr.org/2002/125 (Cited in §1, §5)
-
-
-
-
10
-
-
38149016528
-
-
eds, See [27
-
Blake, I.F., Seroussi, G., Smart, N.P. (eds.): Advances in elliptic curve cryptography. London Mathematical Society Lecture Note Series, 317. Cambridge University Press, Cambridge (2005), MR 2007g:94001. See [27]
-
(2007)
Advances in elliptic curve cryptography. London Mathematical Society Lecture Note Series, 317. Cambridge University Press, Cambridge (2005), MR
, pp. 94001
-
-
-
11
-
-
38349069733
-
-
Bosma, W., Lenstra Jr., H.W.: Complete systems of two addition laws for elliptic curves. Journal of Number Theory 53, 229-240 (1995), MR 96f: 11079. (Cited in §3, §3)
-
Bosma, W., Lenstra Jr., H.W.: Complete systems of two addition laws for elliptic curves. Journal of Number Theory 53, 229-240 (1995), MR 96f: 11079. (Cited in §3, §3)
-
-
-
-
12
-
-
33744916482
-
-
40, pp, Cited in §5
-
Brier, É., Déchène, I., Joye, M.: Unified point addition formulae for elliptic curve cryptosystems, in [40], pp. 247-256 (2004) (Cited in §5)
-
(2004)
Unified point addition formulae for elliptic curve cryptosystems
, pp. 247-256
-
-
Brier, E.1
Déchène, I.2
Joye, M.3
-
13
-
-
38149036223
-
-
Brier, É., Joye, M.: Weierstrass elliptic curves and side-channel attacks, in [39], pp. 335-345 (2002), www.geocities.com/MarcJoye/publications. html (Cited in §5, §8)
-
Brier, É., Joye, M.: Weierstrass elliptic curves and side-channel attacks, in [39], pp. 335-345 (2002), www.geocities.com/MarcJoye/publications. html (Cited in §5, §8)
-
-
-
-
14
-
-
84887273894
-
Multi-dimensional Montgomery ladders for elliptic curves
-
Cited in §7, §8
-
Brown, D.R.L.: Multi-dimensional Montgomery ladders for elliptic curves (2006), www.eprint.iacr.org/2006/220 (Cited in §7, §8)
-
-
-
Brown, D.R.L.1
-
15
-
-
3042527150
-
-
Chevallier-Mames, B., Ciet, M., Joye, M.: Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity. IEEE Transactions on Computers 53, 760-768 (2004), www.bcm.crypto.free.fr/pdf/CCJ04. pdf (Cited in §8)
-
Chevallier-Mames, B., Ciet, M., Joye, M.: Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity. IEEE Transactions on Computers 53, 760-768 (2004), www.bcm.crypto.free.fr/pdf/CCJ04. pdf (Cited in §8)
-
-
-
-
16
-
-
0000267548
-
-
Chudnovsky, D.V., Chudnovsky, G.V.: Sequences of numbers generated by addition in formal groups and new primality and factorization tests. Advances in Applied Mathematics 7, 385-434 (1986), MR 88h: 11094. (Cited in §5)
-
Chudnovsky, D.V., Chudnovsky, G.V.: Sequences of numbers generated by addition in formal groups and new primality and factorization tests. Advances in Applied Mathematics 7, 385-434 (1986), MR 88h: 11094. (Cited in §5)
-
-
-
-
17
-
-
85057426796
-
-
Cohen, H., Frey, G. (eds.): Handbook of elliptic and hyperelliptic curve cryptography. CRC Press, Boca Raton (2005), MR 2007f: 14020. See [22], [24], [33]
-
Cohen, H., Frey, G. (eds.): Handbook of elliptic and hyperelliptic curve cryptography. CRC Press, Boca Raton (2005), MR 2007f: 14020. See [22], [24], [33]
-
-
-
-
18
-
-
38148999868
-
-
Cohen, H., Miyaji, A., Ono, T.: Efficient elliptic curve exponentiation using mixed coordinates, in [41], pp. 51-65 (1998), MR 1726152, www.math.u-bordeaux.fr/~cohen/asiacrypt98.dvi (Cited in §1, §5)
-
Cohen, H., Miyaji, A., Ono, T.: Efficient elliptic curve exponentiation using mixed coordinates, in [41], pp. 51-65 (1998), MR 1726152, www.math.u-bordeaux.fr/~cohen/asiacrypt98.dvi (Cited in §1, §5)
-
-
-
-
19
-
-
84880293917
-
-
32, pp, Cited in §8, §8, §8
-
Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptosystems, in [32], pp. 292-302 (1999) (Cited in §8, §8, §8)
-
(1999)
Resistance against differential power analysis for elliptic curve cryptosystems
, pp. 292-302
-
-
Coron, J.-S.1
-
21
-
-
38149026711
-
-
De Santis, A. (ed.): Advances in cryptology: EUROCRYPT 1994. LNCS, 950. Springer, Heidelberg (1995), MR 98h:94001. See [20]
-
De Santis, A. (ed.): Advances in cryptology: EUROCRYPT 1994. LNCS, vol. 950. Springer, Heidelberg (1995), MR 98h:94001. See [20]
-
-
-
-
22
-
-
85030847825
-
-
Doche, C.: Exponentiation, in [17], pp. 145-168 (2005) MR 2162725. (Cited in §6, §7)
-
Doche, C.: Exponentiation, in [17], pp. 145-168 (2005) MR 2162725. (Cited in §6, §7)
-
-
-
-
23
-
-
33745856887
-
-
45, pp, Cited in §1
-
Doche, C., Icart, T., Kohel, D.R.: Efficient scalar multiplication by isogeny decompositions, in [45], pp. 191-206 (2006) (Cited in §1)
-
(2006)
Efficient scalar multiplication by isogeny decompositions
, pp. 191-206
-
-
Doche, C.1
Icart, T.2
Kohel, D.R.3
-
24
-
-
77649266162
-
-
17, pp, MR 2162729, Cited in §5
-
Doche, C., Lange, T.: Arithmetic of elliptic curves, in [17], pp. 267-302 (2005), MR 2162729. (Cited in §5)
-
(2005)
Arithmetic of elliptic curves
, pp. 267-302
-
-
Doche, C.1
Lange, T.2
-
25
-
-
38349097522
-
-
Edwards, H.M.: A normal form for elliptic curves. Bulletin of the American Mathematical Society 44, 393-422 (2007), www.ams.org/bull/2007-44-03/ S0273-0979-07-01153-6/home.html (Cited in §1, §3)
-
Edwards, H.M.: A normal form for elliptic curves. Bulletin of the American Mathematical Society 44, 393-422 (2007), www.ams.org/bull/2007-44-03/ S0273-0979-07-01153-6/home.html (Cited in §1, §3)
-
-
-
-
26
-
-
38149041313
-
-
Fossorier, M.P.C., Høholdt, T., Poli, A. (eds.): Applied Algebra, Algebraic Algorithms and Error-Correcting Codes. LNCS, 2643. Springer, Heidelberg (2003). ISBN 3-540-40111-3. MR 2004j:94001. (Sec [9])
-
Fossorier, M.P.C., Høholdt, T., Poli, A. (eds.): Applied Algebra, Algebraic Algorithms and Error-Correcting Codes. LNCS, vol. 2643. Springer, Heidelberg (2003). ISBN 3-540-40111-3. MR 2004j:94001. (Sec [9])
-
-
-
-
28
-
-
84944884283
-
-
Joye, M., Quisquater, J.-J.: Hessian elliptic curves and side-channel attacks, in [31], pp. 402-410 (2001). MR 2003k:94032, www.geocities.com/ MarcJoye/publications.html (Cited in §1, §5)
-
Joye, M., Quisquater, J.-J.: Hessian elliptic curves and side-channel attacks, in [31], pp. 402-410 (2001). MR 2003k:94032, www.geocities.com/ MarcJoye/publications.html (Cited in §1, §5)
-
-
-
-
29
-
-
38149127790
-
-
Joye, M., Yen, S.-M.: The Montgomery powering ladder, in [30], pp. 291-302 (2003), www.gemplus.com/smart/rd/publications/pdf/JY03mont.pdf (Cited in §8)
-
Joye, M., Yen, S.-M.: The Montgomery powering ladder, in [30], pp. 291-302 (2003), www.gemplus.com/smart/rd/publications/pdf/JY03mont.pdf (Cited in §8)
-
-
-
-
30
-
-
38149053338
-
-
Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.): Cryptographic hardware and embedded systems-CHES 2002. LNCS, 2523. Springer, Heidelberg (2003). ISBN 3-540-42521-7. See [29]
-
Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.): Cryptographic hardware and embedded systems-CHES 2002. LNCS, vol. 2523. Springer, Heidelberg (2003). ISBN 3-540-42521-7. See [29]
-
-
-
-
31
-
-
38149077720
-
-
Koç, Ç.K., Naccache, D., Paar, C. (eds.): Cryptographic hardware and embedded systems-CHES 2001. LNCS, 2162. Springer, Heidelberg (2001). ISBN 3-540-42521-7. MR 2003g:94002. See [28], [34], [42]
-
Koç, Ç.K., Naccache, D., Paar, C. (eds.): Cryptographic hardware and embedded systems-CHES 2001. LNCS, vol. 2162. Springer, Heidelberg (2001). ISBN 3-540-42521-7. MR 2003g:94002. See [28], [34], [42]
-
-
-
-
32
-
-
38149041316
-
-
Koç, Ç.K., Paar, C. (eds.): Cryptographic hardware and embedded systems. In: first international workshop CHES 1999. LNCS, 1717. Springer, Heidelberg (1999). ISBN 3-540-66646-X. See [19]
-
Koç, Ç.K., Paar, C. (eds.): Cryptographic hardware and embedded systems. In: first international workshop CHES 1999. LNCS, vol. 1717. Springer, Heidelberg (1999). ISBN 3-540-66646-X. See [19]
-
-
-
-
33
-
-
38149062393
-
-
17, pp, MR 2163785, Cited in §8, §8
-
Lange, T.: Mathematical countermeasures against side-channel attacks, in [17], pp. 687-714 (2005), MR 2163785. (Cited in §8, §8)
-
(2005)
Mathematical countermeasures against side-channel attacks
, pp. 687-714
-
-
Lange, T.1
-
34
-
-
38149130198
-
-
Liardet, P.-Y., Smart, N.P.: Preventing SPA/DPA in ECC systems using the Jacobi form, in [31], pp. 391-401 (2001), MR 2003k:94033. (Cited in §1, §5, §8)
-
Liardet, P.-Y., Smart, N.P.: Preventing SPA/DPA in ECC systems using the Jacobi form, in [31], pp. 391-401 (2001), MR 2003k:94033. (Cited in §1, §5, §8)
-
-
-
-
35
-
-
38149072028
-
-
Lucchesi, C.L., Moura, A.V. (eds.): LATIN 1998: theoretical informatic. LNCS, 1380. Springer, Heidelberg (1998). ISBN 3-540-64275-7. MR 99d:68007. See [4]
-
Lucchesi, C.L., Moura, A.V. (eds.): LATIN 1998: theoretical informatic. LNCS, vol. 1380. Springer, Heidelberg (1998). ISBN 3-540-64275-7. MR 99d:68007. See [4]
-
-
-
-
36
-
-
84890863577
-
-
Mangard, S., Oswald, E., Popp, T.: Power analysis attacks: revealing the secrets of smart cards. Springer, Heidelberg (2007) (Cited in §8, §8)
-
Mangard, S., Oswald, E., Popp, T.: Power analysis attacks: revealing the secrets of smart cards. Springer, Heidelberg (2007) (Cited in §8, §8)
-
-
-
-
37
-
-
38149043074
-
-
Miller, V.S.: Use of elliptic curves in cryptography, in [44], pp. 417-426 (1986) MR 88b:68040. (Cited in §1)
-
Miller, V.S.: Use of elliptic curves in cryptography, in [44], pp. 417-426 (1986) MR 88b:68040. (Cited in §1)
-
-
-
-
38
-
-
84968484435
-
-
Montgomery, P.L.: Speeding the Pollard and elliptic curve methods of factorization. Mathematics of Computation 48, 243-264 (1987) MR 88e:11130, www.links.jstor.org/sici?sici=0025-5718(198701)48:177〈243:STPAEC〉2.0. CO; 2-3 (Cited in §1, §6, §7)
-
Montgomery, P.L.: Speeding the Pollard and elliptic curve methods of factorization. Mathematics of Computation 48, 243-264 (1987) MR 88e:11130, www.links.jstor.org/sici?sici=0025-5718(198701)48:177〈243:STPAEC〉2.0. CO; 2-3 (Cited in §1, §6, §7)
-
-
-
-
39
-
-
38149141235
-
-
Naccache, D., Paillier, P. (eds.): Public key cryptography. In: PKC 2002. LNCS, 2274. Springer, Heidelberg (2002). ISBN 3-540-43168-3. MR 2005b:94044. See [13]
-
Naccache, D., Paillier, P. (eds.): Public key cryptography. In: PKC 2002. LNCS, vol. 2274. Springer, Heidelberg (2002). ISBN 3-540-43168-3. MR 2005b:94044. See [13]
-
-
-
-
41
-
-
38149034029
-
-
Ohta, K., Pei, D. (eds.): Advances in cryptology-ASIACRYPT 1998. LNCS, 1514. Springer, Berlin (1998). ISBN 3-540-65109-8. MR 2000h:94002. See [18]
-
Ohta, K., Pei, D. (eds.): Advances in cryptology-ASIACRYPT 1998. LNCS, vol. 1514. Springer, Berlin (1998). ISBN 3-540-65109-8. MR 2000h:94002. See [18]
-
-
-
-
42
-
-
38149105418
-
-
Oswald, E., Aigner, M.: Randomized addition-subtraction chains as a countermeasure against power attack, in [31], pp. 39-50 (2001) MR 2003m:94068. (Cited in §8)
-
Oswald, E., Aigner, M.: Randomized addition-subtraction chains as a countermeasure against power attack, in [31], pp. 39-50 (2001) MR 2003m:94068. (Cited in §8)
-
-
-
-
43
-
-
38149053341
-
-
Preneel, B., Tavares, S.E. (eds.): Selected Areas in Cryptography. In: SAC 2005. LNCS, 3897, Springer, Heidelberg (2006). ISBN3-540-33108-5. MR 2007b:94002. See [1]
-
Preneel, B., Tavares, S.E. (eds.): Selected Areas in Cryptography. In: SAC 2005. LNCS, vol. 3897, Springer, Heidelberg (2006). ISBN3-540-33108-5. MR 2007b:94002. See [1]
-
-
-
-
44
-
-
38149047920
-
-
Williams, H.C. (ed.): CRYPTO 1985. LNCS, 218. Springer, Berlin (1986). ISBN 3-540-16463-4. MR 87d:94002. See [37]
-
Williams, H.C. (ed.): CRYPTO 1985. LNCS, vol. 218. Springer, Berlin (1986). ISBN 3-540-16463-4. MR 87d:94002. See [37]
-
-
-
-
45
-
-
38149021029
-
-
Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.): 9th international conference on theory and practice in public-key cryptography. LNCS, 3958. Springer, Heidelberg (2006). ISBN 978-3-540-33851-2. See [7], [23]
-
Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.): 9th international conference on theory and practice in public-key cryptography. LNCS, vol. 3958. Springer, Heidelberg (2006). ISBN 978-3-540-33851-2. See [7], [23]
-
-
-
|