-
1
-
-
42349108146
-
-
J.-P. Allouche and J. Shallit, Automatic sequences, Cambridge University Press, 2003. MR1997038 (2004k: 11028)
-
J.-P. Allouche and J. Shallit, Automatic sequences, Cambridge University Press, 2003. MR1997038 (2004k: 11028)
-
-
-
-
2
-
-
85057426796
-
-
CRC Press, MR2162716 2007f:14020
-
R. Avanzi, H. Cohen, C. Doche, G. Frey, T. Lange, K. Nguyen, and F. Vercauteren, Handbook of elliptic and hyperelliptic curve cryptography, CRC Press, 2005. MR2162716 (2007f:14020)
-
(2005)
Handbook of elliptic and hyperelliptic curve cryptography
-
-
Avanzi, R.1
Cohen, H.2
Doche, C.3
Frey, G.4
Lange, T.5
Nguyen, K.6
Vercauteren, F.7
-
3
-
-
77649268304
-
Extending scalar multiplication using double bases, Advances in Cryptology, ASIACRYPT'06
-
Springer
-
R. Avanzi, V. Dimitrov, C. Doche, and F. Sica, Extending scalar multiplication using double bases, Advances in Cryptology, ASIACRYPT'06, Lecture Notes in Computer Science, vol. 4284, Springer, 2006, pp. 130-144.
-
(2006)
Lecture Notes in Computer Science
, vol.4284
, pp. 130-144
-
-
Avanzi, R.1
Dimitrov, V.2
Doche, C.3
Sica, F.4
-
5
-
-
24144452461
-
-
J.-C. Bajard, L. Imbert, and T. Plantard, Modular number systems: Beyond the Mersenne family, Proceedings of the 11th International Workshop on Selected Areas in Cryptography, SAC'04, Lecture Notes in Computer Science, 3357, Springer, 2005, pp. 159-169. MR2181315 (2006h:94071)
-
J.-C. Bajard, L. Imbert, and T. Plantard, Modular number systems: Beyond the Mersenne family, Proceedings of the 11th International Workshop on Selected Areas in Cryptography, SAC'04, Lecture Notes in Computer Science, vol. 3357, Springer, 2005, pp. 159-169. MR2181315 (2006h:94071)
-
-
-
-
6
-
-
0041868238
-
-
V. Berthé, Autour du système de numération d'Ostrowski, Bulletin of the Belgian Mathematical Society 8 (2001), 209-239. MR1838931 (2002k:68147)
-
V. Berthé, Autour du système de numération d'Ostrowski, Bulletin of the Belgian Mathematical Society 8 (2001), 209-239. MR1838931 (2002k:68147)
-
-
-
-
7
-
-
15844364585
-
On converting numbers to the double-base number system
-
SPIE
-
V. Berthé and L. Imbert, On converting numbers to the double-base number system, Advanced Signal Processing Algorithms, Architecture and Implementations XIV, Proceedings of SPIE, vol. 5559, SPIE, 2004, pp. 70-78.
-
(2004)
Advanced Signal Processing Algorithms, Architecture and Implementations XIV, Proceedings of SPIE
, vol.5559
, pp. 70-78
-
-
Berthé, V.1
Imbert, L.2
-
8
-
-
38049042605
-
Advances in elliptic curve cryptography
-
Cambridge University Press
-
I. F. Blake, G. Seroussi, and N. P. Smart, Advances in elliptic curve cryptography, London Mathematical Society Lecture Note Series, no. 317, Cambridge University Press, 2005. MR2166105
-
(2005)
London Mathematical Society Lecture Note Series
, vol.317
-
-
Blake, I.F.1
Seroussi, G.2
Smart, N.P.3
-
9
-
-
27544448878
-
-
É. Brier and M. Joye, Fast point multiplication on elliptic curves through isogenics, Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, AAECC 2003, Lecture Notes in Computer Science, 2643, Springer, 2003, pp. 43-50. MR2042411 (2005a:14029)
-
É. Brier and M. Joye, Fast point multiplication on elliptic curves through isogenics, Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, AAECC 2003, Lecture Notes in Computer Science, vol. 2643, Springer, 2003, pp. 43-50. MR2042411 (2005a:14029)
-
-
-
-
10
-
-
3042527150
-
Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity
-
B. Chevalier-Mames, M. Ciet, and M. Joye, Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity, IEEE Transactions on Computers 53 (2004), no. 6, 760-768.
-
(2004)
IEEE Transactions on Computers
, vol.53
, Issue.6
, pp. 760-768
-
-
Chevalier-Mames, B.1
Ciet, M.2
Joye, M.3
-
11
-
-
34547722936
-
-
J. Chung and A. Hasan, More generalized Mersenne numbers, Selected Areas in Cryptography, SAC'03, Lecture Notes in Computer Science, 3006, Springer, 2004, pp. 335-347. MR2094740 (2005f:94089)
-
J. Chung and A. Hasan, More generalized Mersenne numbers, Selected Areas in Cryptography, SAC'03, Lecture Notes in Computer Science, vol. 3006, Springer, 2004, pp. 335-347. MR2094740 (2005f:94089)
-
-
-
-
12
-
-
33645106690
-
-
M. Ciet, M. Joye, K. Lauter, and P. L. Montgomery, Trading inversions for multiplications in elliptic curve cryptography, Designs, Codes and Cryptography 39 (2006), no. 2, 189-206. MR2209936 (2006j:94057)
-
M. Ciet, M. Joye, K. Lauter, and P. L. Montgomery, Trading inversions for multiplications in elliptic curve cryptography, Designs, Codes and Cryptography 39 (2006), no. 2, 189-206. MR2209936 (2006j:94057)
-
-
-
-
13
-
-
33646198552
-
An analysis of double base number systems and a sublinear scalar multiplication algorithm, Progress of Cryptology, Mycrypt 2005
-
Springer
-
M. Ciet and F. Sica, An analysis of double base number systems and a sublinear scalar multiplication algorithm, Progress of Cryptology, Mycrypt 2005, Lecture Notes in Computer Science, vol. 3715, Springer, 2005, pp. 171-182.
-
(2005)
Lecture Notes in Computer Science
, vol.3715
, pp. 171-182
-
-
Ciet, M.1
Sica, F.2
-
14
-
-
84947743704
-
-
H. Cohen, A. Miyaji, and T. Ono, Efficient elliptic curve exponentiation using mixed coordinates, Advances in Cryptology, ASIACRYPT'98, Lecture Notes in Computer Science, 1514, Springer, 1998, pp. 51-65. MR1726152
-
H. Cohen, A. Miyaji, and T. Ono, Efficient elliptic curve exponentiation using mixed coordinates, Advances in Cryptology, ASIACRYPT'98, Lecture Notes in Computer Science, vol. 1514, Springer, 1998, pp. 51-65. MR1726152
-
-
-
-
15
-
-
84955600081
-
-
n), Advances in Cryptology, ASI-ACRYPT'96, Lecture Notes in Computer Science, 1163, Springer, 1996, pp. 65-76. MR1486049
-
n), Advances in Cryptology, ASI-ACRYPT'96, Lecture Notes in Computer Science, vol. 1163, Springer, 1996, pp. 65-76. MR1486049
-
-
-
-
16
-
-
33646759248
-
-
V. Dimitrov, L. Imbert, and P. K. Mishra, Efficient and secure elliptic curve point multiplication using double-base chains, Advances in Cryptology, ASIACRYPT'05, Lecture Notes in Computer Science, 3788, Springer, 2005, pp. 59-78. MR2236727
-
V. Dimitrov, L. Imbert, and P. K. Mishra, Efficient and secure elliptic curve point multiplication using double-base chains, Advances in Cryptology, ASIACRYPT'05, Lecture Notes in Computer Science, vol. 3788, Springer, 2005, pp. 59-78. MR2236727
-
-
-
-
17
-
-
33750681266
-
FPGA implementation of point multiplication on Koblitz curves using Kleinian integers, Cryptographic Hardware and Embedded Systems, CHES'06
-
Springer
-
V. S Dimitrov, K. Järvinen, M. J. Jacobson, Jr., W. F. Chan, and Z. Huang, FPGA implementation of point multiplication on Koblitz curves using Kleinian integers, Cryptographic Hardware and Embedded Systems, CHES'06, Lecture Notes in Computer Science, vol. 4249, Springer, 2006, pp. 445-459.
-
(2006)
Lecture Notes in Computer Science
, vol.4249
, pp. 445-459
-
-
Dimitrov, V.S.1
Järvinen, K.2
Jacobson Jr., M.J.3
Chan, W.F.4
Huang, Z.5
-
18
-
-
0002535157
-
An algorithm for modular exponentiation
-
MR1627991 99d:94023
-
V. S. Dimitrov, G. A. Jullien, and W. C. Miller, An algorithm for modular exponentiation, Information Processing Letters 66 (1998), no. 3, 155-159. MR1627991 (99d:94023)
-
(1998)
Information Processing Letters
, vol.66
, Issue.3
, pp. 155-159
-
-
Dimitrov, V.S.1
Jullien, G.A.2
Miller, W.C.3
-
19
-
-
33745856887
-
Efficient scalar multiplication by isogeny decompositions, Public Key Cryptography, PKC'06
-
Springer
-
C. Doche, T. Icart, and D. R. Kohel, Efficient scalar multiplication by isogeny decompositions, Public Key Cryptography, PKC'06, Lecture Notes in Computer Science, vol. 3958, Springer, 2006, pp. 191-206.
-
(2006)
Lecture Notes in Computer Science
, vol.3958
, pp. 191-206
-
-
Doche, C.1
Icart, T.2
Kohel, D.R.3
-
20
-
-
84992376874
-
Extended double-base number system with applications to elliptic curve cryptography, Progress in Cryptology, INDOCRYPT'06
-
Springer
-
C. Doche and L. Imbert, Extended double-base number system with applications to elliptic curve cryptography, Progress in Cryptology, INDOCRYPT'06, Lecture Notes in Computer Science, vol. 4329, Springer, 2006, pp. 335-348.
-
(2006)
Lecture Notes in Computer Science
, vol.4329
, pp. 335-348
-
-
Doche, C.1
Imbert, L.2
-
21
-
-
35248862491
-
-
K. Eisenträger, K. Lauter, and P. L. Montgomery, Fast elliptic curve arithmetic and improved Weil pairing evaluation, Topics in Cryptology - CT-RSA 2003, Lecture Notes in Computer Science, 2612, Springer, 2003, pp. 343-354. MR2080147
-
K. Eisenträger, K. Lauter, and P. L. Montgomery, Fast elliptic curve arithmetic and improved Weil pairing evaluation, Topics in Cryptology - CT-RSA 2003, Lecture Notes in Computer Science, vol. 2612, Springer, 2003, pp. 343-354. MR2080147
-
-
-
-
22
-
-
3242670828
-
Field inversion and point halving revisited
-
K. Fong, D. Hankerson, J. Lòpez, and A. Menezes, Field inversion and point halving revisited, IEEE Transactions on Computers 53 (2004), no. 8, 1047-1059.
-
(2004)
IEEE Transactions on Computers
, vol.53
, Issue.8
, pp. 1047-1059
-
-
Fong, K.1
Hankerson, D.2
Lòpez, J.3
Menezes, A.4
-
23
-
-
0000490812
-
A survey of fast exponentiation methods
-
MR1613189 99g:94014
-
D. M. Gordon, A survey of fast exponentiation methods, Journal of Algorithms 27 (1998), no. 1, 129-146. MR1613189 (99g:94014)
-
(1998)
Journal of Algorithms
, vol.27
, Issue.1
, pp. 129-146
-
-
Gordon, D.M.1
-
25
-
-
84958670390
-
Efficient algorithms for elliptic curve cryptosystems, Advances in Cryptology, CRYPTO'97
-
Springer, MR1630403 99b:94033
-
J. Guajardo and C Paar, Efficient algorithms for elliptic curve cryptosystems, Advances in Cryptology, CRYPTO'97, Lecture Notes in Computer Science, vol. 1294, Springer, 1997, pp. 342-356. MR1630403 (99b:94033)
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 342-356
-
-
Guajardo, J.1
Paar, C.2
-
26
-
-
0038670954
-
Software implementation of elliptic curve cryptography over binary fields, Cryptographic Hardware and Embedded Systems, CHES'00
-
Springer
-
D. Hankerson, J. Lòpez Hernandez, and A. Menezes, Software implementation of elliptic curve cryptography over binary fields, Cryptographic Hardware and Embedded Systems, CHES'00, Lecture Notes in Computer Science, vol. 1965, Springer, 2000, pp. 1-24.
-
(2000)
Lecture Notes in Computer Science
, vol.1965
, pp. 1-24
-
-
Hankerson, D.1
Lòpez Hernandez, J.2
Menezes, A.3
-
28
-
-
84949515158
-
Fast implementation of publickey cryptography on a DSP TMS320C6201, Cryptographic Hardware and Embedded Systems, CHES'99
-
Springer
-
K. Itoh, M. Takenaka, N. Torii, S. Temma, and Y. Kurihara, Fast implementation of publickey cryptography on a DSP TMS320C6201, Cryptographic Hardware and Embedded Systems, CHES'99, Lecture Notes in Computer Science, vol. 1717, Springer, 1999, pp. 61 - 72.
-
(1999)
Lecture Notes in Computer Science
, vol.1717
, pp. 61-72
-
-
Itoh, K.1
Takenaka, M.2
Torii, N.3
Temma, S.4
Kurihara, Y.5
-
29
-
-
84974665915
-
Improved elliptic curve multiplication methods resistant against side channel attacks, Progress in Cryptology, INDOCRYPT'02
-
Springer
-
T. Izu, B. Möller, and T. Takagi, Improved elliptic curve multiplication methods resistant against side channel attacks, Progress in Cryptology, INDOCRYPT'02, Lecture Notes in Computer Science, vol. 2551, Springer, 2002, pp. 269-313.
-
(2002)
Lecture Notes in Computer Science
, vol.2551
, pp. 269-313
-
-
Izu, T.1
Möller, B.2
Takagi, T.3
-
30
-
-
84958955271
-
A fast parallel elliptic curve multiplication resistant against side channel attacks, Public Key Cryptography, PKC'02
-
Springer
-
T. Izu and T. Takagi, A fast parallel elliptic curve multiplication resistant against side channel attacks, Public Key Cryptography, PKC'02, Lecture Notes in Computer Science, vol. 2274, Springer, 2002, pp. 280-296.
-
(2002)
Lecture Notes in Computer Science
, vol.2274
, pp. 280-296
-
-
Izu, T.1
Takagi, T.2
-
31
-
-
27544457322
-
Fast elliptic curve multiplications resistant against side channel attacks
-
_, Fast elliptic curve multiplications resistant against side channel attacks, IEICE Transactions Fundamentals E88-A (2005), no. 1, 161-171.
-
(2005)
IEICE Transactions Fundamentals
, vol.E88-A
, Issue.1
, pp. 161-171
-
-
Izu, T.1
Takagi, T.2
-
32
-
-
84944901711
-
-
M. Joye and C. Tymen, Protections against differential analysis for elliptic curve cryptography - an algebraic approach, Cryptographic Hardware and Embedded Systems, CHES'01, Lecture Notes in Computer Science, 2162, Springer, 2001, pp. 377 - 390. MR1946618 (2003k:94031)
-
M. Joye and C. Tymen, Protections against differential analysis for elliptic curve cryptography - an algebraic approach, Cryptographic Hardware and Embedded Systems, CHES'01, Lecture Notes in Computer Science, vol. 2162, Springer, 2001, pp. 377 - 390. MR1946618 (2003k:94031)
-
-
-
-
33
-
-
84968503742
-
Elliptic curve cryptosystems
-
MR866109 88b:94017
-
N. Koblitz, Elliptic curve cryptosystems, Mathematics of Computation 48 (1987), no. 177, 203-209. MR866109 (88b:94017)
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
34
-
-
84939573910
-
Differential power analysis, Advances in Cryptology, CRYPTO'99
-
Springer
-
P. Kocher, J. Jaffe, and B. Jun, Differential power analysis, Advances in Cryptology, CRYPTO'99, Lecture Notes in Computer Science, vol. 1666, Springer, 1999, pp. 388-397.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
35
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, Advances in Cryptology, CRYPTO'96
-
Springer
-
P. C. Kocher, Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, Advances in Cryptology, CRYPTO'96, Lecture Notes in Computer Science, vol. 1109, Springer, 1996, pp. 104-113.
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
37
-
-
84962984517
-
-
Journal of the London Mathematical Society, MR0002921 2:133e
-
K. Mahler, On a special functional equation, Journal of the London Mathematical Society s1-15 (1940), no. 2, 115-123. MR0002921 (2:133e)
-
(1940)
On a special functional equation
, vol.s1-15
, Issue.2
, pp. 115-123
-
-
Mahler, K.1
-
38
-
-
85015402934
-
Uses of elliptic curves in cryptography, Advances in Cryptology, CRYPTO'85
-
Springer, MR851432 88b:68040
-
V. S. Miller, Uses of elliptic curves in cryptography, Advances in Cryptology, CRYPTO'85, Lecture Notes in Computer Science, vol. 218, Springer, 1986, pp. 417-428. MR851432 (88b:68040)
-
(1986)
Lecture Notes in Computer Science
, vol.218
, pp. 417-428
-
-
Miller, V.S.1
-
39
-
-
0004769047
-
-
National Institute of Standards and Technology, National Institute of Standards and Technology, January
-
National Institute of Standards and Technology, FIPS PUB 186-2: Digital signature standard (DSS), National Institute of Standards and Technology, January 2000.
-
(2000)
FIPS PUB 186-2: Digital signature standard (DSS)
-
-
-
40
-
-
0010833349
-
On Mahler's partition problem
-
MR0053959 14:846m
-
W. B. Pennington, On Mahler's partition problem, Annals of Mathematics 57 (1953), no. 3, 531-546. MR0053959 (14:846m)
-
(1953)
Annals of Mathematics
, vol.57
, Issue.3
, pp. 531-546
-
-
Pennington, W.B.1
-
42
-
-
0012584245
-
Generalized mersenne numbers
-
CORR-99-39, Center for Applied Cryptographic Research, University of Waterloo, Waterloo, ON, Canada
-
J. Solinas, Generalized mersenne numbers, Research Report CORR-99-39, Center for Applied Cryptographic Research, University of Waterloo, Waterloo, ON, Canada, 1999.
-
(1999)
Research Report
-
-
Solinas, J.1
-
43
-
-
1642319117
-
-
Certicom Research The SECG group, Standard for Efficient Cryptography, September
-
Certicom Research The SECG group, SEC 2: Recommended elliptic curve domain parameters, Standard for Efficient Cryptography, September 2000, http://www.secg.org/.
-
(2000)
SEC 2: Recommended elliptic curve domain parameters
-
-
-
44
-
-
0042775601
-
On the maximal distance between integers composed of small primes
-
MR0345917 49:10646
-
R. Tijdeman, On the maximal distance between integers composed of small primes, Compositio Mathematica 28 (1974), 159-162. MR0345917 (49:10646)
-
(1974)
Compositio Mathematica
, vol.28
, pp. 159-162
-
-
Tijdeman, R.1
-
45
-
-
0004251247
-
-
2nd ed, Academic Press Inc, MR1277813 95a:05002
-
H. S. Wilf, Generatingiunctionology, 2nd ed., Academic Press Inc., 1994. MR1277813 (95a:05002)
-
(1994)
Generatingiunctionology
-
-
Wilf, H.S.1
|