-
1
-
-
84968503742
-
Elliptic Curve Cryptosystems
-
N. Koblitz, "Elliptic Curve Cryptosystems," Math. Computation, vol. 48, pp. 203-209, 1987.
-
(1987)
Math. Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
2
-
-
85015402934
-
Use of Elliptic Curves in Cryptography
-
V. Miller, "Use of Elliptic Curves in Cryptography," Advances in Cryptology - CRYPTO "85, pp. 417-426, 1986.
-
(1986)
Advances in Cryptology - CRYPTO 85
, pp. 417-426
-
-
Miller, V.1
-
3
-
-
85024567680
-
CM-Curves with Good Cryptographic Properties
-
N. Koblitz, "CM-Curves with Good Cryptographic Properties," Advances in Cryptology - CRYPTO '91, pp. 279-287, 1992.
-
(1992)
Advances in Cryptology - CRYPTO '91
, pp. 279-287
-
-
Koblitz, N.1
-
4
-
-
0003508562
-
Digital Signature Standard (DSS), Fed
-
Nat'l Inst. of Standards and Technology (NIST) Computer Security FIPS PUB, Jan
-
Digital Signature Standard (DSS), Fed. Information Processing Standard, FIPS PUB 186-2, Nat'l Inst. of Standards and Technology (NIST) Computer Security FIPS PUB 186-2, Jan. 2000.
-
(2000)
Information Processing Standard, FIPS PUB 186-2
, pp. 186-192
-
-
-
5
-
-
0010029876
-
Efficient Arithmetic on Koblitz Curves
-
J. Solinas, "Efficient Arithmetic on Koblitz Curves," Designs, Codes and Cryptography, vol. 19, pp. 195-249, 2000.
-
(2000)
Designs, Codes and Cryptography
, vol.19
, pp. 195-249
-
-
Solinas, J.1
-
6
-
-
33745617110
-
Minimality of the Hamming Weight of the τ-NAF for Koblitz Curves and Improved Combination with Point Halving
-
R. Avanzi, C. Heuberger, and H. Prodinger, "Minimality of the Hamming Weight of the τ-NAF for Koblitz Curves and Improved Combination with Point Halving," Selected Areas in Cryptography - SAC '05, pp. 332-344, 2005.
-
(2005)
Selected Areas in Cryptography - SAC '05
, pp. 332-344
-
-
Avanzi, R.1
Heuberger, C.2
Prodinger, H.3
-
7
-
-
0002535157
-
An Algorithm for Modular Exponentiation
-
V. Dimitrov, G. Jullien, and W. Miller, "An Algorithm for Modular Exponentiation," Information Processing Letters, vol. 66, no. 3, pp. 155-159, 1998.
-
(1998)
Information Processing Letters
, vol.66
, Issue.3
, pp. 155-159
-
-
Dimitrov, V.1
Jullien, G.2
Miller, W.3
-
8
-
-
33646198552
-
An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm
-
M. Ciet and F. Sica, "An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm," Progress in Cryptology - Mycrypt '05, pp. 171-182, 2005.
-
(2005)
Progress in Cryptology - Mycrypt '05
, pp. 171-182
-
-
Ciet, M.1
Sica, F.2
-
9
-
-
33646759248
-
Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains
-
V. Dimitrov, L. Imbert, and P. Mishra, "Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains," Advances in Cryptology - ASIACRYPT '05, pp. 59-78, 2005.
-
(2005)
Advances in Cryptology - ASIACRYPT '05
, pp. 59-78
-
-
Dimitrov, V.1
Imbert, L.2
Mishra, P.3
-
10
-
-
33750681266
-
FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers
-
V.S. Dimitrov, K.U. Järvinen, M.J. Jacobson Jr., W.F. Chan, and Z. Huang, "FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers," Cryptographic Hardware and Embedded Systems - CHES '06, pp. 445-459, 2006.
-
(2006)
Cryptographic Hardware and Embedded Systems - CHES '06
, pp. 445-459
-
-
Dimitrov, V.S.1
Järvinen, K.U.2
Jacobson Jr., M.J.3
Chan, W.F.4
Huang, Z.5
-
11
-
-
84887303740
-
Scalar Multiplication on Koblitz Curves Using Double Bases
-
R. Avanzi and F. Sica, "Scalar Multiplication on Koblitz Curves Using Double Bases," Progress in Cryptology - VIETCRYPT '06, pp. 131-146, 2006.
-
(2006)
Progress in Cryptology - VIETCRYPT '06
, pp. 131-146
-
-
Avanzi, R.1
Sica, F.2
-
14
-
-
0013343905
-
On Integers with Many Small Prime Factors
-
R. Tijdeman, "On Integers with Many Small Prime Factors," Composition Math., vol. 26, no. 3, pp. 319-330, 1973.
-
(1973)
Composition Math
, vol.26
, Issue.3
, pp. 319-330
-
-
Tijdeman, R.1
-
15
-
-
84974028756
-
Linear Forms in the Logarithms of Algebraic Numbers IV
-
A. Baker, "Linear Forms in the Logarithms of Algebraic Numbers IV," Math., vol. 15, pp. 204-216, 1968.
-
(1968)
Math
, vol.15
, pp. 204-216
-
-
Baker, A.1
-
17
-
-
54049112450
-
-
personal communication
-
R. Tijdeman, personal communication, 2006.
-
(2006)
-
-
Tijdeman, R.1
-
19
-
-
77649266162
-
-
C. Doche and T. Lange, Arithmetic of Elliptic Curves, Handbook of Elliptic and Hyperelliptic Curve Cryptography, Chapman and Hall/CRC, H. Cohen and G. Frey, eds., chapter 13, pp. 267-302, 2006.
-
C. Doche and T. Lange, "Arithmetic of Elliptic Curves," Handbook of Elliptic and Hyperelliptic Curve Cryptography, Chapman and Hall/CRC, H. Cohen and G. Frey, eds., chapter 13, pp. 267-302, 2006.
-
-
-
-
20
-
-
0034539246
-
n Using Projective Coordinates
-
n Using Projective Coordinates," Information Processing Letters, vol. 76, no. 3, pp. 101-103, 2000.
-
(2000)
Information Processing Letters
, vol.76
, Issue.3
, pp. 101-103
-
-
Higuchi, A.1
Takagi, N.2
-
21
-
-
0036685958
-
n)
-
Aug
-
n)," IEEE Trans. Computers, vol. 51, no. 8, pp. 972-975, Aug. 2002.
-
(2002)
IEEE Trans. Computers
, vol.51
, Issue.8
, pp. 972-975
-
-
Al-Daoud, E.1
Mahmod, R.2
Rushdan, M.3
Kilicman, A.4
-
22
-
-
0000827611
-
m) Using Normal Bases
-
Sept
-
m) Using Normal Bases," Information and Computation, vol. 78, no. 3, pp. 171-177, Sept. 1988.
-
(1988)
Information and Computation
, vol.78
, Issue.3
, pp. 171-177
-
-
Itoh, T.1
Tsujii, S.2
-
23
-
-
47649131359
-
-
Altera, May 2007
-
Stratix II Device Handbook, Altera, http://www.altera.com/ literature/hb/stx2/stratix2_handbook.pdf, May 2007.
-
Stratix II Device Handbook
-
-
-
25
-
-
0022108239
-
m)
-
Aug
-
m)," IEEE Trans. Computers, vol. 34, no. 8, pp. 709-717, Aug. 1985.
-
(1985)
IEEE Trans. Computers
, vol.34
, Issue.8
, pp. 709-717
-
-
Wang, C.1
Troung, T.2
Shao, H.3
Deutsch, L.4
Omura, J.5
Reed, I.6
-
26
-
-
33750629673
-
High Performance Architecture of Elliptic Curve Scalar Multiplication,
-
Technical Report CACR 2006-1, Univ. of Waterloo
-
B. Ansari and M.A. Hasan, "High Performance Architecture of Elliptic Curve Scalar Multiplication," Technical Report CACR 2006-1, Univ. of Waterloo, 2006.
-
(2006)
-
-
Ansari, B.1
Hasan, M.A.2
-
28
-
-
84966669938
-
-
M. Bednara, M. Daldrup, J. von zur Gathen, J. Shokrollahi, and J. Teich, Reconfigurable Implementation of Elliptic Curve Crypto Algorithms, Proc. Reconfigurable Architectures Workshop, Int'l Parallel and Distributed Processing Symp. (IPDPS '02), pp. 157-164, Apr. 2002.
-
M. Bednara, M. Daldrup, J. von zur Gathen, J. Shokrollahi, and J. Teich, "Reconfigurable Implementation of Elliptic Curve Crypto Algorithms," Proc. Reconfigurable Architectures Workshop, Int'l Parallel and Distributed Processing Symp. (IPDPS '02), pp. 157-164, Apr. 2002.
-
-
-
-
29
-
-
33746926791
-
m) Elliptic Curve Cryptography Processors
-
June
-
m) Elliptic Curve Cryptography Processors," IEEE Trans. Very Large Scale Integration Systems, vol. 14, no. 6, pp. 659-662, June 2006.
-
(2006)
IEEE Trans. Very Large Scale Integration Systems
, vol.14
, Issue.6
, pp. 659-662
-
-
Benaissa, M.1
Lim, W.2
-
30
-
-
27844462077
-
Customizable Elliptic Curve Cryptosystem
-
Sept
-
R. Cheung, N. Telle, W. Luk, and P. Cheung, "Customizable Elliptic Curve Cryptosystem," IEEE Trans. Very Large Scale Integration Systems, vol. 13, pp. 1048-1059, Sept. 2005.
-
(2005)
IEEE Trans. Very Large Scale Integration Systems
, vol.13
, pp. 1048-1059
-
-
Cheung, R.1
Telle, N.2
Luk, W.3
Cheung, P.4
-
32
-
-
38049055224
-
FPGA Design of Self-Certified Signature Verification on Koblitz Curves
-
K. Järvinen, J. Forsten, and J. Skyttä, "FPGA Design of Self-Certified Signature Verification on Koblitz Curves," Cryptographic Hardware and Embedded Systems - CHES '07, pp. 256-271, 2007.
-
(2007)
Cryptographic Hardware and Embedded Systems - CHES '07
, pp. 256-271
-
-
Järvinen, K.1
Forsten, J.2
Skyttä, J.3
-
33
-
-
0036819906
-
A Microcoded Elliptic Curve Processor Using FPGA Technology
-
Oct
-
P. Leong and K. Leung, "A Microcoded Elliptic Curve Processor Using FPGA Technology," IEEE Trans. Very Large Scale Integration Systems vol. 10, no. 5, pp. 550-559, Oct. 2002.
-
(2002)
IEEE Trans. Very Large Scale Integration Systems
, vol.10
, Issue.5
, pp. 550-559
-
-
Leong, P.1
Leung, K.2
-
37
-
-
2642579951
-
m
-
Aug
-
m" Microprocessors and Microsystems, vol. 28, nos. 5-6, pp. 329-339, Aug. 2004.
-
(2004)
Microprocessors and Microsystems
, vol.28
, Issue.5-6
, pp. 329-339
-
-
Rodríguez-Henríquez, F.1
Saqib, N.2
Díaz-Pérez, A.3
-
38
-
-
33846619239
-
Low Latency Elliptic Curve Cryptography Accelerators for NIST Curves over Binary Fields
-
Dec
-
C. Shu, K. Gaj, and T. El-Ghazawi, "Low Latency Elliptic Curve Cryptography Accelerators for NIST Curves over Binary Fields," Proc. IEEE Int'l Conf. Field-Programmable Technology (FPT '05), pp. 309-310, Dec. 2005.
-
(2005)
Proc. IEEE Int'l Conf. Field-Programmable Technology (FPT '05)
, pp. 309-310
-
-
Shu, C.1
Gaj, K.2
El-Ghazawi, T.3
|