-
1
-
-
70350632497
-
Handbook of elliptic and hyperelliptic curve cryptography
-
Avanzi, R.M., Cohen, H., Doche, C., Frey, G., Nguyen, K., Lange, T., Vercauteren, F.: Handbook of Elliptic and Hyperelliptic Curve Cryptography. In: Discrete Mathematics and its Applications, Chapman & Hall/CRC, Boca Raton (2005)
-
(2005)
Discrete Mathematics and Its Applications Chapman & Hall/CRC Boca Raton
-
-
Avanzi, R.M.1
Cohen, H.2
Doche, C.3
Frey, G.4
Nguyen, K.5
Lange, T.6
Vercauteren, F.7
-
2
-
-
77649268304
-
Extending scalar multiplication using double bases
-
Lai, X., Chen, K. (eds.) ASIACRYPT 2006. Springer, Heidelberg
-
Avanzi, R.M., Dimitrov, V.S., Doche, C., Sica, F.: Extending Scalar Multiplication Using Double Bases. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol.4284, pp. 130-144. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 130-144
-
-
Avanzi, R.M.1
Dimitrov, V.S.2
Doche, C.3
Sica, F.4
-
3
-
-
38349022454
-
Optimizing double-base ellipticcurve single-scalar multiplication
-
Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. Springer, Heidelberg
-
Bernstein, D.J., Birkner, P., Lange, T., Peters, C.: Optimizing double-base ellipticcurve single-scalar multiplication. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol.4859, pp. 167-182. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4859
, pp. 167-182
-
-
Bernstein, D.J.1
Birkner, P.2
Lange, T.3
Peters, C.4
-
4
-
-
15844364585
-
On converting numbers to the double-base number system
-
Luk, F.T. (ed.)
-
Berthé, V., Imbert, L.: On Converting Numbers to the Double-Base Number System. In: Luk, F.T. (ed.) Advanced Signal Processing Algorithms, Architecture and Implementations XIV. Proceedings of SPIE, vol.5559, pp. 70-78 (2004)
-
(2004)
Advanced Signal Processing Algorithms, Architecture and Implementations XIV. Proceedings of SPIE
, vol.5559
, pp. 70-78
-
-
Berthé, V.1
Imbert, L.2
-
6
-
-
38349013397
-
Inverted edwards coordinates
-
Bozta, S., Lu, H.- F(F.) (eds.) AAECC 2007. Springer, Heidelberg
-
Bernstein, D.J., Lange, T.: Inverted Edwards Coordinates. In: Bozta, S., Lu, H.- F(F.) (eds.) AAECC 2007. LNCS, vol.4851, pp. 20-27. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4851
, pp. 20-27
-
-
Bernstein, D.J.1
Lange, T.2
-
7
-
-
0003369154
-
Elliptic curves in cryptography
-
Cambridge University Press, Cambridge
-
Blake, I.F., Seroussi, G., Smart, N.P.: Elliptic Curves in Cryptography. London Mathematical Society Lecture Note Series, vol.265. Cambridge University Press, Cambridge (1999)
-
(1999)
London Mathematical Society Lecture Note Series
, vol.265
-
-
Blake, I.F.1
Seroussi, G.2
Smart, N.P.3
-
8
-
-
38049042605
-
Advances in elliptic curve cryptography
-
Cambridge University Press, Cambridge
-
Blake, I.F., Seroussi, G., Smart, N.P.: Advances in Elliptic Curve Cryptography. London Mathematical Society Lecture Note Series, vol.317. Cambridge University Press, Cambridge (2005)
-
(2005)
London Mathematical Society Lecture Note Series
, vol.317
-
-
Blake, I.F.1
Seroussi, G.2
Smart, N.P.3
-
9
-
-
33645106690
-
Trading Inversions for Multiplications in Elliptic Curve Cryptography
-
Ciet, M., Joye, M., Lauter, K., Montgomery, P.L.: Trading Inversions for Multiplications in Elliptic Curve Cryptography. Des. Codes Cryptogr. 39(2), 189-206 (2006)
-
(2006)
Des. Codes Cryptogr.
, vol.39
, Issue.2
, pp. 189-206
-
-
Ciet, M.1
Joye, M.2
Lauter, K.3
Montgomery, P.L.4
-
10
-
-
33646198552
-
An analysis of double base number systems and a sublinear scalar multiplication algorithm
-
Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. Springer, Heidelberg
-
Ciet, M., Sica, F.: An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol.3715, pp. 171-182. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3715
, pp. 171-182
-
-
Ciet, M.1
Sica, F.2
-
11
-
-
0029341533
-
Hybrid algorithm for the computation of the matrix polynomial I+A+•• •+AN-1
-
Dimitrov, V.S., Cooklev, T.: Hybrid Algorithm for the Computation of the Matrix Polynomial I+A+•• •+AN-1. IEEE Trans. on Circuits and Systems 42(7), 377-380 (1995)
-
(1995)
IEEE Trans. on Circuits and Systems
, vol.42
, Issue.7
, pp. 377-380
-
-
Dimitrov, V.S.1
Cooklev, T.2
-
12
-
-
84992376874
-
Extended double-base number system with applications to elliptic curve cryptography
-
Barua, R., Lange, T. (eds.) INDOCRYPT 2006. Springer, Heidelberg
-
Doche, C., Imbert, L.: Extended Double-Base Number System with Applications to Elliptic Curve Cryptography. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol.4329, pp. 335-348. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4329
, pp. 335-348
-
-
Doche, C.1
Imbert, L.2
-
13
-
-
33745856887
-
Efficient scalar multiplication by isogeny decompositions
-
Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. Springer, Heidelberg
-
Doche, C., Icart, T., Kohel, D.R.: Efficient Scalar Multiplication by Isogeny Decompositions. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol.3958, pp. 191-206. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3958
, pp. 191-206
-
-
Doche, C.1
Icart, T.2
Kohel, D.R.3
-
14
-
-
33646759248
-
Efficient and secure elliptic curve point multiplication using double-base chains
-
Roy, B. (ed.) ASIACRYPT 2005. Springer, Heidelberg
-
Dimitrov, V.S., Imbert, L., Mishra, P.K.: Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol.3788, pp. 59-78. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 59-78
-
-
Dimitrov, V.S.1
Imbert, L.2
Mishra, P.K.3
-
15
-
-
0002535157
-
An algorithm for modular exponentiation
-
Dimitrov, V.S., Jullien, G.A., Miller, W.C.: An Algorithm for Modular Exponentiation. Information Processing Letters 66(3), 155-159 (1998)
-
(1998)
Information Processing Letters
, vol.66
, Issue.3
, pp. 155-159
-
-
Dimitrov, V.S.1
Jullien, G.A.2
Miller, W.C.3
-
18
-
-
11244267013
-
-
Springer, Heidelberg
-
Hankerson, D., Menezes, A.J., Vanstone, S.A.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2003)
-
(2003)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.1
Menezes, A.J.2
Vanstone, S.A.3
-
19
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz, N.: Elliptic Curve Cryptosystems. Math. Comp. 48(177), 203-209 (1987)
-
(1987)
Math. Comp.
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
20
-
-
38149003750
-
Efficient quintuple formulas for elliptic curves and efficient scalar multiplication using multibase number representation
-
Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. Springer, Heidelberg
-
Mishra, P.K., Dimitrov, V.S.: Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol.4779, pp. 390-406. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4779
, pp. 390-406
-
-
Mishra, P.K.1
Dimitrov, V.S.2
-
21
-
-
85015402934
-
Use of elliptic curves in cryptography
-
Williams, H.C. (ed.) CRYPTO 1985. Springer, Heidelberg
-
Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.218, pp. 417-426. Springer, Heidelberg (1986)
-
(1986)
LNCS
, vol.218
, pp. 417-426
-
-
Miller, V.S.1
-
22
-
-
70349872198
-
Elliptic curves
-
Number theory and cryptography, Chapman and Hall, Boca Raton
-
Washington, L.C.: Elliptic Curves. In: Discrete Mathematics and its Applications. Number theory and cryptography, Chapman and Hall, Boca Raton (2003)
-
(2003)
Discrete Mathematics and Its Applications
-
-
Washington, L.C.1
|