-
1
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz, "Elliptic Curve Cryptosystems," Math. of Computation, vol.48, no.177, pp. 203-209, 1987.
-
(1987)
Math. of Computation
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
2
-
-
85015402934
-
Use of elliptic curves in cryptography
-
Springer
-
V. Miller, "Use of Elliptic Curves in Cryptography," Advances in Cryptology-CRYPTO '85, pp. 417-426, Springer, 1986.
-
(1986)
Advances in Cryptology-CRYPTO '85
, pp. 417-426
-
-
Miller, V.1
-
3
-
-
85024567680
-
CM-curves with good cryptographic properties
-
Springer
-
N. Koblitz, "CM-Curves with Good Cryptographic Properties," Advances in Cryptology-CRYPTO '91, pp. 279-287, Springer, 1992.
-
(1992)
Advances in Cryptology-CRYPTO '91
, pp. 279-287
-
-
Koblitz, N.1
-
4
-
-
0003508562
-
-
Fed. Information Processing Standard, Nat'l Inst. of Standards and Technology Std., FIPS PUB, Jan.
-
Digital Signature Standard (DSS), Fed. Information Processing Standard, Nat'l Inst. of Standards and Technology Std. FIPS PUB 186-192, Jan. 2000.
-
(2000)
Digital Signature Standard (DSS)
, pp. 186-192
-
-
-
5
-
-
0003442758
-
-
Standards for Efficient Cryptography, Certicom Research Std. SEC 1, Sept.
-
Elliptic Curve Cryptography, Standards for Efficient Cryptography, Certicom Research Std. SEC 1, Sept. 2000.
-
(2000)
Elliptic Curve Cryptography
-
-
-
6
-
-
35348847007
-
-
Standards for Efficient Cryptography, Certicom Research Std. SEC 2, Sept.
-
Recommended Elliptic Curve Domain Parameters, Standards for Efficient Cryptography, Certicom Research Std. SEC 2, Sept. 2000.
-
(2000)
Recommended Elliptic Curve Domain Parameters
-
-
-
7
-
-
0010029876
-
Efficient arithmetic on koblitz curves
-
Mar.
-
J.A. Solinas, "Efficient Arithmetic on Koblitz Curves," Designs, Codes and Cryptography, vol.19, nos. 2/3, pp. 195-249, Mar. 2000.
-
(2000)
Designs, Codes and Cryptography
, vol.19
, Issue.2-3
, pp. 195-249
-
-
Solinas, J.A.1
-
8
-
-
33846260842
-
High-speed hardware implementations of elliptic curve cryptography: A survey
-
Feb./ Mar.
-
G. Meurice de Dormale and J.-J. Quisquater, "High-Speed Hardware Implementations of Elliptic Curve Cryptography: A Survey," J. Systems Architecture, vol.53, nos. 2/3, pp. 72-84, Feb./ Mar. 2007.
-
(2007)
J. Systems Architecture
, vol.53
, Issue.2-3
, pp. 72-84
-
-
De D.G.Meurice1
Quisquater, J.-J.2
-
12
-
-
62249110288
-
Fast point multiplication on koblitz curves: Parallelization method and implementations
-
Mar.
-
K.U. Järvinen and J.O. Skyttä, "Fast Point Multiplication on Koblitz Curves: Parallelization Method and Implementations," Microprocessors and Microsystems, vol.33, no.2, pp. 106-116, Mar. 2009.
-
(2009)
Microprocessors and Microsystems
, vol.33
, Issue.2
, pp. 106-116
-
-
Järvinen, K.U.1
Skyttä, J.O.2
-
13
-
-
38049077189
-
Efficient circuitry for computing--adic non-adjacent form
-
K. Järvinen, J. Forsten, and J. Skyttä , "Efficient Circuitry for Computing--adic Non-Adjacent Form," Proc. IEEE Int'l Conf. Electronics, Circuits and Systems (ICECS '06), pp. 232-235, 2006.
-
(2006)
Proc. IEEE Int'l Conf. Electronics, Circuits and Systems (ICECS '06)
, pp. 232-235
-
-
Järvinen, K.1
Forsten, J.2
Skyttä, J.3
-
15
-
-
33750681266
-
FPGA implementation of point multiplication on koblitz curves using kleinian integers
-
V.S. Dimitrov, K.U. Järvinen, M.J. Jacobson Jr., W.F. Chan, and Z. Huang, "FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '06), pp. 445-459, 2006.
-
(2006)
Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '06)
, pp. 445-459
-
-
Dimitrov, V.S.1
Järvinen, K.U.2
Jacobson Jr., M.J.3
Chan, W.F.4
Huang, Z.5
-
16
-
-
54049083879
-
Provably sublinear point multiplication on koblitz curves and its hardware implementation
-
Nov.
-
V.S. Dimitrov, K.U. Järvinen, M.J. Jacobson Jr., W.F. Chan, and Z. Huang, "Provably Sublinear Point Multiplication on Koblitz Curves and Its Hardware Implementation," IEEE Trans. Computers, vol.57, no.11, pp. 1469-1481, Nov. 2008.
-
(2008)
IEEE Trans. Computers
, vol.57
, Issue.11
, pp. 1469-1481
-
-
Dimitrov, V.S.1
Järvinen, K.U.2
Jacobson Jr., M.J.3
Chan, W.F.4
Huang, Z.5
-
17
-
-
84958649729
-
An improved algorithm for arithmetic on a family of elliptic curves
-
Springer
-
J.A. Solinas, "An Improved Algorithm for Arithmetic on a Family of Elliptic Curves," Advances in Cryptology-CRYPTO '97, pp. 357-371, Springer, 1997.
-
(1997)
Advances in Cryptology-CRYPTO '97
, pp. 357-371
-
-
Solinas, J.A.1
-
18
-
-
72949108744
-
-
Apr.
-
Atmel Corp., "ATtiny2313 Preliminary," http://www.atmel. com/dyn/resources/prod-documents/doc2543.pdf, Apr. 2006.
-
(2006)
ATtiny2313 Preliminary
-
-
-
19
-
-
42349109793
-
The double-base number system and its application to elliptic curve cryptography
-
Apr.
-
V. Dimitrov, L. Imbert, and P.K. Mishra, "The Double-Base Number System and its Application to Elliptic Curve Cryptography," Math. of Computation, vol.77, no.262, pp. 1075-1104, Apr. 2008.
-
(2008)
Math. of Computation
, vol.77
, Issue.262
, pp. 1075-1104
-
-
Dimitrov, V.1
Imbert, L.2
Mishra, P.K.3
-
20
-
-
84887303740
-
Scalar multiplication on koblitz curves using double bases
-
Springer
-
R. Avanzi and F. Sica, "Scalar Multiplication on Koblitz Curves Using Double Bases," Progress in Cryptology-VIETCRYPT '06, pp. 131-146, Springer, 2006.
-
(2006)
Progress in Cryptology-VIETCRYPT '06
, pp. 131-146
-
-
Avanzi, R.1
Sica, F.2
-
21
-
-
77649268304
-
Extending scalar multiplication using double bases
-
Springer
-
R. Avanzi, V.S. Dimitrov, C. Doche, and F. Sica, "Extending Scalar Multiplication Using Double Bases," Advances in Cryptology-ASIACRYPT '06, pp. 130-144, Springer, 2006.
-
(2006)
Advances in Cryptology-ASIACRYPT '06
, pp. 130-144
-
-
Avanzi, R.1
Dimitrov, V.S.2
Doche, C.3
Sica, F.4
-
22
-
-
84957797355
-
Efficient multiplication on certain nonsupersingular elliptic curves
-
Springer
-
W. Meier and O. Staffelbach, "Efficient Multiplication on Certain Nonsupersingular Elliptic Curves," Advances in Cryptology--CRYPTO '92, pp. 333-344, Springer, 1993.
-
(1993)
Advances in Cryptology--CRYPTO '92
, pp. 333-344
-
-
Meier, W.1
Staffelbach, O.2
-
24
-
-
13644269957
-
Collisions in fast generation of ideal classes and points on hyperelliptic and elliptic curves
-
T. Lange and I. Shparlinski, "Collisions in Fast Generation of Ideal Classes and Points on Hyperelliptic and Elliptic Curves," Applicable Algebra in Eng., Comm. and Computing, vol.15, no.5, pp. 329-337, 2005.
-
(2005)
Applicable Algebra in Eng., Comm. and Computing
, vol.15
, Issue.5
, pp. 329-337
-
-
Lange, T.1
Shparlinski, I.2
-
25
-
-
0017018484
-
New directions in cryptography
-
Nov.
-
W. Diffie and M.E. Hellman, "New Directions in Cryptography," IEEE Trans. Information Theory, vol.IT-22, no.6, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
26
-
-
15544386455
-
Koblitz curve cryptosystems
-
T. Lange, "Koblitz Curve Cryptosystems," Finite Fields and their Applications, vol.11, no.2, pp. 200-229, 2005.
-
(2005)
Finite Fields and Their Applications
, vol.11
, Issue.2
, pp. 200-229
-
-
Lange, T.1
-
28
-
-
84957677506
-
Optimal extension fields for fast arithmetic in public-key algorithms
-
Springer
-
D.V. Bailey and C. Paar, "Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms," Advances in Cryptology-CRYPTO '98, pp. 472-485, Springer, 1998.
-
(1998)
Advances in Cryptology-CRYPTO '98
, pp. 472-485
-
-
Bailey, D.V.1
Paar, C.2
-
29
-
-
0004143165
-
-
Springer-Verlag New York, Inc.
-
N. Koblitz, A.J. Menezes, Y.-H. Wu, and R.J. Zuccherato, Algebraic Aspects of Cryptography. Springer-Verlag New York, Inc., 1998.
-
(1998)
Algebraic Aspects of Cryptography
-
-
Koblitz, N.1
Menezes, A.J.2
Wu, Y.-H.3
Zuccherato, R.J.4
-
30
-
-
84943632039
-
Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
-
Springer
-
P.C. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," Advances in Cryptology-CRYPTO '96, pp. 104-113, Springer, 1996.
-
(1996)
Advances in Cryptology-CRYPTO '96
, pp. 104-113
-
-
Kocher, P.C.1
-
31
-
-
84939573910
-
Differential power analysis
-
Springer
-
P. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis," Advances in Cryptology-CRYPTO '99, pp. 388-397, Springer, 1999.
-
(1999)
Advances in Cryptology-CRYPTO '99
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
33
-
-
37149000571
-
Power analysis attacks and countermeasures
-
Nov./Dec.
-
T. Popp, E. Oswald, and S. Mangard, "Power Analysis Attacks and Countermeasures," IEEE Design and Test of Computers, vol.24, no.6, pp. 535-543, Nov./Dec. 2007.
-
(2007)
IEEE Design and Test of Computers
, vol.24
, Issue.6
, pp. 535-543
-
-
Popp, T.1
Oswald, E.2
Mangard, S.3
-
34
-
-
0038670954
-
Software implementation of elliptic curve cryptography over binary fields
-
D. Hankerson, J.L. Hernandez, and A. Menezes, "Software Implementation of Elliptic Curve Cryptography Over Binary Fields," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '00), pp. 1-24, 2000.
-
(2000)
Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '00)
, pp. 1-24
-
-
Hankerson, D.1
Hernandez, J.L.2
Menezes, A.3
-
35
-
-
72949101486
-
-
May
-
Altera Corp., "Stratix II Device Handbook," vols. 1/2, http:// www.altera.com/literature/hb/stx2/stratix2-handbook.pdf, May 2007.
-
(2007)
Stratix II Device Handbook
, vol.1-2
-
-
|