-
1
-
-
35048858891
-
Aspects of hyper-elliptic curves over large prime fields in software implementations
-
M. Avanzi, "Aspects of hyper-elliptic curves over large prime fields in software implementations," Cryptographic Hardware and Embedded Systems, vol. 3156, pp. 148-162, 2004.
-
(2004)
Cryptographic Hardware and Embedded Systems
, vol.3156
, pp. 148-162
-
-
Avanzi, M.1
-
2
-
-
84875325312
-
-
Taylor and Francis, Florida Henri Cohen, Gerhard Frey, Chapman and Hall/CRC
-
R. M. Avanzi, and L. Tanja, Introduction to Public key cryptography from Handbook of Elliptic and Hyper elliptic curve cryptography eds. Henri Cohen, Gerhard Frey, Chapman and Hall/CRC, Taylor and Francis, Florida, 2006.
-
(2006)
Introduction to Public key cryptography from Handbook of Elliptic and Hyper elliptic curve cryptography eds.
-
-
Avanzi, R.M.1
Tanja, L.2
-
3
-
-
84875361287
-
Cryptographic hardware and embedded systems
-
CA, USA, B.S.K.Jr.
-
B. S. K. Jr., C. K. Koc, and C. Paar, "Cryptographic hardware and embedded systems," 4th International Workshop, Bedwood Shores, pp. 400-414, CA, USA, 2002.
-
(2002)
4th International Workshop, Bedwood Shores
, pp. 400-414
-
-
Koc, C.K.1
Paar, C.2
-
4
-
-
84875318157
-
-
Taylor and Francis Group, Florida
-
S. Duquesne, and T. Lange, Arithmetic of Hyper elliptic curves from Handbook of Elliptic and Hyper Elliptic Curve Cryptography by Henri Cohen, Gerhard Frey, Chapman and Hall/CRC, Taylor and Francis Group, Florida, 2006.
-
(2006)
Arithmetic of Hyper elliptic curves from Handbook of Elliptic and Hyper Elliptic Curve Cryptography by Henri Cohen, Gerhard Frey, Chapman and Hall/CRC
-
-
Duquesne, S.1
Lange, T.2
-
5
-
-
84875316718
-
-
School of Computing, Dublin City University, Dublin, Ireland
-
C. O. Eigeartaigh, A Comparison of Point Counting Methods for Hyper Elliptic Curve over Prime Fields and Field of Characteristics of 2, Technical report, School of Computing, Dublin City University, Dublin, Ireland.
-
A Comparison of Point Counting Methods for Hyper Elliptic Curve over Prime Fields and Field of Characteristics of 2, Technical report
-
-
Eigeartaigh, C.O.1
-
6
-
-
84875318079
-
-
University of Water-loo, Waterloo, Ontario N2L 3G1, CANADA Department of Electrical and Computer Engineering
-
X. Fan, and G. Gong, Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations, Department of Electrical and Computer Engineering, University of Water-loo, Waterloo, Ontario N2L 3G1, CANADA, 2007.
-
(2007)
Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations
-
-
Fan, X.1
Gong, G.2
-
7
-
-
84875346670
-
-
(http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf)
-
-
-
-
8
-
-
33646261491
-
Authenticated encryption schemes: Current status and key issues
-
M. S. Hwang, and C. Y. Liu, "Authenticated encryption schemes: Current status and key issues," International Journal of Network Security, vol. 1, no. 2, pp. 61-73, 2005.
-
(2005)
International Journal of Network Security
, vol.1
, Issue.2
, pp. 61-73
-
-
Hwang, M.S.1
Liu, C.Y.2
-
9
-
-
70450133829
-
-
Silicon Valley Campus, Nov. 14 Microsoft Research
-
M. Ilya, Hash functions: Theory, Attacks, and Applications,' Microsoft Research, Silicon Valley Campus, Nov. 14, 2005.
-
(2005)
Hash functions: Theory, Attacks, and Applications
-
-
Ilya, M.1
-
10
-
-
77953816916
-
Mathematical attacks on RSA cryptosystem
-
Aug.
-
I. K. Salah, A. Darwish, and S. Oqeili, "Mathematical attacks on RSA cryptosystem," Journal of Computer Science, pp. 656-671, Aug. 2006.
-
(2006)
Journal of Computer Science
, pp. 656-671
-
-
Salah, I.K.1
Darwish, A.2
Oqeili, S.3
-
13
-
-
3042619844
-
-
University of Waterloo, Ontario, Canada, Nov.
-
A. J. Menezes, Y. H. Wu, R. J. Zuccherato, An Elementary Introduction to Hyper Elliptic Curves, Technical Report CORR 96-19, University of Waterloo, Ontario, Canada, Nov. 1996.
-
(1996)
An Elementary Introduction to Hyper Elliptic Curves, Technical Report CORR 96-19
-
-
Menezes, A.J.1
Wu, Y.H.2
Zuccherato, R.J.3
-
14
-
-
0033685799
-
On the practical performance of hyper-elliptic curve cryptosystems in software implementation,
-
Apr.
-
Y. Sakai, K. Sakurai, "On the practical performance of hyper-elliptic curve cryptosystems in software implementation," IEICE Transactions on Fundamentals, vol. E83-A, no. 4, Apr. 2000.
-
(2000)
IEICE Transactions on Fundamentals
, vol.E83-A
, Issue.4
-
-
Sakai, Y.1
Sakurai, K.2
-
16
-
-
84875333113
-
-
Sun Java
-
Sun Java. (http://java.sun.com/j2se/1.3/docs/guide/security/CryptoSpec.html)
-
-
-
-
17
-
-
84875332333
-
-
RFC1321
-
RFC1321. (http://www.scit.wlv.ac.uk/rfc/rfc13xx/RFC1321.html)
-
-
-
-
18
-
-
84875356514
-
-
U. S. Department of Commerce/NIST, FIPS PUB 197, Specification for the Advanced Encryption Standard (AES), Nov.
-
U. S. Department of Commerce/NIST, FIPS PUB 197, Specification for the Advanced Encryption Standard (AES), Nov. 2001. (http://csrc.nist.gov/encryption/aes)
-
(2001)
-
-
-
19
-
-
0037235338
-
Constructing hyper-elliptic curves of genus 2 suitable for cryptography
-
A. Weng, "Constructing hyper-elliptic curves of genus 2 suitable for cryptography," Mathematics of Computation, pp. 435-458, 2003
-
(2003)
Mathematics of Computation
, pp. 435-458
-
-
Weng, A.1
|