메뉴 건너뛰기




Volumn 1, Issue 2, 2008, Pages 1-21

Special-Purpose Hardware for Solving the Elliptic Curve Discrete Logarithm Problem

Author keywords

Algorithms; cryptanalysis; Discrete logarithm; elliptic curve cryptosystem; Performance; Pollard's rho; Security

Indexed keywords


EID: 84859465967     PISSN: 19367406     EISSN: 19367414     Source Type: Journal    
DOI: 10.1145/1371579.1371580     Document Type: Article
Times cited : (10)

References (20)
  • 3
    • 34547326549 scopus 로고    scopus 로고
    • Fast modular inversion in the Montgomery Domain on reconfigurable logic
    • University College Cork, Cork, Ireland
    • Daly, A., Marnaney, L., Popovici, E., 2004. Fast modular inversion in the Montgomery Domain on reconfigurable logic. Tech. rep., University College Cork, Cork, Ireland.
    • (2004) Tech. rep.
    • Daly, A.1    Marnaney, L.2    Popovici, E.3
  • 6
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Elgamal, T., 1985. A public key cryptosystem and a signature scheme based on discrete logarithms.IEEE Trans. Inform. Theory 31, 469-472.
    • (1985) IEEE Trans. Inform. Theory , vol.31 , pp. 469-472
    • Elgamal, T.1
  • 10
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz, N., 1987. Elliptic curve cryptosystems.Math. Comput. 48, 203-209.
    • (1987) Math. Comput. , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 12
    • 0000653210 scopus 로고    scopus 로고
    • Selecting Cryptographic key sizes
    • Lenstra, A., Verheul, E., 2001. Selecting Cryptographic key sizes.J. Cryptol. 14, 4, 255-293.
    • (2001) J. Cryptol. , vol.14 , Issue.4 , pp. 255-293
    • Lenstra, A.1    Verheul, E.2
  • 14
    • 85015402934 scopus 로고
    • Uses of elliptic curves in cryptography
    • H. C. Williams, Ed. Vol. Lecture Notes in Computer Science Springer
    • Miller, V., 1986. Uses of elliptic curves in cryptography. In Advances in Cryptology- (CRYPTO'85), H. C. Williams, Ed. Vol. Lecture Notes in Computer Science, 218. Springer, 417-426.
    • (1986) Advances in Cryptology- (CRYPTO'85 , vol.218 , pp. 417-426
    • Miller, V.1
  • 17
    • 84966238549 scopus 로고
    • Monte Carlo methods for index computation mod p
    • Pollard, J., 1978. Monte Carlo methods for index computation mod p.Math. Comput. 32, 143, 918-924.
    • (1978) Math. Comput. , vol.32 , Issue.143 , pp. 918-924
    • Pollard, J.1
  • 18
    • 35248849882 scopus 로고    scopus 로고
    • Factoring large numbers with the TWIRL device
    • Lecture Notes in Computer Science, Springer
    • Shamir, A., Tromer, E., 2003. Factoring large numbers with the TWIRL device. In Advances in Cryptology-(Crypto'03). Lecture Notes in Computer Science, vol. 2729. Springer, 1-26.
    • (2003) Advances in Cryptology-(Crypto'03) , vol.2729 , pp. 1-26
    • Shamir, A.1    Tromer, E.2
  • 19
    • 84947761194 scopus 로고    scopus 로고
    • Speeding up Pollard's rho method for computing discrete logarithms
    • Teske, E., 1998. Speeding up Pollard's rho method for computing discrete logarithms.Algorithmic Number Theory Seminar (ANTS-III), 541-554.
    • (1998) Algorithmic Number Theory Seminar (ANTS-III , pp. 541-554
    • Teske, E.1
  • 20
    • 17444376558 scopus 로고    scopus 로고
    • Parallel collision search with cryptanalytic applications
    • Oorschot Van, P., Wiener, M., 1999. Parallel collision search with cryptanalytic applications.J. Cryptol. 12, 1-28.
    • (1999) J. Cryptol. , vol.12 , pp. 1-28
    • Oorschot Van, P.1    Wiener, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.