-
1
-
-
79952257029
-
-
American National Standards Institute (ANSI). Public Key Cryptography for the Financial Services Industry, The Elliptic Curve Digital Signature Algorithm (ECDSA)
-
American National Standards Institute (ANSI). American National Standard X9.62-2005. Public Key Cryptography for the Financial Services Industry, The Elliptic Curve Digital Signature Algorithm (ECDSA) (2005)
-
(2005)
American National Standard X9.62-2005
-
-
-
3
-
-
85057426796
-
-
Chapman &Hall/CRC
-
Avanzi, R.M., Cohen, H., Doche, C., Frey, G., Lange, T., Nguyen, K., Vercauteren, F.: Handbook of Elliptic and Hyperelliptic Curve Cryptography. Chapman &Hall/CRC (2005)
-
(2005)
Handbook of Elliptic and Hyperelliptic Curve Cryptography
-
-
Avanzi, R.M.1
Cohen, H.2
Doche, C.3
Frey, G.4
Lange, T.5
Nguyen, K.6
Vercauteren, F.7
-
4
-
-
84876375076
-
Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks
-
Buttyán, L., Gligor, V.D., Westhoff, D. (eds.) ESAS 2006. Springer, Heidelberg
-
Batina, L., Mentens, N., Sakiyama, K., Preneel, B., Verbauwhede, I.: Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks. In: Buttyán, L., Gligor, V.D., Westhoff, D. (eds.) ESAS 2006. LNCS, vol. 4357, pp. 6-17. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4357
, pp. 6-17
-
-
Batina, L.1
Mentens, N.2
Sakiyama, K.3
Preneel, B.4
Verbauwhede, I.5
-
5
-
-
0003369154
-
Elliptic Curves in Cryptography
-
Cambridge University Press, Cambridge
-
Blake, I.F., Seroussi, G., Smart, N.P.: Elliptic Curves in Cryptography. London Mathematical Society Lecture Notes Series, vol. 265. Cambridge University Press, Cambridge (1999)
-
(1999)
London Mathematical Society Lecture Notes Series
, vol.265
-
-
Blake, I.F.1
Seroussi, G.2
Smart, N.P.3
-
6
-
-
77953885098
-
A Milestone Towards RFID Products Offering Asymmetric Authentication Based on Elliptic Curve Cryptography
-
Invited talk at July
-
Bock, H., Braun, M., Dichtl, M., Hess, E., Heyszl, J., Kargl, W., Koroschetz, H., Meyer, B., Seuschek, H.: A Milestone Towards RFID Products Offering Asymmetric Authentication Based on Elliptic Curve Cryptography. Invited talk at RFIDsec 2008 (July 2008)
-
(2008)
RFIDsec 2008
-
-
Bock, H.1
Braun, M.2
Dichtl, M.3
Hess, E.4
Heyszl, J.5
Kargl, W.6
Koroschetz, H.7
Meyer, B.8
Seuschek, H.9
-
7
-
-
84862143220
-
-
San Jose, California, United States The Cadence Design Systems Website
-
Cadence Design Systems, Inc., San Jose, California, United States (2011). The Cadence Design Systems Website, http://www.cadence.com/
-
(2011)
-
-
-
8
-
-
84948971456
-
Efficient Exponentiation Using Precomputation and Vector Addition Chains
-
De Santis, A. (ed.) EUROCRYPT 1994. Springer, Heidelberg
-
de Rooij, P.: Efficient Exponentiation Using Precomputation and Vector Addition Chains. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 389-399. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.950
, pp. 389-399
-
-
De Rooij, P.1
-
9
-
-
85032883059
-
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
-
El Gamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10-18. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 10-18
-
-
El Gamal, T.1
-
12
-
-
33750709739
-
m)
-
Joye, M., Quisquater, J.-J. (eds.) CHES 2004. Springer, Heidelberg
-
m). In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 133-147. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3156
, pp. 133-147
-
-
Großschädl, J.1
Savaş, E.2
-
13
-
-
11244267013
-
-
Springer, Heidelberg
-
Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)
-
(2004)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.1
Menezes, A.J.2
Vanstone, S.3
-
15
-
-
70350639755
-
ECC Is Ready for RFID - A Proof in Silicon
-
Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. Springer, Heidelberg
-
Hein, D., Wolkerstorfer, J., Felber, N.: ECC Is Ready for RFID - A Proof in Silicon. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 401-413. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5381
, pp. 401-413
-
-
Hein, D.1
Wolkerstorfer, J.2
Felber, N.3
-
16
-
-
78650123975
-
An ECDSA Processor for RFID Authentication
-
Ors Yalcin, S.B. (ed.) RFIDSec 2010. Springer, Heidelberg
-
Hutter, M., Feldhofer, M., Plos, T.: An ECDSA Processor for RFID Authentication. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 189-202. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6370
, pp. 189-202
-
-
Hutter, M.1
Feldhofer, M.2
Plos, T.3
-
17
-
-
79960084103
-
Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation
-
Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. Springer, Heidelberg
-
Hutter, M., Joye, M., Sierra, Y.: Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol. 6737, pp. 170-187. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6737
, pp. 170-187
-
-
Hutter, M.1
Joye, M.2
Sierra, Y.3
-
19
-
-
35248874869
-
The Montgomery Powering Ladder
-
Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. Springer, Heidelberg
-
Joye, M., Yen, S.-M.: The Montgomery Powering Ladder. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 291-302. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2523
, pp. 291-302
-
-
Joye, M.1
Yen, S.-M.2
-
20
-
-
0029358884
-
The Montgomery Inverse and its Applications
-
Kaliski, B.: The Montgomery Inverse and its Applications. IEEE Transactions on Computers 44(8), 1064-1065 (1995)
-
(1995)
IEEE Transactions on Computers
, vol.44
, Issue.8
, pp. 1064-1065
-
-
Kaliski, B.1
-
21
-
-
79953072707
-
Low-Resource ECDSA Implementation for Passive RFID Tags
-
IEEE
-
Kern, T., Feldhofer, M.: Low-Resource ECDSA Implementation for Passive RFID Tags. In: Proceedings of 17th IEEE International Conference on Electronics, Circuits and Systems (ICECS 2010), Athens, Greece, December 12-15, pp. 1236-1239. IEEE (2010)
-
(2010)
Proceedings of 17th IEEE International Conference on Electronics, Circuits and Systems (ICECS 2010), Athens, Greece, December 12-15
, pp. 1236-1239
-
-
Kern, T.1
Feldhofer, M.2
-
22
-
-
84968503742
-
Elliptic Curve Cryptosystems
-
Koblitz, N.: Elliptic Curve Cryptosystems. Mathematics of Computation 48, 203-209 (1987)
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
24
-
-
84872956957
-
Are standards compliant Elliptic Curve Cryptosystems feasible on RFID?
-
Kumar, S.S., Paar, C.: Are standards compliant Elliptic Curve Cryptosystems feasible on RFID? In: Workshop on RFID Security (RFIDSec 2006), Graz, Austria, July 12-14 (2006)
-
Workshop on RFID Security (RFIDSec 2006), Graz, Austria, July 12-14 (2006)
-
-
Kumar, S.S.1
Paar, C.2
-
25
-
-
54049143316
-
Elliptic-Curve-Based Security Processor for RFID
-
Lee, Y.K., Sakiyama, K., Batina, L., Verbauwhede, I.: Elliptic-Curve-Based Security Processor for RFID. IEEE Transactions on Computers 57(11), 1514-1527 (2008)
-
(2008)
IEEE Transactions on Computers
, vol.57
, Issue.11
, pp. 1514-1527
-
-
Lee, Y.K.1
Sakiyama, K.2
Batina, L.3
Verbauwhede, I.4
-
26
-
-
84949224514
-
n)
-
Tavares, S., Meijer, H. (eds.) SAC 1998. Springer, Heidelberg
-
n). In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 201-212. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1556
, pp. 201-212
-
-
López, J.1
Dahab, R.2
-
27
-
-
84947913604
-
m)
-
Koç, Ç.K., Paar, C. (eds.) CHES 1999. Springer, Heidelberg
-
m). In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 316-327. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1717
, pp. 316-327
-
-
López, J.1
Dahab, R.2
-
28
-
-
85015402934
-
Use of Elliptic Curves in Cryptography
-
Williams, H.C. (ed.) CRYPTO 1985. Springer, Heidelberg
-
Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417-426. Springer, Heidelberg (1986)
-
(1986)
LNCS
, vol.218
, pp. 417-426
-
-
Miller, V.S.1
-
29
-
-
70449478482
-
-
October
-
National Institute of Standards and Technology (NIST). FIPS-180-3: Secure Hash Standard (October 2008), http://www.itl.nist.gov/fipspubs/
-
(2008)
FIPS-180-3: Secure Hash Standard
-
-
-
31
-
-
33646775803
-
Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic
-
Joye, M., Quisquater, J.-J. (eds.) CHES 2004. Springer, Heidelberg
-
Öztürk, E., Sunar, B., Savaş, E.: Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 92-106. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3156
, pp. 92-106
-
-
Öztürk, E.1
Sunar, B.2
Savaş, E.3
-
32
-
-
0038300434
-
A Scalable Dual-Field Elliptic Curve Cryptographic Processor
-
Satoh, A., Takano, K.: A Scalable Dual-Field Elliptic Curve Cryptographic Processor. IEEE Transactions on Computers 52(4), 449-460 (2003)
-
(2003)
IEEE Transactions on Computers
, vol.52
, Issue.4
, pp. 449-460
-
-
Satoh, A.1
Takano, K.2
-
33
-
-
84862124572
-
A 16-Bit Microprocessor Chip for Cryptographic Operations on Low-Resource Devices
-
ISBN 978-3-200-01945-4
-
Wenger, E., Feldhofer, M., Felber, N.: A 16-Bit Microprocessor Chip for Cryptographic Operations on Low-Resource Devices. In: Proceedings of Austrochip 2010, Villach, Austria, October 6, pp. 55-60 (2010) ISBN 978-3-200-01945-4
-
(2010)
Proceedings of Austrochip 2010, Villach, Austria, October 6
, pp. 55-60
-
-
Wenger, E.1
Feldhofer, M.2
Felber, N.3
-
34
-
-
85036630574
-
Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices
-
Chung, Y., Yung, M. (eds.) WISA 2010. Springer, Heidelberg
-
Wenger, E., Feldhofer, M., Felber, N.: Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices. In: Chung, Y., Yung, M. (eds.) WISA 2010. LNCS, vol. 6513, pp. 92-106. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6513
, pp. 92-106
-
-
Wenger, E.1
Feldhofer, M.2
Felber, N.3
-
35
-
-
84862121236
-
A Hardware Processor Supporting Elliptic Curve Cryptography for Less Than 9kGEs
-
Wenger, E., Hutter, M.: A Hardware Processor Supporting Elliptic Curve Cryptography for Less Than 9kGEs. In: Proceedings of the Tenth Smart Card Research and Advanced Application Conference, CARDIS 2011, Leuven, Belgium, September 15-16 (2011)
-
Proceedings of the Tenth Smart Card Research and Advanced Application Conference, CARDIS 2011, Leuven, Belgium, September 15-16 (2011)
-
-
Wenger, E.1
Hutter, M.2
-
36
-
-
52949086079
-
Is Elliptic-Curve Cryptography Suitable for Small Devices?
-
Wolkerstorfer, J.: Is Elliptic-Curve Cryptography Suitable for Small Devices? In: Workshop on RFID and Lightweight Crypto, Graz, Austria, July 13-15, pp. 78-91 (2005)
-
(2005)
Workshop on RFID and Lightweight Crypto, Graz, Austria, July 13-15
, pp. 78-91
-
-
Wolkerstorfer, J.1
|