-
3
-
-
85057426796
-
-
CRC Press Boca Raton
-
Avanzi R., Cohen H., Doche C., Frey G., Lange T., Nguyen K., Vercauteren F.: Handbook of elliptic and hyperelliptic curve cryptography. CRC Press, Boca Raton (2005)
-
(2005)
Handbook of Elliptic and Hyperelliptic Curve Cryptography
-
-
Avanzi, R.1
Cohen, H.2
Doche, C.3
Frey, G.4
Lange, T.5
Nguyen, K.6
Vercauteren, F.7
-
4
-
-
84856414723
-
On the efficiency of Pollard's rho method for discrete logarithms
-
Harland J., Manyem P. (eds.) Australian Computer Society, Wollongong (2008)
-
Bai S., Brent R.P.: On the efficiency of Pollard's rho method for discrete logarithms. In: Harland J., Manyem P. (eds.) CATS 2008, pp. 125-131. Australian Computer Society, Wollongong (2008).
-
(2008)
CATS
, pp. 125-131
-
-
Bai, S.1
Brent, R.P.2
-
5
-
-
84862888128
-
-
Cryptology ePrint Archive, Report 2009/466
-
Bailey D.V., Baldwin B., Batina L., Bernstein D.J., Birkner P., Bos J.W., Damme G.V., Meulenaer G., Fan J., Güneysu T., Gurkaynak F., Kleinjung T., Lange T., Mentens N., Paar C., Regazzoni F., Schwabe P., Uhsadel L.: The certicom challenges ECC2-X. Cryptology ePrint Archive, Report 2009/466, (2009).
-
(2009)
The Certicom Challenges ECC2-X
-
-
Bailey, D.V.1
-
6
-
-
77953516169
-
-
Cryptology ePrint Archive, Report 2009/541
-
Bailey D.V., Batina L., Bernstein D.J., Birkner P., Bos J.W., Chen H., Cheng C., Damme G.V., Meulenaer G., Perez L.J.D., Fan J., Guneysu T., Gurkaynak F., Kleinjung T., Lange T., Mentens N., Niederhagen R., Paar C., Regazzoni F., Schwabe P., Uhsadel L., Herrewege A.V., Yang B.: "Breaking ECC2K-130", Cryptology ePrint Archive, Report 2009/541, (2009).
-
(2009)
Breaking ECC2K-130
-
-
Bailey, D.V.1
Batina, L.2
Bernstein, D.J.3
Birkner, P.4
Bos, J.W.5
Chen, H.6
Cheng, C.7
Damme, G.V.8
Meulenaer, G.9
Perez, L.J.D.10
Fan, J.11
Guneysu, T.12
Gurkaynak, F.13
Kleinjung, T.14
Lange, T.15
Mentens, N.16
Niederhagen, R.17
Paar, C.18
Regazzoni, F.19
Schwabe, P.20
Uhsadel, L.21
Herrewege, A.V.22
Yang, B.23
more..
-
7
-
-
70350303858
-
Batch binary Edwards
-
LNCS Springer, Berlin
-
Bernstein D.J.: "Batch binary Edwards", In Crypto 2009, LNCS, vol. 5677, pp. 317-336. Springer, Berlin (2009).
-
(2009)
Crypto 2009
, vol.5677
, pp. 317-336
-
-
Bernstein, D.J.1
-
8
-
-
79952523965
-
On the correct use of the negation map in the Pollard rho method
-
Catalano D., Fazio N., Gennaro R., Nicolosi A. (eds.) LNCS Springer, Heidelberg
-
Bernstein D.J., Lange T., Schwabe P.: On the correct use of the negation map in the Pollard rho method. In: Catalano D., Fazio N., Gennaro R., Nicolosi A. (eds.) PKC 2011, LNCS, vol. 6571. Springer, Heidelberg (2011).
-
(2011)
PKC 2011
, vol.6571
-
-
Bernstein, D.J.1
Lange, T.2
Schwabe, P.3
-
9
-
-
33747020591
-
A method of solution of the problem of taking the discrete logarithm on an elliptic curve by division of points by two
-
Bessalov A.V.: A method of solution of the problem of taking the discrete logarithm on an elliptic curve by division of points by two. Cybern. Syst. Anal. 37(6), 820-823 (2001) (Pubitemid 33772614)
-
(2001)
Cybernetics and Systems Analysis
, vol.37
, Issue.6
, pp. 820-823
-
-
Bessalov, A.V.1
-
10
-
-
77955324328
-
On the use of the negation map in the Pollard Rho method
-
Hanrot G., Morain F., Thomé E. (eds.) LNCS Springer, Heidelberg
-
Bos J.W., Kleinjung T., Lenstra A.K.: On the use of the negation map in the Pollard Rho method. In: Hanrot G., Morain F., Thomé E. (eds.) ANTS IX, LNCS, vol. 6197, pp. 66-82. Springer, Heidelberg (2010).
-
(2010)
ANTS IX
, vol.6197
, pp. 66-82
-
-
Bos, J.W.1
Kleinjung, T.2
Lenstra, A.K.3
-
11
-
-
84966225012
-
Factorization of the eighth Fermat number
-
606520 0476.10007 10.1090/S0025-5718-1981-0606520-5
-
Brent R.P., Pollard J.M.: Factorization of the eighth Fermat number. Math. Comput. 36, 627-630 (1981)
-
(1981)
Math. Comput.
, vol.36
, pp. 627-630
-
-
Brent, R.P.1
Pollard, J.M.2
-
13
-
-
0017018484
-
New directions in cryptography
-
437208 0435.94018 10.1109/TIT.1976.1055638
-
Diffie W., Hellman M.: New directions in cryptography. IEEE Trans. Inform. Theory. 22, 644-654 (1976)
-
(1976)
IEEE Trans. Inform. Theory.
, vol.22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
14
-
-
0003508562
-
-
FIPS 186-2 Federal information processing standards publication 186-2, February
-
FIPS 186-2: Digital signature standard. Federal information processing standards publication 186-2, February (2000).
-
(2000)
Digital Signature Standard
-
-
-
15
-
-
3242670828
-
Field inversion and point halving revisited
-
10.1109/TC.2004.43
-
Fong K., Hankerson D., Lopez J., Menezes A.: Field inversion and point halving revisited. IEEE Trans. Comput. 53(8), 1047-1059 (2004)
-
(2004)
IEEE Trans. Comput.
, vol.53
, Issue.8
, pp. 1047-1059
-
-
Fong, K.1
Hankerson, D.2
Lopez, J.3
Menezes, A.4
-
16
-
-
0034409205
-
Improving the parallelized Pollard lambda search on binary anomalous curves
-
1651754 10.1090/S0025-5718-99-01119-9
-
Gallant R., Lambert R., Vanstone S.: Improving the parallelized Pollard lambda search on binary anomalous curves. Math. Comput. 69, 1699-1705 (1999)
-
(1999)
Math. Comput.
, vol.69
, pp. 1699-1705
-
-
Gallant, R.1
Lambert, R.2
Vanstone, S.3
-
18
-
-
0000702490
-
Probability distribution related to random mappings
-
0158.34905 10.1214/aoms/1177705677
-
Harris B.: Probability distribution related to random mappings. Ann. Math. Stat. 31, 1045-1062 (1960)
-
(1960)
Ann. Math. Stat.
, vol.31
, pp. 1045-1062
-
-
Harris, B.1
-
20
-
-
84968503742
-
Elliptic curve cryptosystems
-
866109 0622.94015 10.1090/S0025-5718-1987-0866109-5
-
Koblitz N.: Elliptic curve cryptosystems. Math. Comput. 48, 203-209 (1987)
-
(1987)
Math. Comput.
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
21
-
-
85015402934
-
Use of elliptic curves in cryptography. Advances in cryptology: Proceedings of Crypto'85
-
Springer-Verlag, New York
-
Miller V.: Use of elliptic curves in cryptography. Advances in cryptology: proceedings of Crypto'85, LNCS 218, pp. 417-426. Springer-Verlag, New York (1986).
-
(1986)
LNCS
, vol.218
, pp. 417-426
-
-
Miller, V.1
-
22
-
-
84968484435
-
Speeding the Pollard and elliptic curve methods of factorization
-
0608.10005 10.1090/S0025-5718-1987-0866113-7
-
Montgomery P.L.: Speeding the Pollard and elliptic curve methods of factorization. Math. Comput. 48, 243-264 (1987)
-
(1987)
Math. Comput.
, vol.48
, pp. 243-264
-
-
Montgomery, P.L.1
-
23
-
-
33645492588
-
-
National Institute for Standards and Technology: Digital signature standard U.S. Department of Commerce, FIPS PUB 186, Washington, DC
-
National Institute for Standards and Technology: Digital signature standard. Federal information processing standard, U.S. Department of Commerce, FIPS PUB 186, Washington, DC (1994).
-
(1994)
Federal Information Processing Standard
-
-
-
24
-
-
0001637933
-
A Monte Carlo method for factorization
-
392798 0312.10006 10.1007/BF01933667
-
Pollard J.M.: A Monte Carlo method for factorization. BIT 15(3), 331-335 (1975)
-
(1975)
BIT
, vol.15
, Issue.3
, pp. 331-335
-
-
Pollard, J.M.1
-
25
-
-
84966238549
-
Monte Carlo methods for index computation mod p
-
491431 0382.10001
-
Pollard J.M.: Monte Carlo methods for index computation mod p. Math. Comp. 32, 918-924 (1978)
-
(1978)
Math. Comp.
, vol.32
, pp. 918-924
-
-
Pollard, J.M.1
-
27
-
-
84966241531
-
A Monte Carlo factoring algorithm with linear storage
-
744939 0559.10004 10.1090/S0025-5718-1984-0744939-5
-
Schnorr C.P., Lenstra H.W.: A Monte Carlo factoring algorithm with linear storage. Math. Comp. 43(167), 289-311 (1984)
-
(1984)
Math. Comp.
, vol.43
, Issue.167
, pp. 289-311
-
-
Schnorr, C.P.1
Lenstra, H.W.2
-
29
-
-
3242660723
-
-
International Application Number PCT/US00/31014, filed 9 November 2000, publication number WO 01/35573 A1, 17 May
-
Schroeppel R.: Elliptic curve point ambiguity resolution apparatus and method. International Application Number PCT/US00/31014, filed 9 November 2000, publication number WO 01/35573 A1, 17 May (2001).
-
(2001)
Elliptic Curve Point Ambiguity Resolution Apparatus and Method
-
-
Schroeppel, R.1
-
30
-
-
84947761194
-
Speeding up Pollard's rho method for computing discrete logarithms
-
Algorithmic Number Theory Symposium (ANTS IV) Springer-Verlag, Berlin
-
Teske E.: Speeding up Pollard's rho method for computing discrete logarithms. In: Algorithmic Number Theory Symposium (ANTS IV), LNCS 1423, pp. 541-553. Springer-Verlag, Berlin (1998).
-
(1998)
LNCS
, vol.1423
, pp. 541-553
-
-
Teske, E.1
-
31
-
-
0035531397
-
On random walks for Pollard's rho method
-
DOI 10.1090/S0025-5718-00-01213-8
-
Teske E.: On random walks for Pollard's rho method. Math. Comput. 70(234), 809-825 (2001) (Pubitemid 33570519)
-
(2001)
Mathematics of Computation
, vol.70
, Issue.234
, pp. 809-825
-
-
Teske, E.1
-
32
-
-
17444376558
-
Parallel collision search with cryptanalytic applications
-
0992.94028 10.1007/PL00003816
-
van Oorschot P., Wiener M.: Parallel collision search with cryptanalytic applications. J. Cryptol. 12, 1-28 (1999)
-
(1999)
J. Cryptol.
, vol.12
, pp. 1-28
-
-
Van Oorschot, P.1
Wiener, M.2
-
33
-
-
84949189974
-
Faster attacks on elliptic curve cryptosystems. Selected areas in cryptography'98
-
Springer-Verlag, Berlin
-
Wiener M., Zuccherato R.: Faster attacks on elliptic curve cryptosystems. Selected areas in cryptography'98, LNCS 1556, pp. 190-200, Springer-Verlag, Berlin (1998).
-
(1998)
LNCS
, vol.1556
, pp. 190-200
-
-
Wiener, M.1
Zuccherato, R.2
|