-
1
-
-
77954463739
-
-
BookSurge Publishing, Charleston, SC
-
James S. Milne. 2006. Elliptic Curves. BookSurge Publishing, Charleston, SC.
-
(2006)
Elliptic Curves
-
-
Milne, J.S.1
-
2
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
(Aug. 2002)
-
Alfred J. Menezes, Tatsuaki Okamoto, and Scot A. Vanstone. 2002. Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field. IEEE Transactions on Information Teory 39, 5 (Aug. 2002), 1639-1646. doi:htps://doi.org/10.1109/18.259647
-
(2002)
IEEE Transactions on Information Teory
, vol.39
, Issue.5
, pp. 1639-1646
-
-
Menezes, A.J.1
Okamoto, T.2
Vanstone, S.A.3
-
3
-
-
84968503742
-
Elliptic curve cryptosystems
-
(Jan. 1987)
-
Neal Koblitz. 1987. Elliptic Curve Cryptosystems. Mathematics of Computation 48, 177 (Jan. 1987), 203-209. doi:htps://doi.org/10.1090/S0025-5718-1987-0866109-5
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
4
-
-
85015402934
-
Use of elliptic curves in cryptography
-
Springer-Verlag
-
Victor S. Miller. 1985. Use of Elliptic Curves in Cryptography. In CRYPTO '85 Advances in Cryptology. Springer-Verlag, 417-426.
-
(1985)
CRYPTO '85 Advances in Cryptology
, pp. 417-426
-
-
Miller, V.S.1
-
5
-
-
48349147144
-
A unified, reconfigurable architecture for montgomery multiplication in finite fields GF(p) and GF(2∧n)
-
IEEE, Bangalore, India
-
M. Sudhakar, R.V. Kamala, and M.B. Srinivas. 2007. A Unified, Reconfigurable Architecture for Montgomery Multiplication in Finite Fields GF(p) and GF(2∧n). In 20th International Conference on VLSI Design held jointly with 6th International Conference on Embedded Systems (VLSID'07). IEEE, Bangalore, India, 750-755. doi:htps://doi.org/10.1109/VLSID.2007.27
-
(2007)
20th International Conference on VLSI Design Held Jointly with 6th International Conference on Embedded Systems (VLSID'07)
, pp. 750-755
-
-
Sudhakar, M.1
Kamala, R.V.2
Srinivas, M.B.3
-
7
-
-
33745965912
-
Curve25519: New diffie-hellman speed records
-
Springer, Berlin, Heidelberg
-
Daniel J. Bernstein. 2006. Curve25519: New Diffie-Hellman Speed Records. In International Workshop on Public Key Cryptography. Springer, Berlin, Heidelberg, 207-228. doi:htps://doi.org/10.1007/11745853-14
-
(2006)
International Workshop on Public Key Cryptography
, pp. 207-228
-
-
Bernstein, D.J.1
-
8
-
-
33751508709
-
-
National Institute of Standards & Technology, Gaithersburg
-
Elaine B. Barker, William C. Barker, William E. Burr, William T. Polk, and Miles E. Smid. 2007. Recommendation for Key Management - Part 1: General (Revision 3). National Institute of Standards & Technology, Gaithersburg.
-
(2007)
Recommendation for Key Management - Part 1: General (Revision 3)
-
-
Barker, E.B.1
Barker, W.C.2
Burr, W.E.3
Polk, W.T.4
Smid, M.E.5
-
11
-
-
77954614063
-
-
(December 2016)
-
Alexa. 2016. Alexa Top 500 Global Sites. (December 2016). Retrieved from htp://www.alexa.com/topsites
-
(2016)
Alexa Top 500 Global Sites
-
-
-
12
-
-
85027710558
-
The performance impact of elliptic curve cryptography on DNSSEC validation
-
(Sep. 2016)
-
Roland van Rijswijk-Deij, Kaspar Hageman, Anna Speroto, and Aiko Pras. 2016. The Performance Impact of Elliptic Curve Cryptography on DNSSEC Validation. IEEE/ACM Transactions on Networking PP, 99 (Sep. 2016), 1-13. doi:htps://doi.org/10.1109/TNET.2016.2605767
-
(2016)
IEEE/ACM Transactions on Networking
, vol.PP
, Issue.99
, pp. 1-13
-
-
Van Rijswijk-Deij, R.1
Hageman, K.2
Speroto, A.3
Pras, A.4
-
13
-
-
85024130760
-
An efficient elliptic curve cryptography signature server with GPU acceleration
-
(Aug. 2016)
-
Wuqiong Pan, Fangyu Zheng, Yuan Zhao, Wen-Tao Zhu, and Jiwu Jing. 2016. An Efficient Elliptic Curve Cryptography Signature Server With GPU Acceleration. IEEE Transactions on Information Forensics and Security 12, 1 (Aug. 2016), 111-122. doi:htps://doi.org/10.1109/TIFS.2016.2603974
-
(2016)
IEEE Transactions on Information Forensics and Security
, vol.12
, Issue.1
, pp. 111-122
-
-
Pan, W.1
Zheng, F.2
Zhao, Y.3
Zhu, W.-T.4
Jing, J.5
-
14
-
-
85000869991
-
A secure anonymous authentication protocol for mobile services on elliptic curve cryptography
-
(July 2016)
-
Alavalapati Goutham Reddy, Ashok Kumar Das, Eun-Jun Yoon, and Kee-Young Yoo. 2016. A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography. IEEE Access 4 (July 2016), 4394-4407. doi:htps://doi.org/10.1109/ACCESS.2016.2596292
-
(2016)
IEEE Access
, vol.4
, pp. 4394-4407
-
-
Reddy, A.G.1
Das, A.K.2
Yoon, E.-J.3
Yoo, K.-Y.4
-
16
-
-
84964007916
-
One time password authentication scheme based on elliptic curves for internet of tings (IoT)
-
IEEE, Riyadh
-
V L Shivraj, M A Rajan, Meena Singh, and P Balamuralidhar. 2015. One time password authentication scheme based on elliptic curves for Internet of Tings (IoT). In 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW). IEEE, Riyadh, 1-6. doi:htps://doi.org/10.1109/NSITNSW.2015.7176384
-
(2015)
2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW)
, pp. 1-6
-
-
Shivraj, V.L.1
Rajan, M.A.2
Singh, M.3
Balamuralidhar, P.4
-
18
-
-
84988310659
-
Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography
-
(Sep. 2016)
-
Debiao He, Huaqun Wang, Muhammad Khurram Khan, and Lina Wang. 2016. Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography. IET Communications 10, 14 (Sep. 2016), 1795-1802. doi:htps://doi.org/10.1049/iet-com.2016.0091
-
(2016)
IET Communications
, vol.10
, Issue.14
, pp. 1795-1802
-
-
He, D.1
Wang, H.2
Khan, M.K.3
Wang, L.4
-
19
-
-
84987679875
-
Secure message communication among vehicles using elliptic curve cryptography in smart cities
-
IEEE, Kunming
-
Amit Dua, Neeraj Kumar, Mukesh Singh, M. S. Obaidat, and Kuei-Fang Hsiao. 2016. Secure Message Communication Among Vehicles Using Elliptic Curve Cryptography in Smart Cities. In 2016 International Conference on Computer, Information and Telecommunication Systems (CITS). IEEE, Kunming, 1-6. doi:htps://doi.org/10.1109/CITS.2016.7546385
-
(2016)
2016 International Conference on Computer, Information and Telecommunication Systems (CITS)
, pp. 1-6
-
-
Dua, A.1
Kumar, N.2
Singh, M.3
Obaidat, M.S.4
Hsiao, K.-F.5
-
20
-
-
84988835564
-
Design and implementation of a new active RFID authentication protocol based on elliptic curve encryption
-
IEEE, London
-
Mustapha Benssalah, Mustapha Djeddou, and Karim Drouiche. 2016. Design and Implementation of a New Active RFID Authentication Protocol Based on Elliptic Curve Encryption. In 2016 SAI Computing Conference (SAI). IEEE, London, 1076-1081. doi:htps://doi.org/10.1109/SAI.2016.7556111
-
(2016)
2016 SAI Computing Conference (SAI)
, pp. 1076-1081
-
-
Benssalah, M.1
Djeddou, M.2
Drouiche, K.3
-
23
-
-
84991640202
-
SEECC: A secure and efficient elliptic curve cryptosystem for E-health applications
-
IEEE, Innsbruck
-
Golnaz Sahebi, Amin Majd, Masoumeh Ebrahimi, Juha Plosila, Jaber Karimpour, and Hannu Tenhunen. 2016. SEECC: A Secure and Efficient Elliptic Curve Cryptosystem for E-health Applications. In 2016 International Conference on High Performance Computing & Simulation (HPCS). IEEE, Innsbruck, 492-500. doi:htps://doi.org/10.1109/HPCSim.2016.7568375
-
(2016)
2016 International Conference on High Performance Computing & Simulation (HPCS)
, pp. 492-500
-
-
Sahebi, G.1
Majd, A.2
Ebrahimi, M.3
Plosila, J.4
Karimpour, J.5
Tenhunen, H.6
-
24
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a qantum computer
-
(Oct. 1997)
-
Peter W. Shor. 1997. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Qantum Computer. SIAM Journal on Computing 26, 5 (Oct. 1997), 1484-1509. doi:htps://doi.org/10.1137/S0097539795293172
-
(1997)
SIAM Journal on Computing
, vol.26
, Issue.5
, pp. 1484-1509
-
-
Shor, P.W.1
-
25
-
-
0035924370
-
Experimental realization of shor's quantum factoring algorithm using nuclear magnetic resonance
-
(Dec. 2001)
-
Lieven M. K. Vandersypen, Mathias Steffen, Gregory Breyta, Costantino S. Yannoni, Mark H. Sherwood, and Isaac L. Chuang. 2001. Experimental realization of Shor's quantum factoring algorithm using nuclear magnetic resonance. Nature 414, 6866 (Dec. 2001), 883-887. doi:htps://doi.org/10.1038/414883a
-
(2001)
Nature
, vol.414
, Issue.6866
, pp. 883-887
-
-
Lieven, M.1
Vandersypen, K.2
Steffen, M.3
Breyta, G.4
Yannoni, C.S.5
Sherwood, M.H.6
Chuang, I.L.7
-
27
-
-
0141457783
-
Shor's discrete logarithm quantum algorithm for elliptic curves
-
(July 2003)
-
John Proos and Christof Zalka. 2003. Shor's discrete logarithm quantum algorithm for elliptic curves. Qantum Information & Computation 3, 4 (July 2003), 317-344.
-
(2003)
Qantum Information & Computation
, vol.3
, Issue.4
, pp. 317-344
-
-
Proos, J.1
Zalka, C.2
-
28
-
-
84990890009
-
High-performance sofware implementation of discrete Gaussian sampling for latice-based cryptography
-
IEEE, Chongqing
-
Chaohui Du and Guoqiang Ba. 2016. High-Performance Sofware Implementation of Discrete Gaussian Sampling for Latice-Based Cryptography. In 2016 IEEE Information Technology, Networking, Electronic and Automation Control Conference. IEEE, Chongqing, 220-224. doi:htps://doi.org/10.1109/ITNEC.2016.7560353
-
(2016)
2016 IEEE Information Technology, Networking, Electronic and Automation Control Conference
, pp. 220-224
-
-
Du, C.1
Ba, G.2
-
30
-
-
84994384335
-
Post-qantum cryptography on FPGA based on isogenies on elliptic curves
-
(Oct. 2016)
-
Brian Koziel, Reza Azarderakhsh, Mehran Mozaffari Kermani, and David Jao. 2016. Post-Qantum Cryptography on FPGA Based on Isogenies on Elliptic Curves. IEEE Transactions on Circuits and Systems I: Regular Papers 64, 1 (Oct. 2016), 86-99. doi:htps://doi.org/10.1109/TCSI.2016.2611561
-
(2016)
IEEE Transactions on Circuits and Systems I: Regular Papers
, vol.64
, Issue.1
, pp. 86-99
-
-
Koziel, B.1
Azarderakhsh, R.2
Kermani, M.M.3
Jao, D.4
|