The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Elliptic with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1956-1963 (22) 1964-1968 (15) 1969-1975 (15) 1976-1979 (16) 1980-1983 (16) 1984-1985 (16) 1986-1987 (16) 1988-1989 (40) 1990 (22) 1991 (30) 1992 (28) 1993 (29) 1994 (31) 1995 (37) 1996 (46) 1997 (50) 1998 (73) 1999 (117) 2000 (122) 2001 (171) 2002 (184) 2003 (224) 2004 (278) 2005 (316) 2006 (346) 2007 (347) 2008 (361) 2009 (295) 2010 (254) 2011 (282) 2012 (269) 2013 (330) 2014 (293) 2015 (280) 2016 (270) 2017 (261) 2018 (274) 2019 (354) 2020 (386) 2021 (383) 2022 (365) 2023 (384) 2024 (103)
Publication types (Num. hits)
article(5325) book(19) data(1) incollection(89) inproceedings(2258) phdthesis(59)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2282 occurrences of 833 keywords

Results
Found 7751 publication records. Showing 7751 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
121Atsuko Miyaji, Masaki Nakabayashi, Shunzo Takano Characterization of Elliptic Curve Traces under FR-Reduction. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF FR-reduction, trace, elliptic curve cryptosystems, number theory
76Katherine E. Stange The Tate Pairing Via Elliptic Nets. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF elliptic divisibility sequence, elliptic net, Miller’s algorithm, elliptic curve, Tate pairing, pairing-based cryptography
72Souichi Okada, Naoya Torii, Kouichi Itoh, Masahiko Takenaka Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2m) on an FPGA. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF elliptic scalar multiplication over tex2html_wrap_inline100, IEEE P1363, Elliptic curve cryptography (ECC), multiplier, coprocessor, Koblitz curve
69Jung Hee Cheon, Sung-Mo Park, Sangwoo Park, Daeho Kim Two Efficient Algorithms for Arithmetic of Elliptic Curves Using Frobenius Map. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
62Stephen Mann, Sanjeev Bedi, David Roth The swept surface of an elliptic cylinder. Search on Bibsonomy Symposium on Solid Modeling and Applications The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
62Neal Koblitz Constructing Elliptic Curve Cryptosystems in Characteristic 2. Search on Bibsonomy CRYPTO The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
60Qi Cheng 0001, Ming-Deh A. Huang On Partial Lifting and the Elliptic Curve Discrete Logarithm Problem. Search on Bibsonomy ISAAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF partiallifting, Elliptic curve cryptosystem, discrete logarithm
60Louis Goubin A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Side-channel attacks, Public-key cryptography, Elliptic curves, Differential Power Analysis (DPA), Power Analysis, Smartcards
60Yasuyuki Sakai, Kouichi Sakurai On the Power of Multidoubling in Speeding Up Elliptic Scalar Multiplication. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Montgomery form, Multidoubling, Elliptic curve cryptosystems, Scalar multiplication, Fast implementation
58Kirsten Eisenträger, Kristin E. Lauter, Peter L. Montgomery Fast Elliptic Curve Arithmetic and Improved Weil Pairing Evaluation. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF elliptic curve arithmetic, Elliptic curve cryptosystem, scalar multiplication, pairing-based cryptosystem, ECM
56Mathieu Ciet, Marc Joye (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
54Maurice Keller, Andrew Byrne, William P. Marnane Elliptic Curve Cryptography on FPGA for Low-Power Applications. Search on Bibsonomy ACM Trans. Reconfigurable Technol. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF FPGA, low-power, Cryptography, elliptic curves
54Jun Yang, Xianze Yang Implementing Multi-party Key Exchange by Linear Combination of Elliptic Curve Points. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF tripartite key agreement protocol, public key cryptography, elliptic curve, matrix, discrete logarithm problem, optimal extension field
54Eric R. Verheul Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems. Search on Bibsonomy J. Cryptol. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Decision Diffie-Hellman problem, Supersingular elliptic curves, Inverting MOV embedding, Tripartite Diffie-Hellman key exchange, Escrow, XTR
54Tetsuya Izu, Tsuyoshi Takagi Exceptional Procedure Attack on Elliptic Curve Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF exceptional procedure attack, exceptional point, side channel attack, Elliptic curve cryptosystem (ECC), scalar multiplication
54Yasuyuki Sakai, Kouichi Sakurai Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Elliptic Curve Cryptosystems, Scalar Multiplication
54Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica 0001 A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Weil descent, fast performance, Finite fields, elliptic curve cryptography
54Julio César López-Hernández, Ricardo Dahab Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation. Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Elliptic Curves over GF(2m), Point multiplication
52Elisavet Konstantinou, Aristides Kontogeorgis, Yannis C. Stamatiou, Christos D. Zaroliagis Generating Prime Order Elliptic Curves: Difficulties and Efficiency Considerations. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Generation of Prime Order Elliptic Curves, Class Field Polynomials, Elliptic Curve Cryptosystems, Complex Multiplication
52R. Balasubramanian, Neal Koblitz The Improbability That an Elliptic Curve Has Subexponential Discrete Log Problem under the Menezes - Okamoto - Vanstone Algorithm. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Elliptic curve, Elliptic curve, Discrete logarithm, Discrete logarithm, Key words, Weil pairing, Weil pairing
52Volker Müller 0001 Fast Multiplication on Elliptic Curves over Small Fields of Characteristic Two. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Characteristic two, Frobenius endomorphism, Characteristic two, Frobenius endomorphism, Elliptic curves, Elliptic curves, Multiplication, Multiplication, Key words, Frobenius expansion, Frobenius expansion
49Qi Cheng 0001, Ming-Deh A. Huang Partial Lifting and the Elliptic Curve Discrete Logarithm Problem. Search on Bibsonomy Algorithmica The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
47Hyun Min Choi, Chun Pyo Hong, Chang Hoon Kim High Performance Elliptic Curve Cryptographic Processor Over GF(2^163). Search on Bibsonomy DELTA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptographic Processor, VLSI, Finite Field, Elliptic Curve Cryptosystem, Gaussian Normal Basis
47Katsiaryna Krupchyk, Werner M. Seiler, Jukka Tuomela Overdetermined Elliptic Systems. Search on Bibsonomy Found. Comput. Math. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Overdetermined system, Elliptic system, Completion, Partial differential equation, Symbol, Involution
47Edlyn Teske An Elliptic Curve Trapdoor System. Search on Bibsonomy J. Cryptol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Weil descent, Elliptic curve cryptography, Key escrow, Isogenies, Trapdoor functions
47Yasuyuki Sakai, Kouichi Sakurai Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF generalized Mersenne prime, unified code, elliptic curve cryptosystem, Side channel analysis, modular reduction
47Loren D. Olson Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF weighted projective curves, uniform addition formula, cryptography, ECC, side-channel attacks, Elliptic curves
47Tae-Jun Park, Mun-Kyu Lee, Kunsoo Park New Frobenius Expansions for Elliptic Curves with Efficient Endomorphisms. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Endomorphism, Elliptic Curve Cryptosystem, Scalar Multiplication, Frobenius Expansion
47Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica 0001 Preventing Differential Analysis in GLV Elliptic Curve Scalar Multiplication. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF fast computation, Public key cryptography, differential power analysis, elliptic curve cryptosystem
47Jean-Sébastien Coron, David M'Raïhi, Christophe Tymen Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF binary anomalous curve, accelerated signature schemes, Elliptic curve, scalar multiplication, pseudo-random generators
47Katsuyuki Okeya, Kunihiko Miyazaki, Kouichi Sakurai A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Montgomery Form, Randomized Projective Coordinates, Side Channel Attacks, Elliptic Curve Cryptosystem
47Neal Koblitz An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithm. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Supersingular, Nonadjacent Form, Digital Signature, Elliptic Curve
47Jerome A. Solinas An Improved Algorithm for Arithmetic on a Family of Elliptic Curves. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF public-key cryptography, elliptic curves, exponentiation
46Reynald Lercier, David Lubicz, Frederik Vercauteren Point Counting on Elliptic and Hyperelliptic Curves. Search on Bibsonomy Handbook of Elliptic and Hyperelliptic Curve Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
46Christophe Doche, Tanja Lange 0001 Arithmetic of Elliptic Curves. Search on Bibsonomy Handbook of Elliptic and Hyperelliptic Curve Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
45Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Elliptic curve discrete logarithm problem (ecdlp), Baby-step giant-step method (bsgs), Pollards rho method, Fixed elliptic curve, Precomputation
45Christophe Doche, Thomas Icart, David R. Kohel Efficient Scalar Multiplication by Isogeny Decompositions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF fast arithmetic, efficiently computable isogenies, efficient tripling, ?-adic, Elliptic curve cryptography
45Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto Efficient Countermeasures against RPA, DPA, and SPA. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Elliptic curve exponentiation, ZPA, RPA, DPA, SPA
43Karl Rubin, Alice Silverberg Using Abelian Varieties to Improve Pairing-Based Cryptography. Search on Bibsonomy J. Cryptol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Abelian varieties, Compression, Elliptic curve cryptography, Elliptic curves, Pairing-based cryptography
43Billy Bob Brumley Left-to-Right Signed-Bit tau-Adic Representations of n Integers (Short Paper). Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF joint sparse form, simultaneous elliptic scalar multiplication, digital signatures, elliptic curve cryptography, Koblitz curves
43Adam L. Young, Moti Yung A Space Efficient Backdoor in RSA and Its Applications. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Decision Diffie-Hellman, black-box ciphers, twist on elliptic curves, RSA, elliptic curve cryptography, tamper-resistance, Diffie-Hellman, Key recovery, SETUP
42Kimmo U. Järvinen, Jorma Skyttä On Parallelization of High-Speed Processors for Elliptic Curve Cryptography. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Masaaki Shirase, Yasushi Hibino An architecture for elliptic curve cryptograph computation. Search on Bibsonomy SIGARCH Comput. Archit. News The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
42Steven D. Galbraith, James F. McKee Pairings on Elliptic Curves over Finite Commutative Rings. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
42S. Yu. Vernov Interdependence Between the Laurent-Series and Elliptic Solutions of Nonintegrable Systems. Search on Bibsonomy CASC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
42Eric Brier, Marc Joye Weierstraß Elliptic Curves and Side-Channel Attacks. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
42Tetsuya Izu, Jun Kogure, Masayuki Noro, Kazuhiro Yokoyama Parameters for Secure Elliptic Curve Cryptosystem - Improvements on Schoof's Algorithm. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
42Atsuko Miyaji On Ordinary Elliptic Curve Cryptosystems. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
40Steven D. Galbraith, Xibin Lin, Michael Scott Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF GLV method, elliptic curves, point multiplication, isogenies
40Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd Characteristic. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Non-Adjacent Form (NAF), ?-adic NAF (?-NAF), ?-adic NAF (?-NAF), Elliptic Curves, Frobenius Expansions
40Zhixiong Chen 0002, Ning Zhang, Guozhen Xiao Pseudo-Randomness of Discrete-Log Sequences from Elliptic Curves. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF elliptic curves, discrete logarithm, discrepancy, linear complexity, pseudo-random sequences, character sums
40Tim Güneysu, Christof Paar, Jan Pelzl Attacking elliptic curve cryptosystems with special-purpose hardware. Search on Bibsonomy FPGA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Pollard's Rho, cryptanalysis, elliptic curve cryptosystem, discrete logarithm
40Yong Ki Lee, Ingrid Verbauwhede A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Compact Elliptic Curve Processor, Montgomery Scalar Multiplication
40Aya Comuta, Mitsuru Kawazoe, Tetsuya Takahashi 0001 Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon's Algorithm. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Elliptic curves, Pairing based cryptosystem
40Robert M. Corless, Dawit Assefa Jeffery-hamel flow with maple: : a case study of integration of elliptic functions in a cas. Search on Bibsonomy ISSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF elliptic functions, integration
40Trond Stølen Gustavsen, Kristian Ranestad A Simple Point Counting Algorithm for Hessian Elliptic Curves in Characteristic Three. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Point counting, Cryptography, Finite field, Elliptic curve
40Katja Schmidt-Samoa, Olivier Semay, Tsuyoshi Takagi Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF elliptic curve scalar multiplication, signed binary representations, Public key cryptosystems, algorithm design and analysis
40Johannes Blömer, Martin Otto 0002, Jean-Pierre Seifert Sign Change Fault Attacks on Elliptic Curve Cryptosystems. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF elliptic curve cryptosystem, smartcards, fault attacks
40Christophe Doche, Laurent Imbert Extended Double-Base Number System with Applications to Elliptic Curve Cryptography. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Elliptic curve cryptography, Double-base number system
40Friederike Brezing, Annegret Weng Elliptic Curves Suitable for Pairing Based Cryptography. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF pairing based cryptagraphy, elliptic curves
40David Jao, Stephen D. Miller, Ramarathnam Venkatesan Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log? Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF random reducibility, modular forms, L-functions, generalized Riemann hypothesis, elliptic curves, expanders, Ramanujan graphs, isogenies, rapid mixing, discrete log
40Takakazu Satoh On Degrees of Polynomial Interpolations Related to Elliptic Curve Cryptography. Search on Bibsonomy WCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF division polynomials, Elliptic curves, polynomial interpolation
40Soonhak Kwon Efficient Tate Pairing Computation for Elliptic Curves over Binary Fields. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF supersingular elliptic curve, divisor, Tate pairing, automorphism, roots of unity
40Massimo Giulietti On the Extendibility of Near-MDS Elliptic Codes. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Near-MDS Codes, Elliptic Curves, Projective Spaces
40Jun-Cheol Jeon, Kee-Young Yoo An Evolutionary Approach to the Design of Cellular Automata Architecture for Multiplication in Elliptic Curve Cryptography over Finite Fields. Search on Bibsonomy PRICAI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Evolutionary Computation, Cellular Automata, Finite Fields, Elliptic Curve Cryptography, Multiplication, Irreducible Polynomial
40Pradeep Kumar Mishra, Palash Sarkar 0001 Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF scalar multipication, field inversion, side-channel attacks, elliptic curves, hyperelliptic curves, explicit formulae
40Sultan Almuhammadi, Nien T. Sui, Dennis McLeod Better Privacy and Security in E-Commerce: Using Elliptic Curve-Based Zero-Knowledge Proofs. Search on Bibsonomy CEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, privacy, E-commerce, elliptic curves, zero-knowledge proofs
40Reynald Lercier, David Lubicz Counting Points on Elliptic Curves over Finite Fields of Small Characteristic in Quasi Quadratic Time. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF canonical lifts, AGM, Elliptic curves
40Teo Chun Yew, Hailiza Kamarulhaili, Putra Sumari Message Recovery Signature Scheme Using Complementary Elliptic Curves. Search on Bibsonomy GMAG The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Isomorphic Curves, Complementary Curves, Imbedding Plaintexts, Elliptic Curve Cryptosystems, Signature Scheme, Message Recovery
40Essam Al-Daoud, Ramlan Mahmod, Mohammad Rushdan, Adem Kiliçman A New Addition Formula for Elliptic Curves over GF(2n). Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2002 DBLP  DOI  BibTeX  RDF point addition, projective coordinates, Public-key cryptography, elliptic curves, scalar multiplication
40Nils Gura, Hans Eberle, Sheueling Chang Shantz Generic implementations of elliptic curve cryptography using partial reduction. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF elliptic curve cryptography, modular reduction
40Tetsuya Izu, Bodo Möller, Tsuyoshi Takagi Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF side channel attacks, elliptic curve cryptosystems, scalar multiplication, window method, memory constraints
40Richard Schroeppel, Cheryl L. Beaver, Rita Gonzales, Russell Miller 0001, Timothy Draelos A Low-Power Design for an Elliptic Curve Digital Signature Chip. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Optimal El Gamal, Characteristic 2, Field Towers, Trinomial Basis, Qsolve, Almost-Inverse Algorithm, Point Halving, Signed Sliding Window, GF(289), GF(2178), Low Power, Digital Signature, VHDL, Hardware, Elliptic Curve, ECDSA, Quadratic Equation
40M. Ernst, Michael Jung 0002, Felix Madlener, Sorin A. Huss, Rainer Blümel A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2n). Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF $ mathbb {GF}(2^n)$ arithmetic, Karatsuba multiplication, VHDL model generator, coprocessor synthesis, FPGA hardware acceleration, Atmel FPSLIC platform, Elliptic Curve cryptography
40Katsuyuki Okeya, Kouichi Sakurai Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF multi-scalar multiplication, Montgomery trick, elliptic curve cryptography, precomputation, simultaneous
40Kyungah Shim Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Anomalous curve, supersingular curve, elliptic curve discrete logarithm, Weil pairing
40Harald Baier Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF cryptography, elliptic curve, complex multiplication, Optimal Extension Field
40Marc Joye, Jean-Jacques Quisquater Hessian Elliptic Curves and Side-Channel Attacks. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Cryptography, Implementation, Smart-cards, Side-channel attacks, Elliptic curves
40Marc Joye, Christophe Tymen Protections against Differential Analysis for Elliptic Curve Cryptography. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Smart-cards, Side-channel attacks, Public-key cryptography, Elliptic curves, Differential power analysis (DPA), Timing attacks
40Katsuyuki Okeya, Kouichi Sakurai Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Montgomery-form, Scalar Multiplication Algorithm, Elliptic Curve Cryptosystem, Power Analysis, Timing Attack, Efficient Implementation
40Ingrid Biehl, Bernd Meyer 0002, Volker Müller 0001 Differential Fault Attacks on Elliptic Curve Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF differential fault attack, elliptic curve cryptosystem
40Tetsutaro Kobayashi, Hikaru Morita, Kunio Kobayashi, Fumitaka Hoshino Fast Elliptic Curve Algorithm Combining Frobenius Map and Table Reference to Adapt to Higher Characteristic. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF OEF, Table reference method, Finite field, Elliptic curve cryptosystem, Scalar multiplication, Frobenius map
38Santosh Ghosh, Monjur Alam, Dipanwita Roy Chowdhury, Indranil Sengupta 0001 A GF(p) elliptic curve group operator resistant against side channel attacks. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF gf(p) elliptic curve, elliptic curve cryptosystem, side-channel analysis, timing attack, power analysis attack
38Dong-Ho Lee, Jong-Soo Oh Multi-segment GF(2m) multiplication and its application to elliptic curve cryptography. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF elliptic curve scalar multiplication, FPGA, elliptic curve cryptography (ECC), coprocessor, finite field multiplication
38Fanyu Kong, Jia Yu 0003, Zhun Cai, Daxing Li New Left-to-Right Radix- r Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems. Search on Bibsonomy TAMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Elliptic curve cryptosystems, pairing-based cryptosystems, point multiplication, signed-digit number representations
38Daniel V. Bailey, Christof Paar Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF fast arithmetic, pseudo-Mersenne primes, OEF, binomials, cryptographic implementation, finite fields, elliptic curves, hyperelliptic curves, modular reduction, Optimal Extension Fields
38Apostolos P. Fournaris, Odysseas G. Koufopavlou Creating an Elliptic Curve arithmetic unit for use in elliptic curve cryptography. Search on Bibsonomy ETFA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Bertrand Byramjee, Andrew Weigl Smart Cards. Search on Bibsonomy Handbook of Elliptic and Hyperelliptic Curve Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Christophe Doche Integer Arithmetic. Search on Bibsonomy Handbook of Elliptic and Hyperelliptic Curve Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Roberto Maria Avanzi, Tanja Lange 0001 Introduction to Public-Key Cryptography. Search on Bibsonomy Handbook of Elliptic and Hyperelliptic Curve Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Gerhard Frey, Tanja Lange 0001 Background on Curves and Jacobians. Search on Bibsonomy Handbook of Elliptic and Hyperelliptic Curve Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Gerhard Frey, Tanja Lange 0001 Algebraic Realizations of DL Systems. Search on Bibsonomy Handbook of Elliptic and Hyperelliptic Curve Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Gerhard Frey, Tanja Lange 0001 Complex Multiplication. Search on Bibsonomy Handbook of Elliptic and Hyperelliptic Curve Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37David Lubicz Background on p-adic Numbers. Search on Bibsonomy Handbook of Elliptic and Hyperelliptic Curve Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Christophe Doche, Tanja Lange 0001 Arithmetic of Special Curves. Search on Bibsonomy Handbook of Elliptic and Hyperelliptic Curve Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Sylvain Duquesne, Gerhard Frey Background on Pairings. Search on Bibsonomy Handbook of Elliptic and Hyperelliptic Curve Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Gerhard Frey, Tanja Lange 0001 Varieties over Special Fields. Search on Bibsonomy Handbook of Elliptic and Hyperelliptic Curve Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Sylvain Duquesne, Tanja Lange 0001 Pairing-Based Cryptography. Search on Bibsonomy Handbook of Elliptic and Hyperelliptic Curve Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Bertrand Byramjee, Jean-Christophe Courrège, Benoit Feix Practical Attacks on Smart Cards. Search on Bibsonomy Handbook of Elliptic and Hyperelliptic Curve Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Sylvain Duquesne, Gerhard Frey Implementation of Pairings. Search on Bibsonomy Handbook of Elliptic and Hyperelliptic Curve Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 7751 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license