|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2282 occurrences of 833 keywords
|
|
|
Results
Found 7751 publication records. Showing 7751 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
121 | Atsuko Miyaji, Masaki Nakabayashi, Shunzo Takano |
Characterization of Elliptic Curve Traces under FR-Reduction. |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
FR-reduction, trace, elliptic curve cryptosystems, number theory |
76 | Katherine E. Stange |
The Tate Pairing Via Elliptic Nets. |
Pairing |
2007 |
DBLP DOI BibTeX RDF |
elliptic divisibility sequence, elliptic net, Miller’s algorithm, elliptic curve, Tate pairing, pairing-based cryptography |
72 | Souichi Okada, Naoya Torii, Kouichi Itoh, Masahiko Takenaka |
Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2m) on an FPGA. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
elliptic scalar multiplication over tex2html_wrap_inline100, IEEE P1363, Elliptic curve cryptography (ECC), multiplier, coprocessor, Koblitz curve |
69 | Jung Hee Cheon, Sung-Mo Park, Sangwoo Park, Daeho Kim |
Two Efficient Algorithms for Arithmetic of Elliptic Curves Using Frobenius Map. |
Public Key Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
62 | Stephen Mann, Sanjeev Bedi, David Roth |
The swept surface of an elliptic cylinder. |
Symposium on Solid Modeling and Applications |
2001 |
DBLP DOI BibTeX RDF |
|
62 | Neal Koblitz |
Constructing Elliptic Curve Cryptosystems in Characteristic 2. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
60 | Qi Cheng 0001, Ming-Deh A. Huang |
On Partial Lifting and the Elliptic Curve Discrete Logarithm Problem. |
ISAAC |
2004 |
DBLP DOI BibTeX RDF |
partiallifting, Elliptic curve cryptosystem, discrete logarithm |
60 | Louis Goubin |
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Side-channel attacks, Public-key cryptography, Elliptic curves, Differential Power Analysis (DPA), Power Analysis, Smartcards |
60 | Yasuyuki Sakai, Kouichi Sakurai |
On the Power of Multidoubling in Speeding Up Elliptic Scalar Multiplication. |
Selected Areas in Cryptography |
2001 |
DBLP DOI BibTeX RDF |
Montgomery form, Multidoubling, Elliptic curve cryptosystems, Scalar multiplication, Fast implementation |
58 | Kirsten Eisenträger, Kristin E. Lauter, Peter L. Montgomery |
Fast Elliptic Curve Arithmetic and Improved Weil Pairing Evaluation. |
CT-RSA |
2003 |
DBLP DOI BibTeX RDF |
elliptic curve arithmetic, Elliptic curve cryptosystem, scalar multiplication, pairing-based cryptosystem, ECM |
56 | Mathieu Ciet, Marc Joye |
(Virtually) Free Randomization Techniques for Elliptic Curve Cryptography. |
ICICS |
2003 |
DBLP DOI BibTeX RDF |
|
54 | Maurice Keller, Andrew Byrne, William P. Marnane |
Elliptic Curve Cryptography on FPGA for Low-Power Applications. |
ACM Trans. Reconfigurable Technol. Syst. |
2009 |
DBLP DOI BibTeX RDF |
FPGA, low-power, Cryptography, elliptic curves |
54 | Jun Yang, Xianze Yang |
Implementing Multi-party Key Exchange by Linear Combination of Elliptic Curve Points. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
tripartite key agreement protocol, public key cryptography, elliptic curve, matrix, discrete logarithm problem, optimal extension field |
54 | Eric R. Verheul |
Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems. |
J. Cryptol. |
2004 |
DBLP DOI BibTeX RDF |
Decision Diffie-Hellman problem, Supersingular elliptic curves, Inverting MOV embedding, Tripartite Diffie-Hellman key exchange, Escrow, XTR |
54 | Tetsuya Izu, Tsuyoshi Takagi |
Exceptional Procedure Attack on Elliptic Curve Cryptosystems. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
exceptional procedure attack, exceptional point, side channel attack, Elliptic curve cryptosystem (ECC), scalar multiplication |
54 | Yasuyuki Sakai, Kouichi Sakurai |
Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
Elliptic Curve Cryptosystems, Scalar Multiplication |
54 | Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica 0001 |
A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography. |
INDOCRYPT |
2001 |
DBLP DOI BibTeX RDF |
Weil descent, fast performance, Finite fields, elliptic curve cryptography |
54 | Julio César López-Hernández, Ricardo Dahab |
Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation. |
CHES |
1999 |
DBLP DOI BibTeX RDF |
Elliptic Curves over GF(2m), Point multiplication |
52 | Elisavet Konstantinou, Aristides Kontogeorgis, Yannis C. Stamatiou, Christos D. Zaroliagis |
Generating Prime Order Elliptic Curves: Difficulties and Efficiency Considerations. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
Generation of Prime Order Elliptic Curves, Class Field Polynomials, Elliptic Curve Cryptosystems, Complex Multiplication |
52 | R. Balasubramanian, Neal Koblitz |
The Improbability That an Elliptic Curve Has Subexponential Discrete Log Problem under the Menezes - Okamoto - Vanstone Algorithm. |
J. Cryptol. |
1998 |
DBLP DOI BibTeX RDF |
Elliptic curve, Elliptic curve, Discrete logarithm, Discrete logarithm, Key words, Weil pairing, Weil pairing |
52 | Volker Müller 0001 |
Fast Multiplication on Elliptic Curves over Small Fields of Characteristic Two. |
J. Cryptol. |
1998 |
DBLP DOI BibTeX RDF |
Characteristic two, Frobenius endomorphism, Characteristic two, Frobenius endomorphism, Elliptic curves, Elliptic curves, Multiplication, Multiplication, Key words, Frobenius expansion, Frobenius expansion |
49 | Qi Cheng 0001, Ming-Deh A. Huang |
Partial Lifting and the Elliptic Curve Discrete Logarithm Problem. |
Algorithmica |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Hyun Min Choi, Chun Pyo Hong, Chang Hoon Kim |
High Performance Elliptic Curve Cryptographic Processor Over GF(2^163). |
DELTA |
2008 |
DBLP DOI BibTeX RDF |
Cryptographic Processor, VLSI, Finite Field, Elliptic Curve Cryptosystem, Gaussian Normal Basis |
47 | Katsiaryna Krupchyk, Werner M. Seiler, Jukka Tuomela |
Overdetermined Elliptic Systems. |
Found. Comput. Math. |
2006 |
DBLP DOI BibTeX RDF |
Overdetermined system, Elliptic system, Completion, Partial differential equation, Symbol, Involution |
47 | Edlyn Teske |
An Elliptic Curve Trapdoor System. |
J. Cryptol. |
2006 |
DBLP DOI BibTeX RDF |
Weil descent, Elliptic curve cryptography, Key escrow, Isogenies, Trapdoor functions |
47 | Yasuyuki Sakai, Kouichi Sakurai |
Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
generalized Mersenne prime, unified code, elliptic curve cryptosystem, Side channel analysis, modular reduction |
47 | Loren D. Olson |
Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
weighted projective curves, uniform addition formula, cryptography, ECC, side-channel attacks, Elliptic curves |
47 | Tae-Jun Park, Mun-Kyu Lee, Kunsoo Park |
New Frobenius Expansions for Elliptic Curves with Efficient Endomorphisms. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
Endomorphism, Elliptic Curve Cryptosystem, Scalar Multiplication, Frobenius Expansion |
47 | Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica 0001 |
Preventing Differential Analysis in GLV Elliptic Curve Scalar Multiplication. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
fast computation, Public key cryptography, differential power analysis, elliptic curve cryptosystem |
47 | Jean-Sébastien Coron, David M'Raïhi, Christophe Tymen |
Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves. |
Selected Areas in Cryptography |
2001 |
DBLP DOI BibTeX RDF |
binary anomalous curve, accelerated signature schemes, Elliptic curve, scalar multiplication, pseudo-random generators |
47 | Katsuyuki Okeya, Kunihiko Miyazaki, Kouichi Sakurai |
A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
Montgomery Form, Randomized Projective Coordinates, Side Channel Attacks, Elliptic Curve Cryptosystem |
47 | Neal Koblitz |
An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithm. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
Supersingular, Nonadjacent Form, Digital Signature, Elliptic Curve |
47 | Jerome A. Solinas |
An Improved Algorithm for Arithmetic on a Family of Elliptic Curves. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
public-key cryptography, elliptic curves, exponentiation |
46 | Reynald Lercier, David Lubicz, Frederik Vercauteren |
Point Counting on Elliptic and Hyperelliptic Curves. |
Handbook of Elliptic and Hyperelliptic Curve Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Christophe Doche, Tanja Lange 0001 |
Arithmetic of Elliptic Curves. |
Handbook of Elliptic and Hyperelliptic Curve Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson |
The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves. |
Int. J. Inf. Sec. |
2004 |
DBLP DOI BibTeX RDF |
Elliptic curve discrete logarithm problem (ecdlp), Baby-step giant-step method (bsgs), Pollards rho method, Fixed elliptic curve, Precomputation |
45 | Christophe Doche, Thomas Icart, David R. Kohel |
Efficient Scalar Multiplication by Isogeny Decompositions. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
fast arithmetic, efficiently computable isogenies, efficient tripling, ?-adic, Elliptic curve cryptography |
45 | Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto |
Efficient Countermeasures against RPA, DPA, and SPA. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
Elliptic curve exponentiation, ZPA, RPA, DPA, SPA |
43 | Karl Rubin, Alice Silverberg |
Using Abelian Varieties to Improve Pairing-Based Cryptography. |
J. Cryptol. |
2009 |
DBLP DOI BibTeX RDF |
Abelian varieties, Compression, Elliptic curve cryptography, Elliptic curves, Pairing-based cryptography |
43 | Billy Bob Brumley |
Left-to-Right Signed-Bit tau-Adic Representations of n Integers (Short Paper). |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
joint sparse form, simultaneous elliptic scalar multiplication, digital signatures, elliptic curve cryptography, Koblitz curves |
43 | Adam L. Young, Moti Yung |
A Space Efficient Backdoor in RSA and Its Applications. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Decision Diffie-Hellman, black-box ciphers, twist on elliptic curves, RSA, elliptic curve cryptography, tamper-resistance, Diffie-Hellman, Key recovery, SETUP |
42 | Kimmo U. Järvinen, Jorma Skyttä |
On Parallelization of High-Speed Processors for Elliptic Curve Cryptography. |
IEEE Trans. Very Large Scale Integr. Syst. |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Masaaki Shirase, Yasushi Hibino |
An architecture for elliptic curve cryptograph computation. |
SIGARCH Comput. Archit. News |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Steven D. Galbraith, James F. McKee |
Pairings on Elliptic Curves over Finite Commutative Rings. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
|
42 | S. Yu. Vernov |
Interdependence Between the Laurent-Series and Elliptic Solutions of Nonintegrable Systems. |
CASC |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Eric Brier, Marc Joye |
Weierstraß Elliptic Curves and Side-Channel Attacks. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
42 | Tetsuya Izu, Jun Kogure, Masayuki Noro, Kazuhiro Yokoyama |
Parameters for Secure Elliptic Curve Cryptosystem - Improvements on Schoof's Algorithm. |
Public Key Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
42 | Atsuko Miyaji |
On Ordinary Elliptic Curve Cryptosystems. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
40 | Steven D. Galbraith, Xibin Lin, Michael Scott |
Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
GLV method, elliptic curves, point multiplication, isogenies |
40 | Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi |
Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd Characteristic. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
Non-Adjacent Form (NAF), ?-adic NAF (?-NAF), ?-adic NAF (?-NAF), Elliptic Curves, Frobenius Expansions |
40 | Zhixiong Chen 0002, Ning Zhang, Guozhen Xiao |
Pseudo-Randomness of Discrete-Log Sequences from Elliptic Curves. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
elliptic curves, discrete logarithm, discrepancy, linear complexity, pseudo-random sequences, character sums |
40 | Tim Güneysu, Christof Paar, Jan Pelzl |
Attacking elliptic curve cryptosystems with special-purpose hardware. |
FPGA |
2007 |
DBLP DOI BibTeX RDF |
Pollard's Rho, cryptanalysis, elliptic curve cryptosystem, discrete logarithm |
40 | Yong Ki Lee, Ingrid Verbauwhede |
A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
Compact Elliptic Curve Processor, Montgomery Scalar Multiplication |
40 | Aya Comuta, Mitsuru Kawazoe, Tetsuya Takahashi 0001 |
Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon's Algorithm. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
Elliptic curves, Pairing based cryptosystem |
40 | Robert M. Corless, Dawit Assefa |
Jeffery-hamel flow with maple: : a case study of integration of elliptic functions in a cas. |
ISSAC |
2007 |
DBLP DOI BibTeX RDF |
elliptic functions, integration |
40 | Trond Stølen Gustavsen, Kristian Ranestad |
A Simple Point Counting Algorithm for Hessian Elliptic Curves in Characteristic Three. |
Appl. Algebra Eng. Commun. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Point counting, Cryptography, Finite field, Elliptic curve |
40 | Katja Schmidt-Samoa, Olivier Semay, Tsuyoshi Takagi |
Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
elliptic curve scalar multiplication, signed binary representations, Public key cryptosystems, algorithm design and analysis |
40 | Johannes Blömer, Martin Otto 0002, Jean-Pierre Seifert |
Sign Change Fault Attacks on Elliptic Curve Cryptosystems. |
FDTC |
2006 |
DBLP DOI BibTeX RDF |
elliptic curve cryptosystem, smartcards, fault attacks |
40 | Christophe Doche, Laurent Imbert |
Extended Double-Base Number System with Applications to Elliptic Curve Cryptography. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Elliptic curve cryptography, Double-base number system |
40 | Friederike Brezing, Annegret Weng |
Elliptic Curves Suitable for Pairing Based Cryptography. |
Des. Codes Cryptogr. |
2005 |
DBLP DOI BibTeX RDF |
pairing based cryptagraphy, elliptic curves |
40 | David Jao, Stephen D. Miller, Ramarathnam Venkatesan |
Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log? |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
random reducibility, modular forms, L-functions, generalized Riemann hypothesis, elliptic curves, expanders, Ramanujan graphs, isogenies, rapid mixing, discrete log |
40 | Takakazu Satoh |
On Degrees of Polynomial Interpolations Related to Elliptic Curve Cryptography. |
WCC |
2005 |
DBLP DOI BibTeX RDF |
division polynomials, Elliptic curves, polynomial interpolation |
40 | Soonhak Kwon |
Efficient Tate Pairing Computation for Elliptic Curves over Binary Fields. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
supersingular elliptic curve, divisor, Tate pairing, automorphism, roots of unity |
40 | Massimo Giulietti |
On the Extendibility of Near-MDS Elliptic Codes. |
Appl. Algebra Eng. Commun. Comput. |
2004 |
DBLP DOI BibTeX RDF |
Near-MDS Codes, Elliptic Curves, Projective Spaces |
40 | Jun-Cheol Jeon, Kee-Young Yoo |
An Evolutionary Approach to the Design of Cellular Automata Architecture for Multiplication in Elliptic Curve Cryptography over Finite Fields. |
PRICAI |
2004 |
DBLP DOI BibTeX RDF |
Evolutionary Computation, Cellular Automata, Finite Fields, Elliptic Curve Cryptography, Multiplication, Irreducible Polynomial |
40 | Pradeep Kumar Mishra, Palash Sarkar 0001 |
Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
scalar multipication, field inversion, side-channel attacks, elliptic curves, hyperelliptic curves, explicit formulae |
40 | Sultan Almuhammadi, Nien T. Sui, Dennis McLeod |
Better Privacy and Security in E-Commerce: Using Elliptic Curve-Based Zero-Knowledge Proofs. |
CEC |
2004 |
DBLP DOI BibTeX RDF |
security, privacy, E-commerce, elliptic curves, zero-knowledge proofs |
40 | Reynald Lercier, David Lubicz |
Counting Points on Elliptic Curves over Finite Fields of Small Characteristic in Quasi Quadratic Time. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
canonical lifts, AGM, Elliptic curves |
40 | Teo Chun Yew, Hailiza Kamarulhaili, Putra Sumari |
Message Recovery Signature Scheme Using Complementary Elliptic Curves. |
GMAG |
2003 |
DBLP DOI BibTeX RDF |
Isomorphic Curves, Complementary Curves, Imbedding Plaintexts, Elliptic Curve Cryptosystems, Signature Scheme, Message Recovery |
40 | Essam Al-Daoud, Ramlan Mahmod, Mohammad Rushdan, Adem Kiliçman |
A New Addition Formula for Elliptic Curves over GF(2n). |
IEEE Trans. Computers |
2002 |
DBLP DOI BibTeX RDF |
point addition, projective coordinates, Public-key cryptography, elliptic curves, scalar multiplication |
40 | Nils Gura, Hans Eberle, Sheueling Chang Shantz |
Generic implementations of elliptic curve cryptography using partial reduction. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
elliptic curve cryptography, modular reduction |
40 | Tetsuya Izu, Bodo Möller, Tsuyoshi Takagi |
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks. |
INDOCRYPT |
2002 |
DBLP DOI BibTeX RDF |
side channel attacks, elliptic curve cryptosystems, scalar multiplication, window method, memory constraints |
40 | Richard Schroeppel, Cheryl L. Beaver, Rita Gonzales, Russell Miller 0001, Timothy Draelos |
A Low-Power Design for an Elliptic Curve Digital Signature Chip. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
Optimal El Gamal, Characteristic 2, Field Towers, Trinomial Basis, Qsolve, Almost-Inverse Algorithm, Point Halving, Signed Sliding Window, GF(289), GF(2178), Low Power, Digital Signature, VHDL, Hardware, Elliptic Curve, ECDSA, Quadratic Equation |
40 | M. Ernst, Michael Jung 0002, Felix Madlener, Sorin A. Huss, Rainer Blümel |
A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2n). |
CHES |
2002 |
DBLP DOI BibTeX RDF |
$ mathbb {GF}(2^n)$ arithmetic, Karatsuba multiplication, VHDL model generator, coprocessor synthesis, FPGA hardware acceleration, Atmel FPSLIC platform, Elliptic Curve cryptography |
40 | Katsuyuki Okeya, Kouichi Sakurai |
Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
multi-scalar multiplication, Montgomery trick, elliptic curve cryptography, precomputation, simultaneous |
40 | Kyungah Shim |
Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
Anomalous curve, supersingular curve, elliptic curve discrete logarithm, Weil pairing |
40 | Harald Baier |
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography. |
INDOCRYPT |
2001 |
DBLP DOI BibTeX RDF |
cryptography, elliptic curve, complex multiplication, Optimal Extension Field |
40 | Marc Joye, Jean-Jacques Quisquater |
Hessian Elliptic Curves and Side-Channel Attacks. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
Cryptography, Implementation, Smart-cards, Side-channel attacks, Elliptic curves |
40 | Marc Joye, Christophe Tymen |
Protections against Differential Analysis for Elliptic Curve Cryptography. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
Smart-cards, Side-channel attacks, Public-key cryptography, Elliptic curves, Differential power analysis (DPA), Timing attacks |
40 | Katsuyuki Okeya, Kouichi Sakurai |
Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack. |
INDOCRYPT |
2000 |
DBLP DOI BibTeX RDF |
Montgomery-form, Scalar Multiplication Algorithm, Elliptic Curve Cryptosystem, Power Analysis, Timing Attack, Efficient Implementation |
40 | Ingrid Biehl, Bernd Meyer 0002, Volker Müller 0001 |
Differential Fault Attacks on Elliptic Curve Cryptosystems. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
differential fault attack, elliptic curve cryptosystem |
40 | Tetsutaro Kobayashi, Hikaru Morita, Kunio Kobayashi, Fumitaka Hoshino |
Fast Elliptic Curve Algorithm Combining Frobenius Map and Table Reference to Adapt to Higher Characteristic. |
EUROCRYPT |
1999 |
DBLP DOI BibTeX RDF |
OEF, Table reference method, Finite field, Elliptic curve cryptosystem, Scalar multiplication, Frobenius map |
38 | Santosh Ghosh, Monjur Alam, Dipanwita Roy Chowdhury, Indranil Sengupta 0001 |
A GF(p) elliptic curve group operator resistant against side channel attacks. |
ACM Great Lakes Symposium on VLSI |
2008 |
DBLP DOI BibTeX RDF |
gf(p) elliptic curve, elliptic curve cryptosystem, side-channel analysis, timing attack, power analysis attack |
38 | Dong-Ho Lee, Jong-Soo Oh |
Multi-segment GF(2m) multiplication and its application to elliptic curve cryptography. |
ACM Great Lakes Symposium on VLSI |
2007 |
DBLP DOI BibTeX RDF |
elliptic curve scalar multiplication, FPGA, elliptic curve cryptography (ECC), coprocessor, finite field multiplication |
38 | Fanyu Kong, Jia Yu 0003, Zhun Cai, Daxing Li |
New Left-to-Right Radix- r Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems. |
TAMC |
2007 |
DBLP DOI BibTeX RDF |
Elliptic curve cryptosystems, pairing-based cryptosystems, point multiplication, signed-digit number representations |
38 | Daniel V. Bailey, Christof Paar |
Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
fast arithmetic, pseudo-Mersenne primes, OEF, binomials, cryptographic implementation, finite fields, elliptic curves, hyperelliptic curves, modular reduction, Optimal Extension Fields |
38 | Apostolos P. Fournaris, Odysseas G. Koufopavlou |
Creating an Elliptic Curve arithmetic unit for use in elliptic curve cryptography. |
ETFA |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Bertrand Byramjee, Andrew Weigl |
Smart Cards. |
Handbook of Elliptic and Hyperelliptic Curve Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Christophe Doche |
Integer Arithmetic. |
Handbook of Elliptic and Hyperelliptic Curve Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Roberto Maria Avanzi, Tanja Lange 0001 |
Introduction to Public-Key Cryptography. |
Handbook of Elliptic and Hyperelliptic Curve Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Gerhard Frey, Tanja Lange 0001 |
Background on Curves and Jacobians. |
Handbook of Elliptic and Hyperelliptic Curve Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Gerhard Frey, Tanja Lange 0001 |
Algebraic Realizations of DL Systems. |
Handbook of Elliptic and Hyperelliptic Curve Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Gerhard Frey, Tanja Lange 0001 |
Complex Multiplication. |
Handbook of Elliptic and Hyperelliptic Curve Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
37 | David Lubicz |
Background on p-adic Numbers. |
Handbook of Elliptic and Hyperelliptic Curve Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Christophe Doche, Tanja Lange 0001 |
Arithmetic of Special Curves. |
Handbook of Elliptic and Hyperelliptic Curve Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Sylvain Duquesne, Gerhard Frey |
Background on Pairings. |
Handbook of Elliptic and Hyperelliptic Curve Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Gerhard Frey, Tanja Lange 0001 |
Varieties over Special Fields. |
Handbook of Elliptic and Hyperelliptic Curve Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Sylvain Duquesne, Tanja Lange 0001 |
Pairing-Based Cryptography. |
Handbook of Elliptic and Hyperelliptic Curve Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Bertrand Byramjee, Jean-Christophe Courrège, Benoit Feix |
Practical Attacks on Smart Cards. |
Handbook of Elliptic and Hyperelliptic Curve Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Sylvain Duquesne, Gerhard Frey |
Implementation of Pairings. |
Handbook of Elliptic and Hyperelliptic Curve Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 7751 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|