|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1381 occurrences of 405 keywords
|
|
|
Results
Found 2383 publication records. Showing 2383 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
192 | Atsuko Miyaji, Masaki Nakabayashi, Shunzo Takano |
Characterization of Elliptic Curve Traces under FR-Reduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2000, Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings, pp. 90-108, 2000, Springer, 3-540-41782-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
FR-reduction, trace, elliptic curve cryptosystems, number theory |
109 | Souichi Okada, Naoya Torii, Kouichi Itoh, Masahiko Takenaka |
Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2m) on an FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings, pp. 25-40, 2000, Springer, 3-540-41455-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
elliptic scalar multiplication over tex2html_wrap_inline100, IEEE P1363, Elliptic curve cryptography (ECC), multiplier, coprocessor, Koblitz curve |
108 | Kirsten Eisenträger, Kristin E. Lauter, Peter L. Montgomery |
Fast Elliptic Curve Arithmetic and Improved Weil Pairing Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings, pp. 343-354, 2003, Springer, 3-540-00847-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
elliptic curve arithmetic, Elliptic curve cryptosystem, scalar multiplication, pairing-based cryptosystem, ECM |
97 | R. Balasubramanian, Neal Koblitz |
The Improbability That an Elliptic Curve Has Subexponential Discrete Log Problem under the Menezes - Okamoto - Vanstone Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 11(2), pp. 141-145, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Elliptic curve, Elliptic curve, Discrete logarithm, Discrete logarithm, Key words, Weil pairing, Weil pairing |
96 | Qi Cheng 0001, Ming-Deh A. Huang |
On Partial Lifting and the Elliptic Curve Discrete Logarithm Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISAAC ![In: Algorithms and Computation, 15th International Symposium, ISAAC 2004, Hong Kong, China, December 20-22, 2004, Proceedings, pp. 342-351, 2004, Springer, 3-540-24131-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
partiallifting, Elliptic curve cryptosystem, discrete logarithm |
96 | Edlyn Teske |
An Elliptic Curve Trapdoor System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 19(1), pp. 115-133, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Weil descent, Elliptic curve cryptography, Key escrow, Isogenies, Trapdoor functions |
94 | Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica 0001 |
A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings, pp. 108-116, 2001, Springer, 3-540-43010-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Weil descent, fast performance, Finite fields, elliptic curve cryptography |
93 | Neal Koblitz |
Constructing Elliptic Curve Cryptosystems in Characteristic 2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings, pp. 156-167, 1990, Springer, 3-540-54508-5. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
89 | Jun Yang, Xianze Yang |
Implementing Multi-party Key Exchange by Linear Combination of Elliptic Curve Points. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 617-622, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
tripartite key agreement protocol, public key cryptography, elliptic curve, matrix, discrete logarithm problem, optimal extension field |
87 | Toru Akishita, Tsuyoshi Takagi |
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 346-359, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
zero-value point attack, side channel attack, elliptic curve cryptosystems, isomorphism, isogeny |
85 | Tetsuya Izu, Tsuyoshi Takagi |
Exceptional Procedure Attack on Elliptic Curve Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings, pp. 224-239, 2003, Springer, 3-540-00324-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
exceptional procedure attack, exceptional point, side channel attack, Elliptic curve cryptosystem (ECC), scalar multiplication |
83 | Hyun Min Choi, Chun Pyo Hong, Chang Hoon Kim |
High Performance Elliptic Curve Cryptographic Processor Over GF(2^163). ![Search on Bibsonomy](Pics/bibsonomy.png) |
DELTA ![In: 4th IEEE International Symposium on Electronic Design, Test and Applications, DELTA 2008, Hong Kong, January 23-25, 2008, pp. 290-295, 2008, IEEE Computer Society, 978-0-7695-3110-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Cryptographic Processor, VLSI, Finite Field, Elliptic Curve Cryptosystem, Gaussian Normal Basis |
83 | Neal Koblitz |
An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings, pp. 327-337, 1998, Springer, 3-540-64892-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Supersingular, Nonadjacent Form, Digital Signature, Elliptic Curve |
82 | Mathieu Ciet, Marc Joye |
(Virtually) Free Randomization Techniques for Elliptic Curve Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings, pp. 348-359, 2003, Springer, 3-540-20150-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
76 | Christophe Doche, Thomas Icart, David R. Kohel |
Efficient Scalar Multiplication by Isogeny Decompositions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 191-206, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
fast arithmetic, efficiently computable isogenies, efficient tripling, ?-adic, Elliptic curve cryptography |
76 | Yasuyuki Sakai, Kouichi Sakurai |
Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings, pp. 484-500, 2002, Springer, 3-540-44270-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Elliptic Curve Cryptosystems, Scalar Multiplication |
76 | Johannes Blömer, Martin Otto 0002, Jean-Pierre Seifert |
Sign Change Fault Attacks on Elliptic Curve Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: Fault Diagnosis and Tolerance in Cryptography, Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings, pp. 36-52, 2006, Springer, 3-540-46250-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
elliptic curve cryptosystem, smartcards, fault attacks |
76 | Nils Gura, Hans Eberle, Sheueling Chang Shantz |
Generic implementations of elliptic curve cryptography using partial reduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, pp. 108-116, 2002, ACM, 1-58113-612-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
elliptic curve cryptography, modular reduction |
76 | Kyungah Shim |
Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings, pp. 514-520, 2001, Springer, 3-540-42300-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Anomalous curve, supersingular curve, elliptic curve discrete logarithm, Weil pairing |
76 | Qi Cheng 0001, Ming-Deh A. Huang |
Partial Lifting and the Elliptic Curve Discrete Logarithm Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Algorithmica ![In: Algorithmica 46(1), pp. 59-68, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
74 | Yasuyuki Sakai, Kouichi Sakurai |
On the Power of Multidoubling in Speeding Up Elliptic Scalar Multiplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers, pp. 268-283, 2001, Springer, 3-540-43066-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Montgomery form, Multidoubling, Elliptic curve cryptosystems, Scalar multiplication, Fast implementation |
74 | Katsuyuki Okeya, Kunihiko Miyazaki, Kouichi Sakurai |
A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings, pp. 428-439, 2001, Springer, 3-540-43319-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Montgomery Form, Randomized Projective Coordinates, Side Channel Attacks, Elliptic Curve Cryptosystem |
73 | Maurice Keller, Andrew Byrne, William P. Marnane |
Elliptic Curve Cryptography on FPGA for Low-Power Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Reconfigurable Technol. Syst. ![In: ACM Trans. Reconfigurable Technol. Syst. 2(1), pp. 2:1-2:20, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
FPGA, low-power, Cryptography, elliptic curves |
73 | Masaaki Shirase, Yasushi Hibino |
An architecture for elliptic curve cryptograph computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGARCH Comput. Archit. News ![In: SIGARCH Comput. Archit. News 33(1), pp. 124-133, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
73 | Tetsuya Izu, Jun Kogure, Masayuki Noro, Kazuhiro Yokoyama |
Parameters for Secure Elliptic Curve Cryptosystem - Improvements on Schoof's Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings, pp. 253-257, 1998, Springer, 3-540-64693-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
72 | Yong Ki Lee, Ingrid Verbauwhede |
A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, pp. 115-127, 2007, Springer, 978-3-540-77534-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Compact Elliptic Curve Processor, Montgomery Scalar Multiplication |
72 | Katja Schmidt-Samoa, Olivier Semay, Tsuyoshi Takagi |
Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 55(1), pp. 48-57, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
elliptic curve scalar multiplication, signed binary representations, Public key cryptosystems, algorithm design and analysis |
72 | Christophe Doche, Laurent Imbert |
Extended Double-Base Number System with Applications to Elliptic Curve Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 335-348, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Elliptic curve cryptography, Double-base number system |
72 | Jun-Cheol Jeon, Kee-Young Yoo |
An Evolutionary Approach to the Design of Cellular Automata Architecture for Multiplication in Elliptic Curve Cryptography over Finite Fields. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRICAI ![In: PRICAI 2004: Trends in Artificial Intelligence, 8th Pacific Rim International Conference on Artificial Intelligence, Auckland, New Zealand, August 9-13, 2004, Proceedings, pp. 241-250, 2004, Springer, 3-540-22817-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Evolutionary Computation, Cellular Automata, Finite Fields, Elliptic Curve Cryptography, Multiplication, Irreducible Polynomial |
72 | M. Ernst, Michael Jung 0002, Felix Madlener, Sorin A. Huss, Rainer Blümel |
A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2n). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, pp. 381-399, 2002, Springer, 3-540-00409-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
$ mathbb {GF}(2^n)$ arithmetic, Karatsuba multiplication, VHDL model generator, coprocessor synthesis, FPGA hardware acceleration, Atmel FPSLIC platform, Elliptic Curve cryptography |
72 | Tetsutaro Kobayashi, Hikaru Morita, Kunio Kobayashi, Fumitaka Hoshino |
Fast Elliptic Curve Algorithm Combining Frobenius Map and Table Reference to Adapt to Higher Characteristic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding, pp. 176-189, 1999, Springer, 3-540-65889-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
OEF, Table reference method, Finite field, Elliptic curve cryptosystem, Scalar multiplication, Frobenius map |
71 | Louis Goubin |
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings, pp. 199-210, 2003, Springer, 3-540-00324-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Side-channel attacks, Public-key cryptography, Elliptic curves, Differential Power Analysis (DPA), Power Analysis, Smartcards |
70 | Santosh Ghosh, Monjur Alam, Dipanwita Roy Chowdhury, Indranil Sengupta 0001 |
A GF(p) elliptic curve group operator resistant against side channel attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: Proceedings of the 18th ACM Great Lakes Symposium on VLSI 2008, Orlando, Florida, USA, May 4-6, 2008, pp. 53-58, 2008, ACM, 978-1-59593-999-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
gf(p) elliptic curve, elliptic curve cryptosystem, side-channel analysis, timing attack, power analysis attack |
70 | Dong-Ho Lee, Jong-Soo Oh |
Multi-segment GF(2m) multiplication and its application to elliptic curve cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: Proceedings of the 17th ACM Great Lakes Symposium on VLSI 2007, Stresa, Lago Maggiore, Italy, March 11-13, 2007, pp. 546-551, 2007, ACM, 978-1-59593-605-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
elliptic curve scalar multiplication, FPGA, elliptic curve cryptography (ECC), coprocessor, finite field multiplication |
69 | Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica 0001 |
Preventing Differential Analysis in GLV Elliptic Curve Scalar Multiplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, pp. 540-550, 2002, Springer, 3-540-00409-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
fast computation, Public key cryptography, differential power analysis, elliptic curve cryptosystem |
69 | Kimmo U. Järvinen, Jorma Skyttä |
On Parallelization of High-Speed Processors for Elliptic Curve Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 16(9), pp. 1162-1175, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
69 | Atsuko Miyaji |
On Ordinary Elliptic Curve Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings, pp. 460-469, 1991, Springer, 3-540-57332-1. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
69 | Apostolos P. Fournaris, Odysseas G. Koufopavlou |
Creating an Elliptic Curve arithmetic unit for use in elliptic curve cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETFA ![In: Proceedings of 13th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2008, September 15-18, 2008, Hamburg, Germany, pp. 1457-1464, 2008, IEEE, 1-4244-1505-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
67 | Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto |
Efficient Countermeasures against RPA, DPA, and SPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings, pp. 343-356, 2004, Springer, 3-540-22666-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Elliptic curve exponentiation, ZPA, RPA, DPA, SPA |
67 | Tim Güneysu, Christof Paar, Jan Pelzl |
Attacking elliptic curve cryptosystems with special-purpose hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPGA ![In: Proceedings of the ACM/SIGDA 15th International Symposium on Field Programmable Gate Arrays, FPGA 2007, Monterey, California, USA, February 18-20, 2007, pp. 207-215, 2007, ACM, 978-1-59593-600-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Pollard's Rho, cryptanalysis, elliptic curve cryptosystem, discrete logarithm |
67 | Tetsuya Izu, Bodo Möller, Tsuyoshi Takagi |
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002, pp. 296-313, 2002, Springer, 3-540-00263-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
side channel attacks, elliptic curve cryptosystems, scalar multiplication, window method, memory constraints |
67 | Richard Schroeppel, Cheryl L. Beaver, Rita Gonzales, Russell Miller 0001, Timothy Draelos |
A Low-Power Design for an Elliptic Curve Digital Signature Chip. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, pp. 366-380, 2002, Springer, 3-540-00409-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Optimal El Gamal, Characteristic 2, Field Towers, Trinomial Basis, Qsolve, Almost-Inverse Algorithm, Point Halving, Signed Sliding Window, GF(289), GF(2178), Low Power, Digital Signature, VHDL, Hardware, Elliptic Curve, ECDSA, Quadratic Equation |
67 | Katsuyuki Okeya, Kouichi Sakurai |
Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings, pp. 178-190, 2000, Springer, 3-540-41452-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Montgomery-form, Scalar Multiplication Algorithm, Elliptic Curve Cryptosystem, Power Analysis, Timing Attack, Efficient Implementation |
67 | Ingrid Biehl, Bernd Meyer 0002, Volker Müller 0001 |
Differential Fault Attacks on Elliptic Curve Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings, pp. 131-146, 2000, Springer, 3-540-67907-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
differential fault attack, elliptic curve cryptosystem |
65 | Jean-Sébastien Coron, David M'Raïhi, Christophe Tymen |
Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers, pp. 151-164, 2001, Springer, 3-540-43066-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
binary anomalous curve, accelerated signature schemes, Elliptic curve, scalar multiplication, pseudo-random generators |
65 | Olivier Billet, Marc Joye |
The Jacobi Model of an Elliptic Curve and Side-Channel Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAECC ![In: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 15th International Symposium, AAECC-15, Toulouse, France, May 12-16, 2003, Proceedings, pp. 34-42, 2003, Springer, 3-540-40111-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
unified addition formula, SPA-like attacks, smart cards, elliptic curve cryptosystems, side-channel analysis |
65 | Jung Hee Cheon, Sung-Mo Park, Sangwoo Park, Daeho Kim |
Two Efficient Algorithms for Arithmetic of Elliptic Curves Using Frobenius Map. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings, pp. 195-202, 1998, Springer, 3-540-64693-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
64 | Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson |
The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 3(2), pp. 86-98, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Elliptic curve discrete logarithm problem (ecdlp), Baby-step giant-step method (bsgs), Pollards rho method, Fixed elliptic curve, Precomputation |
64 | Murat Aydos, Tugrul Yanik, Çetin Kaya Koç |
An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 401-410, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
high-speed ECC-based wireless authentication, ARM microprocessor, elliptic curve digital signature algorithm, ARM7TDMI processor, core processor, 80 MHz, 160 bit, mobile computing, elliptic curve cryptography, public key cryptography, software libraries, software library, authorisation, microprocessor chips, message authentication, portable computers, ECDSA, 32 bit, wireless applications |
63 | Katherine E. Stange |
The Tate Pairing Via Elliptic Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings, pp. 329-348, 2007, Springer, 978-3-540-73488-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
elliptic divisibility sequence, elliptic net, Miller’s algorithm, elliptic curve, Tate pairing, pairing-based cryptography |
62 | Kenli Li 0001, Shuting Zou, Jin Xu |
Fast Parallel Molecular Algorithms for DNA-Based Computation: Solving the Elliptic Curve Discrete Logarithm Problem over GF(2n). ![Search on Bibsonomy](Pics/bibsonomy.png) |
FBIT ![In: Frontiers in the Convergence of Bioscience and Information Technologies 2007, FBIT 2007, Jeju Island, Korea, October 11-13, 2007, pp. 749-752, 2007, IEEE Computer Society, 978-0-7695-2999-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Eiji Okamoto, Takeshi Okamoto |
Cryptosystems Based on Elliptic Curve Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MDAI ![In: Modeling Decisions for Artificial Intelligence, Second International Conference, MDAI 2005, Tsukuba, Japan, July 25-27, 2005, Proceedings, pp. 13-23, 2005, Springer, 3-540-27871-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
key agreement scheme, privacy, pairing, ID based cryptosystem |
62 | Arjen K. Lenstra |
Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings, pp. 294-302, 1999, Springer, 3-540-65756-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
62 | Henri Cohen, Atsuko Miyaji, Takatoshi Ono |
Efficient Elliptic Curve Exponentiation Using Mixed Coordinates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings, pp. 51-65, 1998, Springer, 3-540-65109-8. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
61 | Patrick Longa, Catherine H. Gebotys |
Novel Precomputation Schemes for Elliptic Curve Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings, pp. 71-88, 2009, 978-3-642-01956-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
multiple scalar multiplication, precomputation scheme, conjugate addition, Elliptic curve cryptosystem, scalar multiplication |
61 | Sameh M. Shohdy, Ashraf El-Sisi, Nabil A. Ismail |
FPGA Implementation of Elliptic Curve Point Multiplication over GF(2191). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 619-634, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Karatsuba-Ofman multiplier, polynomial inversion, field programmable gate arrays, Elliptic curve cryptography, Galois field, polynomial multiplication |
61 | Neil Costigan, Peter Schwabe |
Fast Elliptic-Curve Cryptography on the Cell Broadband Engine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings, pp. 368-385, 2009, Springer, 978-3-642-02383-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
elliptic-curve cryptography (ECC), Cell Broadband Engine, efficient implementation |
61 | Tim Güneysu, Christof Paar, Jan Pelzl |
Special-Purpose Hardware for Solving the Elliptic Curve Discrete Logarithm Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Reconfigurable Technol. Syst. ![In: ACM Trans. Reconfigurable Technol. Syst. 1(2), pp. 8:1-8:21, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Pollard's rho, cryptanalysis, elliptic curve cryptosystem, Discrete logarithm |
61 | Guicheng Shen, Xuefeng Zheng |
Research on Implementation of Elliptic Curve Cryptosystem in E-Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 288-291, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Electronic Commerce, Information Security, Elliptic Curve Cryptosystem |
61 | Erik Dahmen, Katsuyuki Okeya, Daniel Schepers |
Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, pp. 245-258, 2007, Springer, 978-3-540-73457-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
affine coordinates, elliptic curve cryptosystem, scalar multiplication, precomputation |
61 | Hüseyin Hisil, Gary Carter, Ed Dawson |
New Formulae for Efficient Elliptic Curve Arithmetic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings, pp. 138-151, 2007, Springer, 978-3-540-77025-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
efficient point multiplication, DBNS, Elliptic curve, tripling, doubling |
61 | Daniel R. L. Brown, Kristian Gjøsteen |
A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings, pp. 466-481, 2007, Springer, 978-3-540-74142-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Elliptic Curve Cryptography, Random Number Generation |
61 | Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart Preneel, Ingrid Verbauwhede |
Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers, pp. 6-17, 2006, Springer, 978-3-540-69172-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
sensor networks, authentication, pervasive computing, Elliptic Curve Cryptography, key-distribution, hardware implementation |
61 | Selçuk Baktir, Berk Sunar |
Finite Field Polynomial Multiplication in the Frequency Domain with Application to Elliptic Curve Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2006, 21th International Symposium, Istanbul, Turkey, November 1-3, 2006, Proceedings, pp. 991-1001, 2006, Springer, 3-540-47242-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
elliptic curve cryptography, DFT, Finite field multiplication |
61 | Mathieu Ciet, Marc Joye |
Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 36(1), pp. 33-43, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
elliptic curve cryptography, fault attacks, fault analysis, information leakage |
61 | Soonhak Kwon, Taekyoung Kwon 0002, Young-Ho Park 0001 |
New Architecture for Multiplication in GF(2m) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers, pp. 335-351, 2005, Springer, 3-540-33354-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
linear multiplier, NIST recommended binary fields, elliptic curve cryptography |
61 | Stefan Tillich, Johann Großschädl |
A Simple Architectural Enhancement for Fast and Flexible Elliptic Curve Cryptography over Binary Finite Fields GF(2m). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asia-Pacific Computer Systems Architecture Conference ![In: Advances in Computer Systems Architecture, 9th Asia-Pacific Conference, ACSAC 2004, Beijing, China, September 7-9, 2004, Proceedings, pp. 282-295, 2004, Springer, 3-540-23003-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
application-specific instruction set extension, binary finite fields, SPARC V8, multiply step instruction, Elliptic curve cryptography |
61 | Pradeep Kumar Mishra |
Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings, pp. 328-342, 2004, Springer, 3-540-22666-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Jacobian coordinates, pipelining, Elliptic curve cryptosystems, scalar multiplication |
61 | Soonhak Kwon, Kris Gaj, Chang Hoon Kim, Chun Pyo Hong |
Efficient Linear Array for Multiplication in GF(2m) Using a Normal Basis for Elliptic Curve Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings, pp. 76-91, 2004, Springer, 3-540-22666-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
finite field, elliptic curve cryptography, Massey-Omura multiplier, Gaussian normal basis, critical path delay |
61 | Toru Akishita, Tsuyoshi Takagi |
Zero-Value Point Attacks on Elliptic Curve Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings, pp. 218-233, 2003, Springer, 3-540-20176-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
addition formula, zero-value register, side channel attack, differential power analysis, elliptic curve cryptosystem |
61 | Adnan Abdul-Aziz Gutub, Mohammad K. Ibrahim |
Power-time flexible architecture for GF(2k) elliptic curve cryptosystem computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: Proceedings of the 13th ACM Great Lakes Symposium on VLSI 2003, Washington, DC, USA, April 28-29, 2003, pp. 237-240, 2003, ACM, 1-58113-677-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
crypto-systems power-time tradeoff, projective coordinate arithmetic, parallel architecture, elliptic curve cryptography |
61 | Jean-Sébastien Coron |
Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings, pp. 292-302, 1999, Springer, 3-540-66646-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Elliptic curve, power consumption, Differential Power Analysis |
60 | Eric R. Verheul |
Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 17(4), pp. 277-296, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Decision Diffie-Hellman problem, Supersingular elliptic curves, Inverting MOV embedding, Tripartite Diffie-Hellman key exchange, Escrow, XTR |
60 | Marcus Bednara, M. Daldrup, Jürgen Teich, Joachim von zur Gathen, Jamshid Shokrollahi |
Tradeoff analysis of FPGA based elliptic curve cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (5) ![In: Proceedings of the 2002 International Symposium on Circuits and Systems, ISCAS 2002, Scottsdale, Arizona, USA, May 26-29, 2002, pp. 797-800, 2002, IEEE, 0-7803-7448-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
60 | Michael J. Wiener, Robert J. Zuccherato |
Faster Attacks on Elliptic Curve Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings, pp. 190-200, 1998, Springer, 3-540-65894-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
58 | Teo Chun Yew, Hailiza Kamarulhaili, Putra Sumari |
Message Recovery Signature Scheme Using Complementary Elliptic Curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GMAG ![In: 2003 International Conference on Geometric Modeling and Graphics, GMAG'03, London, England, July 16-18, 2003, pp. 106-110, 2003, IEEE Computer Society, 0-7695-1985-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Isomorphic Curves, Complementary Curves, Imbedding Plaintexts, Elliptic Curve Cryptosystems, Signature Scheme, Message Recovery |
58 | Don Johnson, Alfred Menezes, Scott A. Vanstone |
The Elliptic Curve Digital Signature Algorithm (ECDSA). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 1(1), pp. 36-63, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
58 | Toru Akishita |
Fast Simultaneous Scalar Multiplication on Elliptic Curve with Montgomery Form. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers, pp. 255-267, 2001, Springer, 3-540-43066-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
58 | Julio César López-Hernández, Ricardo Dahab |
Improved Algorithms for Elliptic Curve Arithmetic in GF(2n). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings, pp. 201-212, 1998, Springer, 3-540-65894-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
58 | Jorge Guajardo, Christof Paar |
Efficient Algorithms for Elliptic Curve Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, pp. 342-356, 1997, Springer, 3-540-63384-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
58 | N. Demytko |
A New Elliptic Curve Based Analogue of RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings, pp. 40-49, 1993, Springer, 3-540-57600-2. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
58 | Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone |
A Fast Elliptic Curve Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings, pp. 706-708, 1989, Springer, 3-540-53433-4. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
56 | Fanyu Kong, Daxing Li |
A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings, pp. 223-235, 2005, Springer, 3-540-30849-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
signed window algorithm, elliptic curve cryptosystems, point multiplication, signed-digit number representations |
56 | David R. Kohel |
The AGM-X0(N) Heegner Point Lifting Algorithm and Elliptic Curve Point Counting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings, pp. 124-136, 2003, Springer, 3-540-20592-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
modular curves, point counting, Elliptic curve cryptography |
56 | Hae Young Kim, Jung Youl Park, Jung Hee Cheon, Je Hong Park, Jae Heon Kim, Sang Geun Hahn |
Fast Elliptic Curve Point Counting Using Gaussian Normal Basis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANTS ![In: Algorithmic Number Theory, 5th International Symposium, ANTS-V, Sydney, Australia, July 7-12, 2002, Proceedings, pp. 292-307, 2002, Springer, 3-540-43863-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
order counting, elliptic curve, Gaussian normal basis |
54 | Douglas Stebila, Nicolas Thériault |
Unified Point Addition Formulæ and Side-Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings, pp. 354-368, 2006, Springer, 3-540-46559-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
unified point addition formulæ, projective coordinates, elliptic-curve cryptography, side-channel attacks |
54 | Pradeep Kumar Mishra |
Efficient Simultaneous Inversion in Parallel and Application to Point Multiplication in ECC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 324-335, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Montgomery ladder, simultaneous inversion, parallel algorithm, Elliptic Curve Cryptosystems, Scalar Multiplication |
54 | Nicolas Méloni, M. Anwar Hasan |
Elliptic Curve Scalar Multiplication Combining Yao's Algorithm and Double Bases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings, pp. 304-316, 2009, Springer, 978-3-642-04137-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Zeckendorf representation, point scalar multiplication, Yao’s algorithm, elliptic curve, Double-base number system |
53 | Loren D. Olson |
Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings, pp. 220-229, 2004, Springer, 3-540-22666-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
weighted projective curves, uniform addition formula, cryptography, ECC, side-channel attacks, Elliptic curves |
52 | Yasuyuki Sakai, Kouichi Sakurai |
Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 169-180, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
generalized Mersenne prime, unified code, elliptic curve cryptosystem, Side channel analysis, modular reduction |
52 | Tae-Jun Park, Mun-Kyu Lee, Kunsoo Park |
New Frobenius Expansions for Elliptic Curves with Efficient Endomorphisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers, pp. 264-282, 2002, Springer, 3-540-00716-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Endomorphism, Elliptic Curve Cryptosystem, Scalar Multiplication, Frobenius Expansion |
51 | Steven D. Galbraith, Florian Hess, Nigel P. Smart |
Extending the GHS Weil Descent Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings, pp. 29-44, 2002, Springer, 3-540-43553-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
51 | Markus Maurer, Alfred Menezes, Edlyn Teske |
Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings, pp. 195-213, 2001, Springer, 3-540-43010-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
51 | Abdulah Abdulah Zadeh |
High performance synchronized dual elliptic curve crypto-processor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: Proceedings of the 22nd Canadian Conference on Electrical and Computer Engineering, CCECE 2009, 3-6 May 2009, Delta St. John's Hotel and Conference Centre, St. John's, Newfoundland, Canada, pp. 962-965, 2009, IEEE, 978-1-4244-3508-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
51 | Chester Rebeiro, Debdeep Mukhopadhyay |
High Speed Compact Elliptic Curve Cryptoprocessor for FPGA Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, pp. 376-388, 2008, Springer, 978-3-540-89753-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
51 | Maurice Keller, William P. Marnane |
Low Power Elliptic Curve Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PATMOS ![In: Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation, 17th International Workshop, PATMOS 2007, Gothenburg, Sweden, September 3-5, 2007, Proceedings, pp. 310-319, 2007, Springer, 978-3-540-74441-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
51 | Biswajit Panja, Sanjay Kumar Madria |
An Energy and Communication Efficient Group Key in Sensor Networks Using Elliptic Curve Polynomial. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADHOC-NOW ![In: Ad-Hoc, Mobile, and Wireless Networks, 6th International Conference, ADHOC-NOW 2007, Morelia, Mexico, September 24-26, 2007, Proceeedings, pp. 153-171, 2007, Springer, 978-3-540-74822-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
51 | Huaqun Wang, Shuping Zhao, Guoxing Jiang |
Key management based on elliptic curve Paillier scheme in ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD (1) ![In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China, pp. 116-119, 2007, IEEE Computer Society, 0-7695-2909-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
51 | Seog Chung Seo, Hyung Chan Kim, Rudrapatna S. Ramakrishna |
A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 291-301, 2006, Springer, 3-540-36850-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
51 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers, pp. 767-777, 2006, Springer, 978-3-540-74376-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 2383 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|