The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase elliptic curve cryptography (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1996-2000 (17) 2001-2002 (28) 2003 (24) 2004 (39) 2005 (39) 2006 (56) 2007 (54) 2008 (65) 2009 (56) 2010 (30) 2011 (33) 2012 (22) 2013 (34) 2014 (34) 2015 (40) 2016 (36) 2017 (35) 2018 (25) 2019 (10)
Publication types (Num. hits)
article(267) incollection(6) inproceedings(394) phdthesis(10)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 562 occurrences of 232 keywords

Results
Found 677 publication records. Showing 677 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
130Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Weil descent, fast performance, Finite fields, elliptic curve cryptography
115Souichi Okada, Naoya Torii, Kouichi Itoh, Masahiko Takenaka Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2m) on an FPGA. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF elliptic scalar multiplication over tex2html_wrap_inline100, IEEE P1363, Elliptic curve cryptography (ECC), multiplier, coprocessor, Koblitz curve
106Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart Preneel, Ingrid Verbauwhede Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks. Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF sensor networks, authentication, pervasive computing, Elliptic Curve Cryptography, key-distribution, hardware implementation
105Jun-Cheol Jeon, Kee-Young Yoo An Evolutionary Approach to the Design of Cellular Automata Architecture for Multiplication in Elliptic Curve Cryptography over Finite Fields. Search on Bibsonomy PRICAI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Evolutionary Computation, Cellular Automata, Finite Fields, Elliptic Curve Cryptography, Multiplication, Irreducible Polynomial
104Mathieu Ciet, Marc Joye (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
104Nils Gura, Hans Eberle, Sheueling Chang Shantz Generic implementations of elliptic curve cryptography using partial reduction. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2002 DBLP  DOI  BibTeX  RDF elliptic curve cryptography, modular reduction
99Stefan Tillich, Johann Großschädl A Simple Architectural Enhancement for Fast and Flexible Elliptic Curve Cryptography over Binary Finite Fields GF(2m). Search on Bibsonomy Asia-Pacific Computer Systems Architecture Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF application-specific instruction set extension, binary finite fields, SPARC V8, multiply step instruction, Elliptic curve cryptography
99Christophe Doche, Laurent Imbert Extended Double-Base Number System with Applications to Elliptic Curve Cryptography. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Elliptic curve cryptography, Double-base number system
99M. Ernst, Michael Jung 0002, Felix Madlener, Sorin A. Huss, Rainer Blümel A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2n). Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF $ mathbb {GF}(2^n)$ arithmetic, Karatsuba multiplication, VHDL model generator, coprocessor synthesis, FPGA hardware acceleration, Atmel FPSLIC platform, Elliptic Curve cryptography
97Christophe Doche, Thomas Icart, David R. Kohel Efficient Scalar Multiplication by Isogeny Decompositions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF fast arithmetic, efficiently computable isogenies, efficient tripling, ?-adic, Elliptic curve cryptography
96Kimmo U. Järvinen, Jorma Skyttä On Parallelization of High-Speed Processors for Elliptic Curve Cryptography. Search on Bibsonomy IEEE Trans. VLSI Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
94Maurice Keller, Andrew Byrne, William P. Marnane Elliptic Curve Cryptography on FPGA for Low-Power Applications. Search on Bibsonomy TRETS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF FPGA, low-power, Cryptography, elliptic curves
93Selçuk Baktir, Berk Sunar Finite Field Polynomial Multiplication in the Frequency Domain with Application to Elliptic Curve Cryptography. Search on Bibsonomy ISCIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF elliptic curve cryptography, DFT, Finite field multiplication
93Soonhak Kwon, Kris Gaj, Chang Hoon Kim, Chun Pyo Hong Efficient Linear Array for Multiplication in GF(2m) Using a Normal Basis for Elliptic Curve Cryptography. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF finite field, elliptic curve cryptography, Massey-Omura multiplier, Gaussian normal basis, critical path delay
87Apostolos P. Fournaris, Odysseas G. Koufopavlou Creating an Elliptic Curve arithmetic unit for use in elliptic curve cryptography. Search on Bibsonomy ETFA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
87Piotr Szczechowiak, Leonardo B. Oliveira, Michael Scott, Martin Collier, Ricardo Dahab NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks. Search on Bibsonomy EWSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Wireless Sensor Networks, implementation, Elliptic Curve Cryptography, pairings, cryptographic primitives
87Soonhak Kwon, Taekyoung Kwon 0002, Young-Ho Park 0001 New Architecture for Multiplication in GF(2m) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF linear multiplier, NIST recommended binary fields, elliptic curve cryptography
86Marcus Bednara, M. Daldrup, Jürgen Teich, Joachim von zur Gathen, Jamshid Shokrollahi Tradeoff analysis of FPGA based elliptic curve cryptography. Search on Bibsonomy ISCAS (5) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
81Sining Liu, Brian King, Wei Wang 0003 Hardware Organization to Achieve High-Speed Elliptic Curve Cryptography for Mobile Devices. Search on Bibsonomy MONET The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptographic hardware organization, elliptic curve cryptography, lookup table
79Douglas Stebila, Nicolas Thériault Unified Point Addition Formulæ and Side-Channel Attacks. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF unified point addition formulæ, projective coordinates, elliptic-curve cryptography, side-channel attacks
76Miguel Morales-Sandoval, Claudia Feregrino Uribe A Hardware Architecture for Elliptic Curve Cryptography and Lossless Data Compression. Search on Bibsonomy CONIELECOMP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
74Manuel Barbosa, Andrew Moss, Dan Page Constructive and Destructive Use of Compilers in Elliptic Curve Cryptography. Search on Bibsonomy J. Cryptology The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Compilers, Optimisation, Implementation, Elliptic curve cryptography (ECC), Specialisation
74Yuanling Hao, Shiwei Ma, Guanghua Chen, Xiaoli Zhang, Hui Chen, Weimin Zeng Optimization Algorithm for Scalar Multiplication in the Elliptic Curve Cryptography over Prime Field. Search on Bibsonomy ICIC (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF calar multiplication, Elliptic curve cryptography, Sliding-window, Non-adjacent form
74Christoph Puttmann, Jamshid Shokrollahi, Mario Porrmann Resource Efficiency of Instruction Set Extensions for Elliptic Curve Cryptography. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF binary field multiplication, elliptic curve cryptography, instruction set extension, resource efficiency
74David Jao, S. Ramesh Raju, Ramarathnam Venkatesan Digit Set Randomization in Elliptic Curve Cryptography. Search on Bibsonomy SAGA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF randomized representations, non-adjacent form representations, side channel attack countermeasures, elliptic curve cryptography
74Dong-Ho Lee, Jong-Soo Oh Multi-segment GF(2m) multiplication and its application to elliptic curve cryptography. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF elliptic curve scalar multiplication, FPGA, elliptic curve cryptography (ECC), coprocessor, finite field multiplication
74Sandro Bartolini, Cinzia Castagnini, Enrico Martinelli Inclusion of a Montgomery Multiplier Unit into an Embedded Processor's Datapath to Speed-up Elliptic Curve Cryptography. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security in embedded systems, special-purpose unit, performance evaluation, Elliptic-curve cryptography, instruction-set extensions
74Manuel Barbosa, Andrew Moss, Dan Page Compiler Assisted Elliptic Curve Cryptography. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Compilers, Optimisation, Implementation, Elliptic Curve Cryptography (ECC), Specialisation
74Lejla Batina, Nele Mentens, Bart Preneel, Ingrid Verbauwhede Side-channel aware design: Algorithms and Architectures for Elliptic Curve Cryptography over GF(2n). Search on Bibsonomy ASAP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Multiplication in GF(2^n), Systolic array architecture, Montgomery method for point multiplication, Elliptic Curve Cryptography (ECC), Hardware implementation
74Vipul Gupta, Douglas Stebila, Sheueling Chang Shantz Integrating elliptic curve cryptography into the web's security infrastructure. Search on Bibsonomy WWW (Alternate Track Papers & Posters) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF openSSL, elliptic curve cryptography, apache, mozilla
74Vipul Gupta, Sumit Gupta, Sheueling Chang Shantz, Douglas Stebila Performance analysis of elliptic curve cryptography for SSL. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2002 DBLP  DOI  BibTeX  RDF secure socket layer (SSL), wireless, elliptic curve cryptography (ECC), internet security
73Kazuo Sakiyama, Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede Reconfigurable Modular Arithmetic Logic Unit for High-Performance Public-Key Cryptosystems. Search on Bibsonomy ARC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RSA, Elliptic Curve Cryptography (ECC), Public-Key Cryptography (PKC), Reconfigurable architecture, FPGA implementation
70Irina Branovic, Roberto Giorgi, Enrico Martinelli A workload characterization of elliptic curve cryptography methods in embedded environments. Search on Bibsonomy SIGARCH Computer Architecture News The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
69Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede Superscalar Coprocessor for High-Speed Curve-Based Cryptography. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF curve-based cryptography, HECC, ECC, instruction-level parallelism, scalar multiplication, Superscalar, coprocessor
68David J. Malan, Matt Welsh, Michael D. Smith 0001 Implementing public-key infrastructure for sensor networks. Search on Bibsonomy TOSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ECDLP, MICA2, TinySec, sensor networks, ECC, elliptic curve cryptography, TinyOS, motes, Diffie-Hellman, DLP
68Harald Aigner, Holger Bock, Markus Hütter, Johannes Wolkerstorfer A Low-Cost ECC Coprocessor for Smartcards. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF multiplicative inverse, digital signature, Elliptic Curve Cryptography (ECC), hardware implementation
68Katsuyuki Okeya, Kouichi Sakurai Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF multi-scalar multiplication, Montgomery trick, elliptic curve cryptography, precomputation, simultaneous
67Johann Großschädl TinySA: a security architecture for wireless sensor networks. Search on Bibsonomy CoNEXT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
67Selçuk Baktir, Berk Sunar Optimal Extension Field Inversion in the Frequency Domain. Search on Bibsonomy WAIFI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF finite fields, Elliptic curve cryptography, discrete Fourier transform, inversion, number theoretic transform
67Soonhak Kwon, Taekyoung Kwon 0002, Young-Ho Park 0001 Efficient Linear Array for Multiplication over NIST Recommended Binary Fields. Search on Bibsonomy WILF The full citation details ... 2005 DBLP  DOI  BibTeX  RDF elliptic curve cryptography, VLSI architecture, linear array, NIST
67Colin D. Walter Issues of Security with the Oswald-Aigner Exponentiation Algorithm. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Addition-subtraction chains, randomized exponentiation, elliptic curve cryptography, ECC, DPA, blinding, power analysis, smartcard, SPA, DEMA, point multiplication, SEMA
67Bodo Möller Fractional Windows Revisited: Improved Signed-Digit Representations for Efficient Exponentiation. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF elliptic curve cryptography, Efficient implementations
67Wei Ming Lim, Mohammed Benaissa Design space exploration of a hardware-software co-designed GF(2m) galois field processor for forward error correction and cryptography. Search on Bibsonomy CODES+ISSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF GF(2m) arithmetic, forward error control coding, galois field processor, cryptography, advanced encryption standard, elliptic curve cryptography, design space exploration, Reed-Solomon code, hardware-software co-design, BCH code
67Julio López, Ricardo Dahab High-Speed Software Multiplication in F2m. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Multiplication in $ bbbf_{2^m}$, Elliptic Curve Cryptography, Polynomial Basis
65Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede High-performance Public-key Cryptoprocessor for Wireless Mobile Applications. Search on Bibsonomy MONET The full citation details ... 2007 DBLP  DOI  BibTeX  RDF parallel processing, elliptic curve cryptography(ECC), public-key cryptosystem, binary fields
65Kiyomichi Araki, Takakazu Satoh, Shinji Miura Overview of Elliptic Curve Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
64Steffen Peter, Peter Langendörfer, Krzysztof Piotrowski Flexible hardware reduction for elliptic curve cryptography in GF(2m). Search on Bibsonomy DATE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
64Sandro Bartolini, Irina Branovic, Roberto Giorgi, Enrico Martinelli A Performance Evaluation of ARM ISA Extension for Elliptic Curve Cryptography over Binary Finite Fields. Search on Bibsonomy SBAC-PAD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
63Steven D. Galbraith, Florian Hess, Nigel P. Smart Extending the GHS Weil Descent Attack. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
63Billy Bob Brumley Left-to-Right Signed-Bit tau-Adic Representations of n Integers (Short Paper). Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF joint sparse form, simultaneous elliptic scalar multiplication, digital signatures, elliptic curve cryptography, Koblitz curves
63Adam L. Young, Moti Yung A Space Efficient Backdoor in RSA and Its Applications. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Decision Diffie-Hellman, black-box ciphers, twist on elliptic curves, RSA, elliptic curve cryptography, tamper-resistance, Diffie-Hellman, Key recovery, SETUP
62Shay Gueron, Michael E. Kounavis A Technique for Accelerating Characteristic 2 Elliptic Curve Cryptography. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
62Alfred Menezes, Edlyn Teske, Annegret Weng Weak Fields for ECC. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
61Jean-Claude Bajard, Laurent Imbert, Thomas Plantard Modular Number Systems: Beyond the Mersenne Family. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Generalized Mersenne numbers, Elliptic curve cryptography, Montgomery multiplication
60Sameh M. Shohdy, Ashraf El-Sisi, Nabil A. Ismail FPGA Implementation of Elliptic Curve Point Multiplication over GF(2191). Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Karatsuba-Ofman multiplier, polynomial inversion, field programmable gate arrays, Elliptic curve cryptography, Galois field, polynomial multiplication
60Manuel Koschuch, Johann Großschädl, Udo Payer, Matthias Hudler, Michael Krüger Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Performance Evaluation, Network Security, Elliptic Curve Cryptography, Side-Channel Analysis, Efficient Implementation
60Johann Großschädl, Guy-Armand Kamendje Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF(p) and GF(2m). Search on Bibsonomy WISA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Multi-application smart cards, unified multiplier datapath, finite fields, elliptic curve cryptography, instruction set extensions
60Francesco Sica, Mathieu Ciet, Jean-Jacques Quisquater Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF fast performance, efficiently-computable endomorphisms, Elliptic curve cryptography, algebraic number fields
60Johann Großschädl A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m). Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF iterative modulo multiplication, polynomial basis representation, bit-serial multiplier architecture, smart card crypto-coprocessor, Elliptic curve cryptography, finite field arithmetic
60Murat Aydos, Tugrul Yanik, Çetin Kaya Koç An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF high-speed ECC-based wireless authentication, ARM microprocessor, elliptic curve digital signature algorithm, ARM7TDMI processor, core processor, 80 MHz, 160 bit, mobile computing, elliptic curve cryptography, public key cryptography, software libraries, software library, authorisation, microprocessor chips, message authentication, portable computers, ECDSA, 32 bit, wireless applications
60Ryuichi Harasawa, Junji Shikata, Joe Suzuki, Hideki Imai Comparing the MOV and FR Reductions in Elliptic Curve Cryptography. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
58Erik Dahmen, Katsuyuki Okeya, Daniel Schepers Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF affine coordinates, elliptic curve cryptosystem, scalar multiplication, precomputation
58Pierre E. Abi-Char, Abdallah Mhamed, Bachar El-Hassan A Secure Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptography. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
58Yongyi Wu, Xiaoyang Zeng A new dual-field elliptic curve cryptography processor. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
58Jean-Claude Bajard, Laurent Imbert, Christophe Nègre, Thomas Plantard Efficient Multiplication in GF(pk) for Elliptic Curve Cryptography. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
56Aditi Yoganand Athavale, Kuldip Singh, Sandeep K. Sood Design of a Private Credentials Scheme Based on Elliptic Curve Cryptography. Search on Bibsonomy CICSyN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Privacy, Elliptic Curve Cryptography, Credentials
56Neil Costigan, Peter Schwabe Fast Elliptic-Curve Cryptography on the Cell Broadband Engine. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF elliptic-curve cryptography (ECC), Cell Broadband Engine, efficient implementation
56Ralf Laue 0002, Sorin A. Huss Parallel Memory Architecture for Elliptic Curve Cryptography over GF(p) Aimed at Efficient FPGA Implementation. Search on Bibsonomy Signal Processing Systems The full citation details ... 2008 DBLP  DOI  BibTeX  RDF FPGA, parallelization, elliptic curve cryptography, memory architecture
56Neal Koblitz An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithm. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Supersingular, Nonadjacent Form, Digital Signature, Elliptic Curve
55David Kammler, Diandian Zhang, Peter Schwabe, Hanno Scharwächter, Markus Langenberg, Dominik Auras, Gerd Ascheid, Rudolf Mathar Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Barreto-Naehrig curves, elliptic-curve cryptography (ECC), design-space exploration, Application-specific instruction-set processor (ASIP), arithmetic, pairing-based cryptography
55Hamad Alrimeih, Daler N. Rakhmatov Security-Performance Trade-offs in Embedded Systems Using Flexible ECC Hardware. Search on Bibsonomy IEEE Design & Test of Computers The full citation details ... 2007 DBLP  DOI  BibTeX  RDF programmable hardware, elliptic-curve cryptography, scalar multiplication, modular arithmetic
55Colin D. Walter Simple Power Analysis of Unified Code for ECC Double and Add. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF unified code, elliptic curve cryptography, ECC, simple power analysis, SPA, Side channel leakage, Montgomery modular multiplication
55David R. Kohel The AGM-X0(N) Heegner Point Lifting Algorithm and Elliptic Curve Point Counting. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF modular curves, point counting, Elliptic curve cryptography
53Hans Eberle, Arvinderpal Wander, Nils Gura, Sheueling Chang Shantz, Vipul Gupta Architectural Extensions for Elliptic Curve Cryptography over GF(2m) on 8-bit Microprocessors. Search on Bibsonomy ASAP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Nils Gura, Sheueling Chang Shantz, Hans Eberle, Sumit Gupta, Vipul Gupta, Daniel Finchelstein, Edouard Goupy, Douglas Stebila An End-to-End Systems Approach to Elliptic Curve Cryptography. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
52Loren D. Olson Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF weighted projective curves, uniform addition formula, cryptography, ECC, side-channel attacks, Elliptic curves
52An Liu, Peng Ning TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. Search on Bibsonomy IPSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF TinyECC, ECC, public key cryptography, Wireless sensor network security
52Manuel Koschuch, Joachim Lechner, Andreas Weitzer, Johann Großschädl, Alexander Szekely, Stefan Tillich, Johannes Wolkerstorfer Hardware/Software Co-design of Elliptic Curve Cryptography on an 8051 Microcontroller. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
52Charikleia Zouridaki, Brian L. Mark, Kris Gaj, Roshan K. Thomas Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography. Search on Bibsonomy EuroPKI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
51Mun-Kyu Lee, Howon Kim, Dowon Hong, Kyoil Chung Efficient Exponentiation in GF(pm) Using the Frobenius Map. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptography, Finite Field, Elliptic Curve, Exponentiation, Optimal Extension Field
50William N. Chelton, Mohammed Benaissa Fast Elliptic Curve Cryptography on FPGA. Search on Bibsonomy IEEE Trans. VLSI Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
50Kimmo U. Järvinen, Jorma O. Skyttä High-Speed Elliptic Curve Cryptography Accelerator for Koblitz Curves. Search on Bibsonomy FCCM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
50Abdulah A. Zadeh High performance synchronized dual elliptic curve crypto-processor. Search on Bibsonomy CCECE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
50Biswajit Panja, Sanjay Kumar Madria An Energy and Communication Efficient Group Key in Sensor Networks Using Elliptic Curve Polynomial. Search on Bibsonomy ADHOC-NOW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
50Bodo Möller A Public-Key Encryption Scheme with Pseudo-random Ciphertexts. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
48Teo Chun Yew, Hailiza Kamarulhaili, Putra Sumari Message Recovery Signature Scheme Using Complementary Elliptic Curves. Search on Bibsonomy GMAG The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Isomorphic Curves, Complementary Curves, Imbedding Plaintexts, Elliptic Curve Cryptosystems, Signature Scheme, Message Recovery
48Chou Chen Yang, Hung-Wen Yang, Hui-Chuan Huang A robust and secure data transmission scheme based on identity-based cryptosystem for ad hoc networks. Search on Bibsonomy IWCMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF impersonate destination node attacks, packet forgery attacks, ad hoc networks, elliptic curve cryptography, hash chains, collision attacks, identity-based cryptosystem
48Santi Martínez, Magda Valls, Concepció Roig, Josep M. Miret, Francesc Giné A Secure Elliptic Curve-Based RFID Protocol. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RFID, elliptic curve cryptography, zero knowledge, forward security
48Ioannis G. Askoxylakis, Konstantinos Markantonakis, Theodore Tryfonas, John May, Apostolos Traganitis A Face Centered Cubic Key Agreement Mechanism for Mobile Ad Hoc Networks. Search on Bibsonomy MOBILIGHT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MANET security, face-centered cubic (FCC) structure, elliptic curve cryptography, password authentication
48Ernie Brickell, Liqun Chen, Jiangtao Li 0001 A New Direct Anonymous Attestation Scheme from Bilinear Maps. Search on Bibsonomy TRUST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF direct anonymous attestation, the Camenisch-Lysyanskaya signature scheme, elliptic curve cryptography, bilinear map, trusted platform module
48Selçuk Baktir, Sandeep S. Kumar, Christof Paar, Berk Sunar A State-of-the-art Elliptic Curve Cryptographic Processor Operating in the Frequency Domain. Search on Bibsonomy MONET The full citation details ... 2007 DBLP  DOI  BibTeX  RDF discrete Fourier domain, finite fields, elliptic curve cryptography (ECC), modular multiplication
48Marcio Juliato, Guido Araujo, Julio López, Ricardo Dahab A Custom Instruction Approach for Hardware and Software Implementations of Finite Field Arithmetic over F2163 using Gaussian Normal Bases. Search on Bibsonomy VLSI Signal Processing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Gaussian normal bases, processor specialization, elliptic curve cryptography, finite field arithmetic
48Maria-Dolores Cano, Ruben Toledo-Valera, Fernando Cerdán A Certification Authority for Elliptic Curve X.509v3 Certificates. Search on Bibsonomy ICNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, wireless communications, elliptic curve cryptography, digital certificates
48Jean-Claude Bajard, Laurent Imbert, Christophe Nègre Arithmetic Operations in Finite Fields of Medium Prime Characteristic Using the Lagrange Representation. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Newton interpolation, elliptic curve cryptography, Finite field arithmetic, Euclidean algorithm, optimal extension fields
48Selçuk Baktir, Berk Sunar Achieving efficient polynomial multiplication in fermat fields using the fast Fourier transform. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF fermat numbers, fermat transform, Fast Fourier Transform (FFT), finite fields, elliptic curve cryptography, coding theory, polynomial multiplication
48Xiaoyu Ruan, Rajendra S. Katti Left-to-Right Optimal Signed-Binary Representation of a Pair of Integers. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2005 DBLP  DOI  BibTeX  RDF elliptic scalar multiplication, recoding of integers, joint sparse form, elliptic curve cryptography, Public-key cryptography
48Daniel R. L. Brown, Robert P. Gallant, Scott A. Vanstone Provably Secure Implicit Certificate Schemes. Search on Bibsonomy Financial Cryptography The full citation details ... 2001 DBLP  BibTeX  RDF Implicit certificate, postal payment, authentication, provable security, elliptic curve cryptography
48Paulo S. L. M. Barreto, Hae Yong Kim Pitfalls in Public Key Watermarking. Search on Bibsonomy SIBGRAPI The full citation details ... 1999 DBLP  DOI  BibTeX  RDF digital signature, digital watermark, elliptic curve cryptography, image authentication
45Xiaojiang Du, Mohsen Guizani, Yang Xiao, Hsiao-Hwa Chen Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks. Search on Bibsonomy IEEE Trans. Wireless Communications The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
45Hyejung Kim, Yongsang Kim, Hoi-Jun Yoo A 6.3nJ/op low energy 160-bit modulo-multiplier for elliptic curve cryptography processor. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 677 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license