The state of elliptic curve cryptography

N Koblitz, A Menezes, S Vanstone - Designs, codes and cryptography, 2000 - Springer
… of elliptic curve cryptosystems from … elliptic curve doublings and 80 elliptic curve additions.
From the addition formula for non-supersingular curves (see §2), we see that an elliptic curve

Elliptic curve cryptography

D Hankerson, A Menezes - … of Cryptography, Security and Privacy, 2021 - Springer
Elliptic curve cryptographic schemes … elliptic curve analogues of schemes based on the
discrete logarithm problem where the underlying group is the group of points on an elliptic curve

Elliptic curve cryptography in practice

JW Bos, JA Halderman, N Heninger, J Moore… - Financial Cryptography …, 2014 - Springer
… we perform a review of elliptic curve cryptography (ECC) as it … of this type of public-key
cryptography: Bitcoin, secure shell (… similar to those that plague previous cryptographic systems. …

Elliptic curve cryptography and its applications

M Amara, A Siad - … workshop on systems, signal processing and …, 2011 - ieeexplore.ieee.org
elliptic curve in cryptography is given in section 2. We present in Section 3, mathematical
background on elliptic curve … in Section 4, and Elliptic Curve applications are presented in Sec…

[PDF][PDF] Elliptic curve cryptography

V Kapoor, VS Abraham, R Singh - Ubiquity, 2008 - dl.acm.org
… The crucial property of an elliptic curve is that we can define a rule for adding two points
which are on the curve, to obtain a third point which is also on the curve. This addition rule …

[图书][B] Advances in elliptic curve cryptography

IF Blake, G Seroussi, NP Smart - 2005 - books.google.com
… various cryptographic protocols in which elliptic curves are … [ECC] and focus on their
cryptographic properties. We shall only … of cryptographic protocols, and elliptic curve protocols in …

Elliptic curve cryptography engineering

A Cilardo, L Coppolino, N Mazzocca… - Proceedings of the …, 2006 - ieeexplore.ieee.org
… As an introductory example of a cryptographic scheme based on the elliptic curve, we
describe the EC Diffie– Hellman scheme used for key agreement. It is by far the simplest and the …

A critical review on elliptic curve cryptography

SR Singh, AK Khan, TS Singh - 2016 International Conference …, 2016 - ieeexplore.ieee.org
… The basics of elliptic curves and their arithmetic are discussed … elliptic curve cryptography
over RSA in public cryptosystems. … of elliptic curves, the group laws of elliptic curves and elliptic

PKI, elliptic curve cryptography, and digital signatures

WJ Caelli, EP Dawson, SA Rea - Computers & Security, 1999 - Elsevier
… of public key infrastructure, elliptic curve cryptography and digital signatures.The main theme
is a simple one in that the emerging techniques of elliptic curve cryptography ( ECC or EC2 …

A review on elliptic curve cryptography for embedded systems

R Afreen, SC Mehrotra - arXiv preprint arXiv:1107.3631, 2011 - arxiv.org
… Importance of Elliptic Curves in Cryptography was independently proposed by Neal Koblitz
… , Elliptic curve cryptography or ECC has evolved as a vast field for public key cryptography (…