The state of elliptic curve cryptography
Since the introduction of public-key cryptography by Diffie and Hellman in 1976, the
potential for the use of the discrete logarithm problem in public-key cryptosystems has been …
potential for the use of the discrete logarithm problem in public-key cryptosystems has been …
Recent progress on the elliptic curve discrete logarithm problem
SD Galbraith, P Gaudry - Designs, Codes and Cryptography, 2016 - Springer
Recent progress on the elliptic curve discrete logarithm problem | SpringerLink Skip to main
content Advertisement SpringerLink Log in Menu Find a journal Publish with us Search Cart …
content Advertisement SpringerLink Log in Menu Find a journal Publish with us Search Cart …
[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process
G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang… - 2022 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …
publickey cryptographic algorithms through a public, competition-like process. The new …
The first collision for full SHA-1
SHA-1 is a widely used 1995 NIST cryptographic hash function standard that was officially
deprecated by NIST in 2011 due to fundamental security weaknesses demonstrated in …
deprecated by NIST in 2011 due to fundamental security weaknesses demonstrated in …
M-SIDH and MD-SIDH: countering SIDH attacks by masking information
The SIDH protocol is an isogeny-based key exchange protocol using supersingular
isogenies, designed by Jao and De Feo in 2011. The protocol underlies the SIKE algorithm …
isogenies, designed by Jao and De Feo in 2011. The protocol underlies the SIKE algorithm …
Quantum resource estimates for computing elliptic curve discrete logarithms
We give precise quantum resource estimates for Shor's algorithm to compute discrete
logarithms on elliptic curves over prime fields. The estimates are derived from a simulation of …
logarithms on elliptic curves over prime fields. The estimates are derived from a simulation of …
[图书][B] Introduction to modern cryptography: principles and protocols
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …
The elliptic curve digital signature algorithm (ECDSA)
D Johnson, A Menezes, S Vanstone - International journal of information …, 2001 - Springer
Abstract The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve
analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI …
analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI …
Scalable zero knowledge via cycles of elliptic curves
Non-interactive zero-knowledge proofs of knowledge for general NP statements are a
powerful cryptographic primitive, both in theory and in practical applications. Recently, much …
powerful cryptographic primitive, both in theory and in practical applications. Recently, much …
Curve25519: new Diffie-Hellman speed records
DJ Bernstein - Public Key Cryptography-PKC 2006: 9th International …, 2006 - Springer
This paper explains the design and implementation of a high-security elliptic-curve-Diffie-
Hellman function achieving record-setting speeds: eg, 832457 Pentium III cycles (with …
Hellman function achieving record-setting speeds: eg, 832457 Pentium III cycles (with …