Elliptic curve cryptography

D Hankerson, A Menezes - Encyclopedia of Cryptography, Security and …, 2021 - Springer
Background Elliptic curve cryptographic schemes were proposed independently in 1985 by
Neal Koblitz (Koblitz 1987) and Victor Miller (Miller 1986). They are the elliptic curve …

The elliptic curve digital signature algorithm (ECDSA)

D Johnson, A Menezes, S Vanstone - International journal of information …, 2001 - Springer
Abstract The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve
analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI …

Curve25519: new Diffie-Hellman speed records

DJ Bernstein - Public Key Cryptography-PKC 2006: 9th International …, 2006 - Springer
This paper explains the design and implementation of a high-security elliptic-curve-Diffie-
Hellman function achieving record-setting speeds: eg, 832457 Pentium III cycles (with …

A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography

DJ Malan, M Welsh, MD Smith - 2004 First Annual IEEE …, 2004 - ieeexplore.ieee.org
We present the first known implementation of elliptic curve cryptography over F/sub 2p/for
sensor networks based on the 8-bit, 7.3828-MHz MICA2 mote. Through instrumentation of …

Faster point multiplication on elliptic curves with efficient endomorphisms

RP Gallant, RJ Lambert, SA Vanstone - Annual International Cryptology …, 2001 - Springer
The fundamental operation in elliptic curve cryptographic schemes is the multiplication of an
elliptic curve point by an integer. This paper describes a new method for accelerating this …

MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations

A Moghimi, J Wichelmann, T Eisenbarth… - International Journal of …, 2019 - Springer
Cache attacks exploit memory access patterns of cryptographic implementations. Constant-
time implementation techniques have become an indispensable tool in fighting cache timing …

NTRUSIGN: Digital signatures using the NTRU lattice

J Hoffstein, N Howgrave-Graham, J Pipher… - Cryptographers' track at …, 2003 - Springer
In this paper we introduce NTRUSign, an ew family of signature schemes based on solving
the approximate closest vector problem (appr-CVP) in NTRU-type lattices. We explore the …

Implementing the Tate pairing

SD Galbraith, K Harrison, D Soldera - International Algorithmic Number …, 2002 - Springer
The Tate pairing has found several new applications in cryptography. This paper provides
methods to quickly compute the Tate pairing, and hence enables efficient implementation of …

Software implementation of the NIST elliptic curves over prime fields

M Brown, D Hankerson, J López, A Menezes - … , CA, USA, April 8–12, 2001 …, 2001 - Springer
This paper presents an extensive study of the software implementation on workstations of
the NIST-recommended elliptic curves over prime fields. We present the results of our …

Элементарное введение в эллиптическую криптографию

АА Болотов, СБ Гашков, АБ Фролов… - Протоколы …, 2006 - elibrary.ru
Настоящая книга посвящена перспективному направлению в области защиты
информации, математическую основу которого составляет теория эллиптических …