Elliptic curve cryptography
D Hankerson, A Menezes - Encyclopedia of Cryptography, Security and …, 2021 - Springer
Background Elliptic curve cryptographic schemes were proposed independently in 1985 by
Neal Koblitz (Koblitz 1987) and Victor Miller (Miller 1986). They are the elliptic curve …
Neal Koblitz (Koblitz 1987) and Victor Miller (Miller 1986). They are the elliptic curve …
The elliptic curve digital signature algorithm (ECDSA)
D Johnson, A Menezes, S Vanstone - International journal of information …, 2001 - Springer
Abstract The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve
analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI …
analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI …
Curve25519: new Diffie-Hellman speed records
DJ Bernstein - Public Key Cryptography-PKC 2006: 9th International …, 2006 - Springer
This paper explains the design and implementation of a high-security elliptic-curve-Diffie-
Hellman function achieving record-setting speeds: eg, 832457 Pentium III cycles (with …
Hellman function achieving record-setting speeds: eg, 832457 Pentium III cycles (with …
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
We present the first known implementation of elliptic curve cryptography over F/sub 2p/for
sensor networks based on the 8-bit, 7.3828-MHz MICA2 mote. Through instrumentation of …
sensor networks based on the 8-bit, 7.3828-MHz MICA2 mote. Through instrumentation of …
Faster point multiplication on elliptic curves with efficient endomorphisms
RP Gallant, RJ Lambert, SA Vanstone - Annual International Cryptology …, 2001 - Springer
The fundamental operation in elliptic curve cryptographic schemes is the multiplication of an
elliptic curve point by an integer. This paper describes a new method for accelerating this …
elliptic curve point by an integer. This paper describes a new method for accelerating this …
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations
Cache attacks exploit memory access patterns of cryptographic implementations. Constant-
time implementation techniques have become an indispensable tool in fighting cache timing …
time implementation techniques have become an indispensable tool in fighting cache timing …
NTRUSIGN: Digital signatures using the NTRU lattice
In this paper we introduce NTRUSign, an ew family of signature schemes based on solving
the approximate closest vector problem (appr-CVP) in NTRU-type lattices. We explore the …
the approximate closest vector problem (appr-CVP) in NTRU-type lattices. We explore the …
Implementing the Tate pairing
SD Galbraith, K Harrison, D Soldera - International Algorithmic Number …, 2002 - Springer
The Tate pairing has found several new applications in cryptography. This paper provides
methods to quickly compute the Tate pairing, and hence enables efficient implementation of …
methods to quickly compute the Tate pairing, and hence enables efficient implementation of …
Software implementation of the NIST elliptic curves over prime fields
This paper presents an extensive study of the software implementation on workstations of
the NIST-recommended elliptic curves over prime fields. We present the results of our …
the NIST-recommended elliptic curves over prime fields. We present the results of our …
Элементарное введение в эллиптическую криптографию
АА Болотов, СБ Гашков, АБ Фролов… - Протоколы …, 2006 - elibrary.ru
Настоящая книга посвящена перспективному направлению в области защиты
информации, математическую основу которого составляет теория эллиптических …
информации, математическую основу которого составляет теория эллиптических …