The state of elliptic curve cryptography

N Koblitz, A Menezes, S Vanstone - Designs, codes and cryptography, 2000 - Springer
Since the introduction of public-key cryptography by Diffie and Hellman in 1976, the
potential for the use of the discrete logarithm problem in public-key cryptosystems has been …

[引用][C] Mathematical Constants

SR Finch - Encyclopedia of Mathematics and Its Applica-tions, 2003 - books.google.com
Steven Finch provides 136 essays, each devoted to a mathematical constant or a class of
constants, from the well known to the highly exotic. This book is helpful both to readers …

[图书][B] Introduction to cryptography

H Delfs, H Knebl, H Knebl - 2002 - Springer
VI Preface methods from information theory. Unconditionally secure schemes are now
addressed in an extra chapter, Chapter 10.• Unconditional security is not achievable without …

Elliptic curves and primality proving

AOL Atkin, F Morain - Mathematics of computation, 1993 - ams.org
ELLIPTIC CURVES AND PRIMALITY PROVING 1. Introduction Primality testing is one of the
most flourishing fields in computational n Page 1 mathematics of computation volume 61 …

Hyperelliptic cryptosystems

N Koblitz - Journal of cryptology, 1989 - Springer
In this paper we discuss a source of finite abelian groups suitable for cryptosystems based
on the presumed intractability of the discrete logarithm problem for these groups. They are …

[图书][B] Algebraic aspects of cryptography

N Koblitz - 2012 - books.google.com
This book is intended as a text for a course on cryptography with emphasis on algebraic
methods. It is written so as to be accessible to graduate or advanced undergraduate …

Fast generation of prime numbers and secure public-key cryptographic parameters

UM Maurer - Journal of Cryptology, 1995 - Springer
A very efficient recursive algorithm for generating nearly random provable primes is
presented. The expected time for generating a prime is only slightly greater than the …

Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve

K Okeya, K Sakurai - … Hardware and Embedded Systems—CHES 2001 …, 2001 - Springer
We present a scalar multiplication algorithm with recovery of the y-coordinate on a
Montgomery form elliptic curve over any non-binary field. The previous algorithms for scalar …

Speeding up the discrete log computation on curves with automorphisms

I Duursma, P Gaudry, F Morain - … on the Theory and Application of …, 1999 - Springer
LNCS 1716 - Speeding up the Discrete Log Computation on Curves with Automorphisms Page
1 Speeding up the Discrete Log Computation on Curves with Automorphisms I. Duursma1, P …

A family of jacobians suitable for discrete log cryptosystems

N Koblitz - Advances in Cryptology—CRYPTO'88: Proceedings 8, 1990 - Springer
A Family of Jacobians Suitable for Discrete Log Cryptosystems Abstract. Page 1 A Family of
Jacobians Suitable for Discrete Log Cryptosystems Xeal Koblitz, Dept. of Mathematics GN-50 …