Performance analysis and comparison of different elliptic curves on smart cards

P Dzurenda, S Ricci, J Hajny… - 2017 15th Annual …, 2017 - ieeexplore.ieee.org
Elliptic curves are very often used in the cryptographic protocol design due to their memory
efficiency and useful features, such as the bilinear pairing support. However, in many …

Requirements for standard elliptic curves

M Lochter, J Merkle, JM Schmidt… - Cryptology ePrint Archive, 2014 - eprint.iacr.org
Abstract Currently, the Internet Research Task Force (IRTF) discusses requirements for new
elliptic curves to be standardized in TLS and other internet protocols. This position paper …

[PDF][PDF] An algorithm to select a secure twisted elliptic curve in cryptography

DT Thanh, NQ Toan, N Van Son… - Journal of Science …, 2022 - pdfs.semanticscholar.org
Fault attack is a powerful adjacency channel attack technique to break cryptographic
schemes. On elliptic curve cryptography (ECC), fault attacks can be divided into three types …

On cryptographic weaknesses related to elliptic curves

V Sedláček - 2022 - dspace.unive.it
Thissis esplora la sicurezza dei sistemi crittografici relativi alle curve ellittiche da varie
angolazioni. Discutiamo di un modo per sfruttare uno speciale metodo di fattorizzazione …

[PDF][PDF] Accelerating pre-and post-quantum cryptography

T Chou - 2016 - research.tue.nl
Cryptography is the art of securing communication. The security comes with costs, however.
There are computation costs for cryptographic operations such as encryption, decryption …

[PDF][PDF] Analysis of standard elliptic curves

MV Suchánek - is.muni.cz
Elliptic curve cryptography has repeatedly proven to be an essential part of the
cryptographic ecosystem. Whether we are considering classical ECC or pairing-based …