Performance analysis and comparison of different elliptic curves on smart cards
Elliptic curves are very often used in the cryptographic protocol design due to their memory
efficiency and useful features, such as the bilinear pairing support. However, in many …
efficiency and useful features, such as the bilinear pairing support. However, in many …
Requirements for standard elliptic curves
M Lochter, J Merkle, JM Schmidt… - Cryptology ePrint Archive, 2014 - eprint.iacr.org
Abstract Currently, the Internet Research Task Force (IRTF) discusses requirements for new
elliptic curves to be standardized in TLS and other internet protocols. This position paper …
elliptic curves to be standardized in TLS and other internet protocols. This position paper …
[PDF][PDF] An algorithm to select a secure twisted elliptic curve in cryptography
DT Thanh, NQ Toan, N Van Son… - Journal of Science …, 2022 - pdfs.semanticscholar.org
Fault attack is a powerful adjacency channel attack technique to break cryptographic
schemes. On elliptic curve cryptography (ECC), fault attacks can be divided into three types …
schemes. On elliptic curve cryptography (ECC), fault attacks can be divided into three types …
On cryptographic weaknesses related to elliptic curves
V Sedláček - 2022 - dspace.unive.it
Thissis esplora la sicurezza dei sistemi crittografici relativi alle curve ellittiche da varie
angolazioni. Discutiamo di un modo per sfruttare uno speciale metodo di fattorizzazione …
angolazioni. Discutiamo di un modo per sfruttare uno speciale metodo di fattorizzazione …
[PDF][PDF] Accelerating pre-and post-quantum cryptography
T Chou - 2016 - research.tue.nl
Cryptography is the art of securing communication. The security comes with costs, however.
There are computation costs for cryptographic operations such as encryption, decryption …
There are computation costs for cryptographic operations such as encryption, decryption …
[PDF][PDF] Analysis of standard elliptic curves
MV Suchánek - is.muni.cz
Elliptic curve cryptography has repeatedly proven to be an essential part of the
cryptographic ecosystem. Whether we are considering classical ECC or pairing-based …
cryptographic ecosystem. Whether we are considering classical ECC or pairing-based …