The state of elliptic curve cryptography

N Koblitz, A Menezes, S Vanstone - Designs, codes and cryptography, 2000 - Springer
Since the introduction of public-key cryptography by Diffie and Hellman in 1976, the
potential for the use of the discrete logarithm problem in public-key cryptosystems has been …

Recent progress on the elliptic curve discrete logarithm problem

SD Galbraith, P Gaudry - Designs, Codes and Cryptography, 2016 - Springer
Recent progress on the elliptic curve discrete logarithm problem | SpringerLink Skip to main
content Advertisement SpringerLink Log in Menu Find a journal Publish with us Search Cart …

[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process

G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang… - 2022 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …

The first collision for full SHA-1

M Stevens, E Bursztein, P Karpman, A Albertini… - Advances in Cryptology …, 2017 - Springer
SHA-1 is a widely used 1995 NIST cryptographic hash function standard that was officially
deprecated by NIST in 2011 due to fundamental security weaknesses demonstrated in …

M-SIDH and MD-SIDH: countering SIDH attacks by masking information

TB Fouotsa, T Moriya, C Petit - … on the Theory and Applications of …, 2023 - Springer
The SIDH protocol is an isogeny-based key exchange protocol using supersingular
isogenies, designed by Jao and De Feo in 2011. The protocol underlies the SIKE algorithm …

Quantum resource estimates for computing elliptic curve discrete logarithms

M Roetteler, M Naehrig, KM Svore, K Lauter - Advances in Cryptology …, 2017 - Springer
We give precise quantum resource estimates for Shor's algorithm to compute discrete
logarithms on elliptic curves over prime fields. The estimates are derived from a simulation of …

[图书][B] Introduction to modern cryptography: principles and protocols

J Katz, Y Lindell - 2007 - taylorfrancis.com
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …

The elliptic curve digital signature algorithm (ECDSA)

D Johnson, A Menezes, S Vanstone - International journal of information …, 2001 - Springer
Abstract The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve
analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI …

Scalable zero knowledge via cycles of elliptic curves

E Ben-Sasson, A Chiesa, E Tromer, M Virza - Algorithmica, 2017 - Springer
Non-interactive zero-knowledge proofs of knowledge for general NP statements are a
powerful cryptographic primitive, both in theory and in practical applications. Recently, much …

Curve25519: new Diffie-Hellman speed records

DJ Bernstein - Public Key Cryptography-PKC 2006: 9th International …, 2006 - Springer
This paper explains the design and implementation of a high-security elliptic-curve-Diffie-
Hellman function achieving record-setting speeds: eg, 832457 Pentium III cycles (with …