The state of elliptic curve cryptography
Since the introduction of public-key cryptography by Diffie and Hellman in 1976, the
potential for the use of the discrete logarithm problem in public-key cryptosystems has been …
potential for the use of the discrete logarithm problem in public-key cryptosystems has been …
A review of techniques for implementing elliptic curve point multiplication on hardware
A Verri Lucca, GA Mariano Sborz… - Journal of Sensor and …, 2020 - mdpi.com
Cryptography is considered indispensable among security measures applied to data
concerning insecure means of transmission. Among various existent algorithms on …
concerning insecure means of transmission. Among various existent algorithms on …
[PDF][PDF] Reducing elliptic curve logarithms to logarithms in a finite field
A Menezes, S Vanstone, T Okamoto - … of the twenty-third annual ACM …, 1991 - dl.acm.org
Previously, no general-purpose algorithm was known for the elliptic curve logarithm problem
that ran in better than exponential time. In this paper we demonstrate the reduction of the …
that ran in better than exponential time. In this paper we demonstrate the reduction of the …
Secure and lightweight conditional privacy-preserving authentication for securing traffic emergency messages in VANETs
Owing to the development of wireless communication technology and the increasing
number of automobiles, vehicular ad hoc networks (VANETs) have become essential tools …
number of automobiles, vehicular ad hoc networks (VANETs) have become essential tools …
[图书][B] Elliptic curve public key cryptosystems
AJ Menezes - 1993 - books.google.com
Elliptic curves have been intensively studied in algebraic geometry and number theory. In
recent years they have been used in devising efficient algorithms for factoring integers and …
recent years they have been used in devising efficient algorithms for factoring integers and …
[图书][B] An introduction to cryptography
RA Mollin - 2006 - taylorfrancis.com
Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition provides
a solid foundation in cryptographic concepts that features all of the requisite background …
a solid foundation in cryptographic concepts that features all of the requisite background …
[PDF][PDF] The Secure Remote Password Protocol.
TD Wu - NDSS, 1998 - Citeseer
This paper presents a new password authentication and key-exchange protocol suitable for
authenticating users and exchanging keys over an untrusted network. The new protocol …
authenticating users and exchanging keys over an untrusted network. The new protocol …
[图书][B] Algebraic aspects of cryptography
N Koblitz - 2012 - books.google.com
This book is intended as a text for a course on cryptography with emphasis on algebraic
methods. It is written so as to be accessible to graduate or advanced undergraduate …
methods. It is written so as to be accessible to graduate or advanced undergraduate …
Fast Multiplication on Elliptic Curves Over GF(2m) without precomputation
This paper describes an algorithm for computing elliptic scalar multiplications on non-
supersingular elliptic curves defined over GF (2 m). The algorithm is an optimized version of …
supersingular elliptic curves defined over GF (2 m). The algorithm is an optimized version of …
[图书][B] Number theory for computing
SY Yan - 2013 - books.google.com
Modern cryptography depends heavily on number theory, with primality test ing, factoring,
discrete logarithms (indices), and elliptic curves being perhaps the most prominent subject …
discrete logarithms (indices), and elliptic curves being perhaps the most prominent subject …