The state of elliptic curve cryptography

N Koblitz, A Menezes, S Vanstone - Designs, codes and cryptography, 2000 - Springer
Since the introduction of public-key cryptography by Diffie and Hellman in 1976, the
potential for the use of the discrete logarithm problem in public-key cryptosystems has been …

A review of techniques for implementing elliptic curve point multiplication on hardware

A Verri Lucca, GA Mariano Sborz… - Journal of Sensor and …, 2020 - mdpi.com
Cryptography is considered indispensable among security measures applied to data
concerning insecure means of transmission. Among various existent algorithms on …

[PDF][PDF] Reducing elliptic curve logarithms to logarithms in a finite field

A Menezes, S Vanstone, T Okamoto - … of the twenty-third annual ACM …, 1991 - dl.acm.org
Previously, no general-purpose algorithm was known for the elliptic curve logarithm problem
that ran in better than exponential time. In this paper we demonstrate the reduction of the …

Secure and lightweight conditional privacy-preserving authentication for securing traffic emergency messages in VANETs

L Wei, J Cui, Y Xu, J Cheng… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Owing to the development of wireless communication technology and the increasing
number of automobiles, vehicular ad hoc networks (VANETs) have become essential tools …

[图书][B] Elliptic curve public key cryptosystems

AJ Menezes - 1993 - books.google.com
Elliptic curves have been intensively studied in algebraic geometry and number theory. In
recent years they have been used in devising efficient algorithms for factoring integers and …

[图书][B] An introduction to cryptography

RA Mollin - 2006 - taylorfrancis.com
Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition provides
a solid foundation in cryptographic concepts that features all of the requisite background …

[PDF][PDF] The Secure Remote Password Protocol.

TD Wu - NDSS, 1998 - Citeseer
This paper presents a new password authentication and key-exchange protocol suitable for
authenticating users and exchanging keys over an untrusted network. The new protocol …

[图书][B] Algebraic aspects of cryptography

N Koblitz - 2012 - books.google.com
This book is intended as a text for a course on cryptography with emphasis on algebraic
methods. It is written so as to be accessible to graduate or advanced undergraduate …

Fast Multiplication on Elliptic Curves Over GF(2m) without precomputation

J López, R Dahab - … on Cryptographic Hardware and Embedded Systems, 1999 - Springer
This paper describes an algorithm for computing elliptic scalar multiplications on non-
supersingular elliptic curves defined over GF (2 m). The algorithm is an optimized version of …

[图书][B] Number theory for computing

SY Yan - 2013 - books.google.com
Modern cryptography depends heavily on number theory, with primality test ing, factoring,
discrete logarithms (indices), and elliptic curves being perhaps the most prominent subject …