Elliptic-curve cryptography

Results: 465



#Item
201Public-key cryptography / Adaptive chosen-ciphertext attack / Elliptic curve cryptography / Diffie–Hellman problem / Advantage / Chosen-ciphertext attack / Cipher / Key encapsulation / Elliptic curve Diffie–Hellman / Cryptography / Finite fields / Ciphertext indistinguishability

Appears in P. Samarati, P. Ryan, D. Gollmann, R. Molva (Eds.): Computer Security – ESORICS 2004, Springer-Verlag LNCS 3193, pp. 335–351, ISBNA Public-Key Encryption Scheme with Pseudo-Random Ciphertex

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:25:23
202Algebraic curves / Cryptography / Hyperelliptic curve / Elliptic curve / Covering space / Abelian variety / Ample line bundle / Abstract algebra / Algebraic geometry / Topology

Classification of Elliptic/hyperelliptic Curves with Weak Coverings against GHS Attack without Isogeny Condition Tsutomu Iijima ∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-11-21 23:49:35
203Analytic number theory / Algebra / Elliptic curve / Group theory / Hyperelliptic curve / Curry–Howard correspondence / Ordinal number / Hyperelliptic curve cryptography / Imaginary hyperelliptic curve / Abstract algebra / Algebraic curves / Mathematics

ISOMORPHISM CLASSES OF HYPERELLIPTIC CURVES OF GENUS 3 OVER FINITE FIELDS EUNKYUNG JEONG DEPARTMENT OF MATHEMATICS POHANG UNIVERSITY OF SCIENCE AND TECHNOLOGY POHANG, 790–784, KOREA

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-30 23:34:48
204Elliptic curves / Finite fields / Elliptic curve cryptography / Elliptic curve / Multiplication / XTR / Matrix / Scalar / Hessian form of an elliptic curve / Abstract algebra / Mathematics / Algebra

Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves Extended Version? Franck Rondepierre Oberthur Technologies, Crypto Group 420, rue Estienne d’Orves, Colombes, France

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-30 11:35:26
205Elliptic curves / Twisted Edwards curve / Elliptic curve / Montgomery curve / Edwards curve / Hyperelliptic curve cryptography / Curve / Elliptic Curve DSA / Table of costs of operations in elliptic curves / Cryptography / Elliptic curve cryptography / Abstract algebra

Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes Dalin Chu Johann Großschädl

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-03-25 20:03:52
206Finite fields / Multiplication / Elliptic curve point multiplication / Group theory / Elliptic curve cryptography / Elliptic curve / Hessian form of an elliptic curve / Abstract algebra / Mathematics / Elliptic curves

Main text appears in A. H. Chan, V. Gligor (Eds.): Information Security – ISC 2002, Springer-Verlag LNCS 2433, pp. 402–413, ISBNNotes addedParallelizable Elliptic Curve Point Multiplicati

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:24:21
207Numerical software / Elliptic curve cryptography / Elliptic curves

Double-and-Add with Relative Jacobian Coordinates Björn Fay December 20, 2014 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-20 14:49:05
208Elliptic curves / Finite fields / Analytic number theory / Elliptic curve / Group theory / Edwards curve / Inversive geometry / Hessian form of an elliptic curve / Jacobian curve / Abstract algebra / Cryptography / Elliptic curve cryptography

Novel Precomputation Schemes for Elliptic Curve Cryptosystems Patrick Longa, and Catherine Gebotys Department of Electrical and Computer Engineering University of Waterloo, Canada {plonga, cgebotys}@uwaterloo.ca

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-01-08 14:48:27
209Finite fields / Group theory / Cryptography / Elliptic curve / Edwards curve / Abstract algebra / Elliptic curve cryptography / Elliptic curves

Fault Attack against Miller’s algorithm Nadia EL MRABET LIASD, University Paris 8, 2, rue de la libert´e, 93256 St Denis, France

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-29 05:52:48
210Elliptic curve cryptography / Twisted Edwards curve / Vehicle Identification Number

A version of this paper appears in Advances in Cryptology - ASIACRYPT 2008, LNCS Vol. 5350, pp. 326–343. J. Pieprzyk ed., Springer-Verlag, 2008. Twisted Edwards Curves Revisited Huseyin Hisil, Kenneth Koon-Ho Wong, Gar

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-14 12:25:46
UPDATE