Elliptic-curve cryptography

Results: 465



#Item
211Elliptic curves / Cryptography / Differential geometry / Supersingular elliptic curve / Pairing / Differential geometry of curves / Weil pairing / Elliptic divisibility sequence / Abstract algebra / Algebra / Mathematics

Efficient Pairing Computation on Supersingular Abelian Varieties 3 ´ hEigeartaigh ´ Paulo S. L. M. Barreto1 , Steven Galbraith2 , Colm O

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-09-05 10:29:55
212Group theory / Algebraic curves / Hyperelliptic curve cryptography / Public-key cryptography / Hyperelliptic curve / Elliptic curve / XTR / Discrete logarithm / RAR / Abstract algebra / Finite fields / Cryptography

Efficient Implementation of Genus Three Hyperelliptic Curve Cryptography over F2n Izuru Kitamura and Masanobu Katagi Sony Corporation, Kitashinagawa Shinagawa-ku, Tokyo, Japan {Izuru.Kitamura, Masanobu.Ka

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-28 08:21:17
213Elliptic curves / Algebraic curves / Elliptic curve cryptography / Group theory / Analytic number theory / Division polynomials / Elliptic curve / Hessian form of an elliptic curve / Curve / Abstract algebra / Geometry / Algebraic geometry

Divison Polynomials for Alternate Models of Elliptic Curves Dustin Moody ∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-10 11:14:29
214Elliptic curve / Numerical software / COMPASS/Sample Code / Mathematics / Cryptography / Elliptic curve cryptography

Trading Inversions for Multiplications in Elliptic Curve Cryptography Mathieu Ciet∗ () Gemplus S.A., Card Security Group, La Vigie, Avenue du Jujubier, ZI Ath´elia IV, 13705 La Ciotat Cedex, Fr

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-06-16 20:04:31
215Elliptic curve cryptography / Reconfigurable computing / Power analysis / Side channel attack / Multiplication / Field-programmable gate array / Advanced Encryption Standard / Elliptic curve point multiplication / Xilinx / Cryptography / Mathematics / Espionage

Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks Zoya Dyka, Thomas Basmer, Christian Wittke and Peter Langendoerfer System dept., IHP Frankfurt(Oder), Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-08 10:18:14
216Computer arithmetic / Finite fields / Group theory / Binary arithmetic / Cryptography / Elliptic curve cryptography / Arbitrary-precision arithmetic / Modular arithmetic / XTR / Abstract algebra / Mathematics / Arithmetic

Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices Johann Großsch¨adl1 , Dan Page2 , and Stefan Tillich2 1 University of Luxembourg, CSC Research Unit, LACS,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-08-28 16:24:04
217Finite fields / Group theory / Cryptography / Twisted Edwards curve / Elliptic curve / Edwards curve / Elliptic Curve DSA / Complex multiplication / Matrix / Abstract algebra / Elliptic curves / Elliptic curve cryptography

VLSI Implementation of Double-Base Scalar Multiplication on a Twisted Edwards Curve with an Efficiently Computable Endomorphism Zhe Liu1 , Husen Wang2 , Johann Großsch¨adl1 , Zhi Hu3 , and Ingrid Verbauwhede1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-04 12:51:01
218Mechanical computers / Elliptic curves / Elliptic curve cryptography / Finite fields / Z2 / Z3 / Z1 / Elliptic curve point multiplication / Lookup table / Abstract algebra / History of computing hardware / Computing

On the Implementation of Unified Arithmetic on Binary Huff Curves Santosh Ghosh1⋆ , Amit Kumar2⋆⋆ , Amitabh Das3 , and Ingrid Verbauwhede3 1 Security and Privacy Research, Intel Labs

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-12 13:10:28
219Hashing / Artificial intelligence / Information retrieval / Hash function / Hash table / MD5 / Collision / Provably secure cryptographic hash function / Elliptic curve only hash / Cryptographic hash functions / Cryptography / Search algorithms

Time-memory Trade-offs for Near-collisions Gaëtan Leurent UCL Crypto Group Abstract. In this work we consider generic algorithms to find near-collisions for a hash

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-31 14:07:22
220Mathematics / Cryptography / Advantage / Elliptic curve cryptography

Microsoft Word - Efficient and provably-secure certificateless signature scheme without bilinear pairings.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-02-27 09:37:29
UPDATE