Hessian form of an elliptic curve

Results: 17



#Item
1Twisted Hessian curves Daniel J. Bernstein1,2 , Chitchanok Chuengsatiansup1 , David Kohel3 , and Tanja Lange1 1  Department of Mathematics and Computer Science

Twisted Hessian curves Daniel J. Bernstein1,2 , Chitchanok Chuengsatiansup1 , David Kohel3 , and Tanja Lange1 1 Department of Mathematics and Computer Science

Add to Reading List

Source URL: iml.univ-mrs.fr

Language: English - Date: 2015-09-01 15:57:48
2Countermeasures against side-channel attacks for EC cryptosystems  1 Countermeasures against Side-Channel Attacks for Elliptic Curve Cryptosystems*

Countermeasures against side-channel attacks for EC cryptosystems 1 Countermeasures against Side-Channel Attacks for Elliptic Curve Cryptosystems*

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2001-11-23 07:00:41
3Fast hashing to G2 on pairing friendly curves Michael Scott, Naomi Benger, Manuel Charlemagne, Luis J. Dominguez Perez, and Ezekiel J. Kachisa School of Computing Dublin City University Ballymun, Dublin 9, Ireland.

Fast hashing to G2 on pairing friendly curves Michael Scott, Naomi Benger, Manuel Charlemagne, Luis J. Dominguez Perez, and Ezekiel J. Kachisa School of Computing Dublin City University Ballymun, Dublin 9, Ireland.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-18 11:36:28
4Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves Extended Version? Franck Rondepierre Oberthur Technologies, Crypto Group 420, rue Estienne d’Orves, Colombes, France

Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves Extended Version? Franck Rondepierre Oberthur Technologies, Crypto Group 420, rue Estienne d’Orves, Colombes, France

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-30 11:35:26
5Main text appears in A. H. Chan, V. Gligor (Eds.): Information Security – ISC 2002, Springer-Verlag LNCS 2433, pp. 402–413, ISBNNotes addedParallelizable Elliptic Curve Point Multiplicati

Main text appears in A. H. Chan, V. Gligor (Eds.): Information Security – ISC 2002, Springer-Verlag LNCS 2433, pp. 402–413, ISBNNotes addedParallelizable Elliptic Curve Point Multiplicati

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:24:21
6Novel Precomputation Schemes for Elliptic Curve Cryptosystems Patrick Longa, and Catherine Gebotys Department of Electrical and Computer Engineering University of Waterloo, Canada {plonga, cgebotys}@uwaterloo.ca

Novel Precomputation Schemes for Elliptic Curve Cryptosystems Patrick Longa, and Catherine Gebotys Department of Electrical and Computer Engineering University of Waterloo, Canada {plonga, cgebotys}@uwaterloo.ca

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-01-08 14:48:27
7Divison Polynomials for Alternate Models of Elliptic Curves Dustin Moody ∗

Divison Polynomials for Alternate Models of Elliptic Curves Dustin Moody ∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-10 11:14:29
8Reverse Engineering of Strong CryptoSignatures Schemes

Reverse Engineering of Strong CryptoSignatures Schemes

Add to Reading List

Source URL: www.reteam.org

Language: English - Date: 2009-05-17 13:10:56
9ACTA ARITHMETICA * (201*) Integral points of a modular curve of level 11 by

ACTA ARITHMETICA * (201*) Integral points of a modular curve of level 11 by

Add to Reading List

Source URL: www.mat.uniroma2.it

Language: English - Date: 2012-03-24 10:18:02
10Annales Mathematicae et Informaticae[removed]pp. 145–153 http://ami.ektf.hu The rank of certain subfamilies of the elliptic curve Y 2 = X 3 − X + T 2∗

Annales Mathematicae et Informaticae[removed]pp. 145–153 http://ami.ektf.hu The rank of certain subfamilies of the elliptic curve Y 2 = X 3 − X + T 2∗

Add to Reading List

Source URL: ami.ektf.hu

Language: English - Date: 2012-12-19 11:45:10