Elliptic Curve Protocols
暂无分享,去创建一个
[1] Marc Joye,et al. Trading Inversions for Multiplications in Elliptic Curve Cryptography , 2006, Des. Codes Cryptogr..
[2] Johannes Wolkerstorfer,et al. Scaling ECC Hardware to a Minimum , 2005 .
[3] Jens-Peter E Kaps,et al. Cryptography for Ultra-Low Power Devices , 2006 .
[4] Catherine H. Gebotys. Design of secure cryptography against the threat of power-attacks in DSP-embedded processors , 2004, TECS.
[5] Alfred Menezes,et al. Software Implementation of the NIST Elliptic Curves Over Prime Fields , 2001, CT-RSA.
[6] Tanja Lange,et al. Handbook of Elliptic and Hyperelliptic Curve Cryptography , 2005 .
[7] Jun Feng,et al. Low-power hardware implementation of ECC processor suitable for low-cost RFID tags , 2008, 2008 9th International Conference on Solid-State and Integrated-Circuit Technology.
[8] Laurent Imbert,et al. Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains , 2005, ASIACRYPT.
[9] Alfred Menezes,et al. Software Implementation of Elliptic Curve Cryptography over Binary Fields , 2000, CHES.
[10] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[11] Tim Güneysu,et al. Ultra High Performance ECC over NIST Primes on Commercial FPGAs , 2008, CHES.
[12] Bodo Möller. Algorithms for Multi-exponentiation , 2001, Selected Areas in Cryptography.
[13] Kimmo Järvinen,et al. On Parallelization of High-Speed Processors for Elliptic Curve Cryptography , 2008, IEEE Trans. Very Large Scale Integr. Syst..
[14] Laurent Imbert,et al. Extended Double-Base Number System with Applications to Elliptic Curve Cryptography , 2006, INDOCRYPT.
[15] Tanja Lange,et al. Faster Addition and Doubling on Elliptic Curves , 2007, ASIACRYPT.
[16] Kin Choong Yow,et al. Efficient Implementation of Elliptic Curve Cryptography (ECC) for Personal Digital Assistants (PDAs) , 2004, Wirel. Pers. Commun..
[17] Berk Sunar,et al. Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.
[18] Srivaths Ravi,et al. Analyzing the energy consumption of security protocols , 2003, ISLPED '03.
[19] Graham A. Jullien,et al. Theory and applications for a double-base number system , 1997, Proceedings 13th IEEE Sympsoium on Computer Arithmetic.
[20] Pradeep Kumar Mishra,et al. Pipelined computation of scalar multiplication in elliptic curve cryptosystems (extended version) , 2006, IEEE Transactions on Computers.
[21] Patrick Longa,et al. Accelerating the Scalar Multiplication on Elliptic Curve Cryptosystems over Prime Fields , 2008, IACR Cryptol. ePrint Arch..
[22] Atsuko Miyaji,et al. Efficient Elliptic Curve Exponentiation Using Mixed Coordinates , 1998, ASIACRYPT.
[23] H. Edwards. A normal form for elliptic curves , 2007 .
[24] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[25] Vivek Kapoor,et al. Elliptic curve cryptography , 2008, UBIQ.
[26] Christof Paar,et al. Hyperelliptic Curve Coprocessors on a FPGA , 2004, WISA.
[27] Chae Hoon Lim,et al. Fast Implementation of Elliptic Curve Arithmetic in GF(pn) , 2000, Public Key Cryptography.
[28] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[29] J. Pollard,et al. Monte Carlo methods for index computation () , 1978 .
[30] Ingrid Verbauwhede,et al. Public-Key Cryptography on the Top of a Needle , 2007, 2007 IEEE International Symposium on Circuits and Systems.
[31] Joseph H. Silverman,et al. NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.
[32] Christof Paar,et al. Efficient Implementation of Elliptic Curve Cryptosystems on the TI MSP 430x33x Family of Microcontrollers , 2001, Public Key Cryptography.
[33] Patrick Longa,et al. Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication , 2009, IACR Cryptol. ePrint Arch..
[34] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[35] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[36] Jerome A. Solinas,et al. Efficient Arithmetic on Koblitz Curves , 2000, Des. Codes Cryptogr..