A New Double Point Multiplication Algorithm and Its Application to Binary Elliptic Curves with Endomorphisms
暂无分享,去创建一个
[1] Scott A. Vanstone,et al. Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms , 2001, CRYPTO.
[2] P. L. Montgomery. Speeding the Pollard and elliptic curve methods of factorization , 1987 .
[3] F. Hess. Generalising the GHS attack on the elliptic curve discrete logarithm problem , 2004 .
[4] M. Stam,et al. Speeding up subgroup cryptosystems , 2003 .
[5] Alfred Menezes,et al. Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields , 2009, IEEE Transactions on Computers.
[6] Jean-Jacques Quisquater,et al. On Polynomial Systems Arising from a Weil Descent , 2012, ASIACRYPT.
[7] Jean-Charles Faugère,et al. Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields , 2012, EUROCRYPT.
[8] M. Scott,et al. Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves , 2011, Journal of Cryptology.
[9] David Thomas,et al. The Art in Computer Programming , 2001 .
[10] Ricardo Dahab,et al. Software multiplication using Gaussian normal bases , 2006, IEEE Transactions on Computers.
[11] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[12] Ricardo Dahab,et al. Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation , 1999, CHES.
[13] Bodo Möller. Algorithms for Multi-exponentiation , 2001, Selected Areas in Cryptography.
[14] D. Bernstein. Differential addition chains , 2006 .
[15] Marc Joye,et al. Exponent Recoding and Regular Exponentiation Algorithms , 2009, AFRICACRYPT.
[16] Nigel P. Smart,et al. Constructive and destructive facets of Weil descent on elliptic curves , 2002, Journal of Cryptology.
[17] Toru Akishita,et al. Fast Simultaneous Scalar Multiplication on Elliptic Curve with Montgomery Form , 2001, Selected Areas in Cryptography.
[18] Tanja Lange,et al. Binary Edwards Curves , 2008, CHES.
[19] Martijn Stam,et al. On Montgomery-Like Representationsfor Elliptic Curves over GF(2k) , 2003, Public Key Cryptography.
[20] N. Koblitz. Elliptic curve cryptosystems , 1987 .