Conversion Algorithms and Implementations for Koblitz Curve Cryptography
暂无分享,去创建一个
[1] Alfred Menezes,et al. Software Implementation of Elliptic Curve Cryptography over Binary Fields , 2000, CHES.
[2] Kouichi Itoh,et al. Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2m) on an FPGA , 2000, CHES.
[3] Neal Koblitz,et al. CM-Curves with Good Cryptographic Properties , 1991, CRYPTO.
[4] Kimmo Järvinen,et al. Fast point multiplication on Koblitz curves: Parallelization method and implementations , 2009, Microprocess. Microsystems.
[5] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[6] Stefan Mangard,et al. Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints , 2005, CHES.
[7] Vassil S. Dimitrov,et al. Provably Sublinear Point Multiplication on Koblitz Curves and Its Hardware Implementation , 2008, IEEE Transactions on Computers.
[8] Roberto Maria Avanzi,et al. Scalar Multiplication on Koblitz Curves Using Double Bases , 2006, VIETCRYPT.
[9] Kimmo Järvinen,et al. Efficient Circuitry for Computing τ-adic Non-Adjacent Form , 2006, 2006 13th IEEE International Conference on Electronics, Circuits and Systems.
[10] Jerome A. Solinas,et al. Efficient Arithmetic on Koblitz Curves , 2000, Des. Codes Cryptogr..
[11] Jerome A. Solinas. An Improved Algorithm for Arithmetic on a Family of Elliptic Curves , 1997, CRYPTO.
[12] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[13] M. Anwar Hasan,et al. High performance FPGA based elliptic curve cryptographic co-processor , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[14] Vassil S. Dimitrov,et al. FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers , 2006, CHES.
[15] Kimmo Järvinen,et al. High-Speed Elliptic Curve Cryptography Accelerator for Koblitz Curves , 2008, 2008 16th International Symposium on Field-Programmable Custom Computing Machines.
[16] Laurent Imbert,et al. The double-base number system and its application to elliptic curve cryptography , 2007, Math. Comput..
[17] Stefan Mangard,et al. Power Analysis Attacks and Countermeasures , 2007, IEEE Design & Test of Computers.
[18] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[19] Christof Paar,et al. Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms , 1998, CRYPTO.
[20] Tanja Lange,et al. Collisions in Fast Generation of Ideal Classes and Points on Hyperelliptic and Elliptic Curves , 2005, Applicable Algebra in Engineering, Communication and Computing.
[21] Jonathan Lutz,et al. High Performance Elliptic Curve Cryptographic Co-processor , 2007 .
[22] Neal Koblitz,et al. Algebraic aspects of cryptography , 1998, Algorithms and computation in mathematics.
[23] Tanja Lange. Koblitz curve cryptosystems , 2005, Finite Fields Their Appl..
[24] Jean-Jacques Quisquater,et al. High-speed hardware implementations of Elliptic Curve Cryptography: A survey , 2007, J. Syst. Archit..
[25] Willi Meier,et al. Efficient Multiplication on Certain Nonsupersingular Elliptic Curves , 1992, CRYPTO.
[26] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[27] Billy Bob Brumley,et al. Koblitz Curves and Integer Equivalents of Frobenius Expansions , 2007, Selected Areas in Cryptography.
[28] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[29] Roberto Maria Avanzi,et al. Extending Scalar Multiplication Using Double Bases , 2006, ASIACRYPT.