On Multi-Scalar Multiplication Algorithms for Register-Constrained Environments
暂无分享,去创建一个
[1] Roberto Maria Avanzi. The Complexity of Certain Multi-Exponentiation Techniques in Cryptography , 2004, Journal of Cryptology.
[2] Da-Zhi Sun,et al. On Secure Simple Pairing in Bluetooth Standard v5.0-Part II: Privacy Analysis and Enhancement for Low Energy , 2019, Sensors.
[3] Georg Fuchsbauer,et al. Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble , 2019, IACR Cryptol. ePrint Arch..
[4] Da-Zhi Sun,et al. A note on asynchronous multi-exponentiation algorithm using binary representation , 2012, Inf. Process. Lett..
[5] Jiankun Hu,et al. Batch Public Key Cryptosystem with batch multi-exponentiation , 2016, Future Gener. Comput. Syst..
[6] Yan Zhu,et al. Zero-pole cancellation for identity-based aggregators: a constant-size designated verifier-set signature , 2020, Frontiers of Computer Science.
[7] Erkay Savas,et al. A generic Private Information Retrieval scheme with parallel multi‐exponentiations on multicore processors , 2018, Concurr. Comput. Pract. Exp..
[8] Debiao He,et al. A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm , 2019, Frontiers of Computer Science.
[9] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[10] Dirk Fox,et al. Digital Signature Standard (DSS) , 2001, Datenschutz und Datensicherheit.
[11] Bodo Möller. Algorithms for Multi-exponentiation , 2001, Selected Areas in Cryptography.
[12] Ferrell S. Wheeler,et al. Signed Digit Representations of Minimal Hamming Weight , 1993, IEEE Trans. Computers.
[13] Wu-chuan Yang,et al. Fast Multicomputation with Asynchronous Strategy , 2007, IEEE Transactions on Computers.
[14] Jizhou Sun,et al. Computational efficiency analysis of Wu et al.'s fast modular multi-exponentiation algorithm , 2007, Appl. Math. Comput..
[15] A. K. Lenstra,et al. Multi-exponentiation (cryptographic protocols) , 1994 .
[16] Daniel M. Gordon,et al. A Survey of Fast Exponentiation Methods , 1998, J. Algorithms.
[17] Helmut Prodinger,et al. Distribution results for low-weight binary representations for pairs of integers , 2004, Theor. Comput. Sci..
[18] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[19] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[20] J. Solinas. Low-Weight Binary Representations for Pairs of Integers , 2001 .
[21] Fábio Borges,et al. Parallel algorithms for modular multi-exponentiation , 2017, Appl. Math. Comput..
[22] Fabien Laguillaumie,et al. Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions , 2020, Algorithmica.
[23] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[24] Xiaoyu Ruan,et al. Left-to-right optimal signed-binary representation of a pair of integers , 2005, IEEE Transactions on Computers.
[26] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[27] Wu-Chuan Yang,et al. Analysis of the Dimitrov-Jullien-Miller Recoding Algorithm , 2016, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[28] Xiao Liu,et al. Combination in Advance Batch Multi-exponentiation on Elliptic Curve , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.
[29] Chi-Sung Laih,et al. Algorithm of asynchronous binary signed-digit recoding on fast multiexponentiation , 2005, Appl. Math. Comput..
[30] Graham A. Jullien,et al. Complexity and Fast Algorithms for Multiexponentiations , 2000, IEEE Trans. Computers.