Soft-Timeout Distributed Key Generation for Digital Signature based on Elliptic Curve D-log for Low-Power Devices
暂无分享,去创建一个
[1] Alfred Menezes,et al. Software Implementation of Elliptic Curve Cryptography over Binary Fields , 2000, CHES.
[2] Dan Boneh,et al. TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM , 1999 .
[3] Hugo Krawczyk,et al. Secure Distributed Key Generation for Discrete-Log Based Cryptosystems , 1999, Journal of Cryptology.
[4] Atsuko Miyaji,et al. Efficient Elliptic Curve Exponentiation Using Mixed Coordinates , 1998, ASIACRYPT.
[5] Torben P. Pedersen. A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.
[6] Adi Shamir,et al. How to share a secret , 1979, CACM.
[7] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[8] Alfred Menezes,et al. The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..
[9] Igor A. Semaev,et al. Evaluation of discrete logarithms in a group of p-torsion points of an elliptic curve in characteristic p , 1998, Math. Comput..
[10] Andreas Stein,et al. Analysis of the Xedni Calculus Attack , 2000, Des. Codes Cryptogr..
[11] 廖宏梓,et al. On the Elliptic Curve Digital Signature Algorithm , 2006 .
[12] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[13] G. Frey,et al. A remark concerning m -divisibility and the discrete logarithm in the divisor class group of curves , 1994 .
[14] Stephan Olariu,et al. Randomized Initialization Protocols for Ad Hoc Networks , 2000, IEEE Trans. Parallel Distributed Syst..
[15] Jacques Stern,et al. Security Proofs for Signature Schemes , 1996, EUROCRYPT.
[16] Christian Cachin,et al. Distributing trust on the Internet , 2001, 2001 International Conference on Dependable Systems and Networks.
[17] Silvio Micali,et al. Proofs that yield nothing but their validity and a methodology of cryptographic protocol design , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[18] Alfred Menezes,et al. Solving Elliptic Curve Discrete Logarithm Problems Using Weil Descent , 2001, IACR Cryptol. ePrint Arch..
[19] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[20] Stephen C. Pohlig,et al. An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance , 2022, IEEE Trans. Inf. Theory.
[21] Gerhard Frey,et al. The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems , 1999, IEEE Trans. Inf. Theory.
[22] D. Chudnovsky,et al. Sequences of numbers generated by addition in formal groups and new primality and factorization tests , 1986 .
[23] Nigel P. Smart,et al. The Discrete Logarithm Problem on Elliptic Curves of Trace One , 1999, Journal of Cryptology.
[24] Steven D. Galbraith,et al. A Cryptographic Application of Weil Descent , 1999, IMACC.
[25] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[26] Neal Koblitz,et al. CM-Curves with Good Cryptographic Properties , 1991, CRYPTO.
[27] Martin E. Hellman,et al. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[28] Servaas Vandenberghe,et al. A Fast Software Implementation for Arithmetic Operations in GF(2n) , 1996, ASIACRYPT.
[29] Peter J. Downey,et al. Computing Sequences with Addition Chains , 1981, SIAM J. Comput..
[30] N. Koblitz,et al. A Fast Software Implementation for Arithmetic Operations in Gf(2 N ) (preprint) , 1996 .
[31] Jerome A. Solinas. An Improved Algorithm for Arithmetic on a Family of Elliptic Curves , 1997, CRYPTO.
[32] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[33] H. Krawczyk,et al. Revisiting the Distributed Key Generation for Discrete-Log Based Cryptosystems , 2007 .
[34] Alfred Menezes,et al. Analysis of the Weil Descent Attack of Gaudry, Hess and Smart , 2001, CT-RSA.
[35] Edlyn Teske. Square-root algorithms for the discrete logarithm problem (a survey) , 2001 .
[36] Jerome A. Solinas,et al. Efficient Arithmetic on Koblitz Curves , 2000, Des. Codes Cryptogr..
[37] Takakazu Satoh,et al. Fermat quotients and the polynomial time discrete log algorithm for anomalous elliptic curves , 1998 .
[38] Alfred Menezes,et al. Reducing elliptic curve logarithms to logarithms in a finite field , 1991, STOC '91.
[39] Ming-Deh A. Huang,et al. Lifting Elliptic Curves and Solving the Elliptic Curve Discrete Logarithm Problem , 2000, ANTS.
[40] Christof Paar,et al. Elliptic Curve Cryptography on Smart Cards without Coprocessors , 2001, CARDIS.
[41] Chae Hoon Lim,et al. Fast Implementation of Elliptic Curve Arithmetic in GF(pn) , 2000, Public Key Cryptography.
[42] Anthony T. Chronopoulos,et al. Implementation of distributed key generation algorithms using secure sockets , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..
[43] Tibor Juhas. The use of elliptic curves in cryptography , 2007 .
[44] Markus Jakobsson,et al. Proactive public key and signature systems , 1997, CCS '97.
[45] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[46] Hugo Krawczyk,et al. Adaptive Security for Threshold Cryptosystems , 1999, CRYPTO.