Public-Key Cryptography on the Top of a Needle
暂无分享,去创建一个
Ingrid Verbauwhede | Bart Preneel | Nele Mentens | Lejla Batina | Kazuo Sakiyama | B. Preneel | I. Verbauwhede | L. Batina | N. Mentens | K. Sakiyama
[1] Christof Paar,et al. Are standards compliant Elliptic Curve Cryptosystems feasible on RFID ? , 2006 .
[2] Berk Sunar,et al. State of the art in ultra-low power public key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[3] R. Zuccherato,et al. An elementary introduction to hyperelliptic curves , 1996 .
[4] Nigel P. Smart,et al. Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series) , 2005 .
[5] Ingrid Verbauwhede,et al. Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks , 2006, ESAS.
[6] Neal Koblitz,et al. A Family of Jacobians Suitable for Discrete Log Cryptosystems , 1988, CRYPTO.
[7] Johannes Wolkerstorfer. Scaling ECC Hardware to a Minimum , 2005 .
[8] P. L. Montgomery. Speeding the Pollard and elliptic curve methods of factorization , 1987 .
[9] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[10] Ingrid Verbauwhede,et al. SW co-design of a hyperelliptic curve cryptosystem using a microcode instruction set coprocessor , 2006 .
[11] Sylvain Duquesne,et al. Classification of genus 2 curves over F2n and optimization of their arithmetic , 2004, IACR Cryptol. ePrint Arch..
[12] Ricardo Dahab,et al. Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation , 1999, CHES.