Advances in Applied Mathematics
Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Finite fields
Elliptic curves in cryptography
Elliptic curves in cryptography
Look-Up Table-Based Large Finite Field Multiplication in Memory Constrained Cryptosystems
IEEE Transactions on Computers - Special issue on computer arithmetic
Fast Key Exchange with Elliptic Curve Systems
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Efficient Computation of Multiplicative Inverses for Cryptographic Applications
ARITH '01 Proceedings of the 15th IEEE Symposium on Computer Arithmetic
Digital rights management in a 3G mobile phone and beyond
Proceedings of the 3rd ACM workshop on Digital rights management
A CRT-RSA Algorithm Secure against Hardware Fault Attacks
DASC '06 Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing
A microcoded elliptic curve processor using FPGA technology
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Hi-index | 0.00 |
Elliptic curve cryptography (ECC) is recognized as a fast cryptography system and has many applications in security systems. In this paper, a novel sharing scheme is proposed to significantly reduce the number of field multiplications and the usage of lookup tables, providing high speed operations for both hard-ware and software realizations.