New Vistas in elliptic curve cryptography
Information Security Tech. Report
Ate Pairing on Hyperelliptic Curves
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
New Point Addition Formulae for ECC Applications
WAIFI '07 Proceedings of the 1st international workshop on Arithmetic of Finite Fields
The Quadratic Extension Extractor for (Hyper)Elliptic Curves in Odd Characteristic
WAIFI '07 Proceedings of the 1st international workshop on Arithmetic of Finite Fields
Highly Regular Right-to-Left Algorithms for Scalar Multiplication
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Arithmetic Operators for Pairing-Based Cryptography
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
The GPS Identification Scheme Using Frobenius Expansions
Research in Cryptology
Extractors for Jacobians of Binary Genus-2 Hyperelliptic Curves
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Montgomery Ladder for All Genus 2 Curves in Characteristic 2
WAIFI '08 Proceedings of the 2nd international workshop on Arithmetic of Finite Fields
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Computing the Cassels Pairing on Kolyvagin Classes in the Shafarevich-Tate Group
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Exponentiation in Pairing-Friendly Groups Using Homomorphisms
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Computing pairings using x-coordinates only
Designs, Codes and Cryptography
A Necessary Condition for Gauss Period Normal Bases to Be the Same Normal Basis
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Generalized Scalar Multiplication Secure against SPA, DPA, and RPA
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Simple Algorithms for Computing a Sequence of 2-Isogenies
Information Security and Cryptology --- ICISC 2008
Double-Base Number System for Multi-scalar Multiplications
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Boneh-Boyen Signatures and the Strong Diffie-Hellman Problem
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
Generating Pairing-Friendly Curves with the CM Equation of Degree 1
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
On the Final Exponentiation for Calculating Pairings on Ordinary Elliptic Curves
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
Fast Hashing to G2 on Pairing-Friendly Curves
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
Ramanujan's class invariants and their use in elliptic curve cryptography
Computers & Mathematics with Applications
Towards minimizing memory requirement for implementation of hyperelliptic curve cryptosystems
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Affine precomputation with sole inversion in elliptic curve cryptography
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Extractors for Jacobian of hyperelliptic curves of genus 2 in odd characteristic
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
Another look at square roots (and other less common operations) in fields of even characteristic
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
Faster multiplication in GF(2)[x]
ANTS-VIII'08 Proceedings of the 8th international conference on Algorithmic number theory
Computing Hilbert class polynomials
ANTS-VIII'08 Proceedings of the 8th international conference on Algorithmic number theory
Computing zeta functions in families of Ca,bcurves using deformation
ANTS-VIII'08 Proceedings of the 8th international conference on Algorithmic number theory
Efficient hyperelliptic arithmetic using balanced representation for divisors
ANTS-VIII'08 Proceedings of the 8th international conference on Algorithmic number theory
Efficient architectures for elliptic curve cryptography processors for RFID
ICCD'09 Proceedings of the 2009 IEEE international conference on Computer design
IEEE Transactions on Information Theory
Elliptic curves cryptosystems for ecommerce applications
MCBE'10/MCBC'10 Proceedings of the 11th WSEAS international conference on mathematics and computers in business and economics and 11th WSEAS international conference on Biology and chemistry
Efficient 3-dimensional GLV method for faster point multiplication on some GLS elliptic curves
Information Processing Letters
Efficiency improvement of homomorphic e-auction
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
Differential addition in generalized Edwards coordinates
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
Designing a code generator for pairing based cryptographic functions
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
A variant of Miller's formula and algorithm
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Bounds and trade-offs for Double-Base Number Systems
Information Processing Letters
Faster pairing computation on genus 2 hyperelliptic curves
Information Processing Letters
A security scheme for dependable key insertion in mobile embedded devices
International Journal of Reconfigurable Computing - Special issue on selected papers from the international workshop on reconfigurable communication-centric systems on chips (ReCoSoC' 2010)
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
A generalization of Verheul's theorem for some ordinary curves
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
To infinity and beyond: combined attack on ECC using points of low order
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Efficient doubling on genus two curves over binary fields
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Efficient and secure elliptic curve point multiplication using double-base chains
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Efficient doubling on genus 3 curves over binary fields
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Efficient arithmetic on hessian curves
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
Simple power analysis on exponentiation revisited
CARDIS'10 Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application
Sublinear scalar multiplication on hyperelliptic koblitz curves
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
Optimal eta pairing on supersingular genus-2 binary hyperelliptic curves
CT-RSA'12 Proceedings of the 12th conference on Topics in Cryptology
The arithmetic of characteristic 2 Kummer surfaces and of elliptic Kummer lines
Finite Fields and Their Applications
Efficient java implementation of elliptic curve cryptography for J2ME-Enabled mobile devices
WISTP'12 Proceedings of the 6th IFIP WG 11.2 international conference on Information Security Theory and Practice: security, privacy and trust in computing systems and ambient intelligent ecosystems
Improved fixed-base comb method for fast scalar multiplication
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
Digit set randomization in elliptic curve cryptography
SAGA'07 Proceedings of the 4th international conference on Stochastic Algorithms: foundations and applications
Twisted edwards-form elliptic curve cryptography for 8-bit AVR-based sensor nodes
Proceedings of the first ACM workshop on Asia public-key cryptography
Hardware architectures for MSP430-based wireless sensor nodes performing elliptic curve cryptography
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Updated recommendations for blinded exponentiation vs. single trace analysis
COSADE'13 Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design
Hi-index | 0.06 |
This handbook provides a complete reference on elliptic and hyperelliptic curve cryptography. Addressing every aspect of the field, the book contains all of the background necessary to understand the theory and security of cryptosystems as well as the algorithms that can be used to implement them. This second edition features the latest developments on pairing-based cryptography, new ideas on index-calculus attacks, improved algorithms for genus-2 arithmetic, and a number of other new additions. It also includes many new applications and provides better explanations on some of the more mathematical presentations.