Almost all primes can be quickly certified
STOC '86 Proceedings of the eighteenth annual ACM symposium on Theory of computing
Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
A course in number theory and cryptography
A course in number theory and cryptography
Nonsingular plane cubic curves over finite fields
Journal of Combinatorial Theory Series A
A pseudo-random bit generator based on elliptic logarithms
Proceedings on Advances in cryptology---CRYPTO '86
A key distribution system equivalent to factoring
Journal of Cryptology
A key-exchange system based on imaginary quadratic fields
Journal of Cryptology
Optimal normal bases in GF(pn)
Discrete Applied Mathematics
Journal of Cryptology
Discrete logarithms in GF(P) using the number field sieve
SIAM Journal on Discrete Mathematics
A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
Mathematics of Computation
Parallel collision search with application to hash functions and discrete logarithms
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Key-Exchange in Real Quadratic Congruence Function Fields
Designs, Codes and Cryptography - Special issue dedicated to Gustavus J. Simmons
Algebraic aspects of cryptography
Algebraic aspects of cryptography
Mathematics of Computation
Discrete Logarithm Based Cryptosystems in Quadratic FunctionFields of Characteristic 2
Designs, Codes and Cryptography
Computing discrete logarithms in real quadratic congruence function fields of large genus
Mathematics of Computation
Improving the parallelized Pollard lambda search on anomalous binary curves
Mathematics of Computation
The Xedni Calculus and the Elliptic Curve Discrete LogarithmProblem
Designs, Codes and Cryptography
Analysis of the Xedni Calculus Attack
Designs, Codes and Cryptography
Elliptic Curve Public Key Cryptosystems
Elliptic Curve Public Key Cryptosystems
Constructing Elliptic Curve Cryptosystems in Characteristic 2
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
New Public-Key Schemes Based on Elliptic Curves over the Ring Zn
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
CM-Curves with Good Cryptographic Properties
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Efficient Multiplication on Certain Nonsupersingular Elliptic Curves
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
On the Security of the KMOV Public Key Cryptosystem
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
An Improved Algorithm for Arithmetic on a Family of Elliptic Curves
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Efficient Algorithms for Elliptic Curve Cryptosystems
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Low Exponent Attack against Elliptic Curve RSA
ASIACRYPT '94 Proceedings of the 4th International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
A Fast Software Implementation for Arithmetic Operations in GF(2n)
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Constructing elliptic curves with given group order over large finite fields
ANTS-I Proceedings of the First International Symposium on Algorithmic Number Theory
ANTS-I Proceedings of the First International Symposium on Algorithmic Number Theory
ANTS-II Proceedings of the Second International Symposium on Algorithmic Number Theory
On the Performance of Signature Schemes Based on Elliptic Curves
ANTS-III Proceedings of the Third International Symposium on Algorithmic Number Theory
ANTS-III Proceedings of the Third International Symposium on Algorithmic Number Theory
Fast Key Exchange with Elliptic Curve Systems
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Finding good random elliptic curves for cryptosystems defined over IF2n
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Counting the number of points on elliptic curves over finite fields: strategies and performances
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Discrete Logarithms: The Past and the Future
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Efficient Implementation of Elliptic Curve Cryptosystems on an ARM7 with Hardware Accelerator
ISC '01 Proceedings of the 4th International Conference on Information Security
Software Implementation of Elliptic Curve Cryptography over Binary Fields
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
Generating Elliptic Curves of Prime Order
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m)
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
Computer Standards & Interfaces
Hardware architectures for public key cryptography
Integration, the VLSI Journal
The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces
Designs, Codes and Cryptography
A threshold signature scheme for group communications without a shared distribution center
Future Generation Computer Systems - Special issue: Computational science of lattice Boltzmann modelling
Digital multi-signature scheme based on the elliptic curve cryptosystem
Journal of Computer Science and Technology
Elliptic curve cryptography: Java implementation
Proceedings of the 1st annual conference on Information security curriculum development
Analysis of linear combination algorithms in cryptography
ACM Transactions on Algorithms (TALG)
On the Number of Optimal Base 2 Representations of Integers
Designs, Codes and Cryptography
Convertible multi-authenticated encryption scheme
Information Sciences: an International Journal
Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings
Computers and Electrical Engineering
Efficient and secure protocol in fair document exchange
Computer Standards & Interfaces
Load-balanced key establishment methodologies in wireless sensor networks
International Journal of Security and Networks
An efficient and secure pairing-based fair blind signature scheme with message recovery
AIC'06 Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications
Designing secure electronic cash payment systems based on efficient partially blind signature scheme
AIC'06 Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications
Fast elliptic curve cryptography on FPGA
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Experimental evaluation of community-based WLAN voice and data services
Proceedings of the 3rd international conference on Mobile multimedia communications
An efficient session key generation for NTDR networks based on bilinear paring
Computer Communications
Optimization Algorithm for Scalar Multiplication in the Elliptic Curve Cryptography over Prime Field
ICIC '08 Proceedings of the 4th international conference on Intelligent Computing: Advanced Intelligent Computing Theories and Applications - with Aspects of Theoretical and Methodological Issues
Threshold authenticated encryption scheme using labor-division signature
Computer Standards & Interfaces
New cryptosystems design based on hybrid-mode problems
Computers and Electrical Engineering
An ID-based group-oriented decryption scheme secure against adaptive chosen-ciphertext attacks
Computer Communications
Simple authenticated key agreement and protected password change protocol
Computers & Mathematics with Applications
Journal of Systems and Software
Structures for communication-efficient public key revocation in ubiquitous sensor network
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
SPA resistant elliptic curve cryptosystem using addition chains
International Journal of High Performance Systems Architecture
MAAC: message authentication acceleration protocol for vehicular ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
ASIC: Aggregate signatures and certificates verification scheme for vehicular networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Provably secure randomized blind signature scheme based on bilinear pairing
Computers & Mathematics with Applications
On counteracting byzantine attacks in network coded peer-to-peer networks
IEEE Journal on Selected Areas in Communications
Certificateless authenticated group key agreement protocol for unbalanced wireless mobile networks
WSEAS TRANSACTIONS on COMMUNICATIONS
Efficient utilization of elliptic curve cryptosystem for hierarchical access control
Journal of Systems and Software
A novel key management and access control scheme for mobile agent
ICIC'06 Proceedings of the 2006 international conference on Intelligent computing: Part II
Journal of Network and Computer Applications
Public key cryptographic system using mandelbrot sets
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Robust authentication and key agreement scheme preserving the privacy of secret key
Computer Communications
Customizable elliptic curve cryptosystems
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Constructing secure mobile-agent-based consumer electronic applications
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Transactions on computational science XI
International Journal of Mobile Communications
Secure communication for electronic business applications in mobile agent networks
Expert Systems with Applications: An International Journal
A new signature scheme based on multiple hard number theoretic problems
ISRN Communications and Networking
Efficient tate pairing computation for elliptic curves over binary fields
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Efficient certificateless proxy signature scheme with provable security
Information Sciences: an International Journal
Integer factorization by a parallel GNFS algorithm for public key cryptosystems
ICESS'05 Proceedings of the Second international conference on Embedded Software and Systems
Signature calculus and discrete logarithm problems
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
Cooperative public key authentication protocol in wireless sensor network
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
ECGSC: elliptic curve based generalized signcryption
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
A novel hierarchical key management scheme based on quadratic residues
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
Attribute-based strong designated-verifier signature scheme
Journal of Systems and Software
Provably convertible multi-authenticated encryption scheme for generalized group communications
Information Sciences: an International Journal
Secure Communication of Medical Information Using Mobile Agents
Journal of Medical Systems
Context provenance to enhance the dependability of ambient intelligence systems
Personal and Ubiquitous Computing
Steganographic manipulations with elliptic curve cryptography
International Journal of Electronic Security and Digital Forensics
Cryptography with fast point multiplication by using ASCII codes and its implementation
International Journal of Communication Networks and Distributed Systems
Secure communication mechanism for ubiquitous Smart grid infrastructure
The Journal of Supercomputing
Secure Transmission of Mobile Agent in Dynamic Distributed Environments
Wireless Personal Communications: An International Journal
International Journal of Security and Networks
Secure and robust multipath routings for advanced metering infrastructure
The Journal of Supercomputing
PPREM: Privacy Preserving REvocation Mechanism for Vehicular Ad Hoc Networks
Computer Standards & Interfaces
International Journal of Communication Networks and Distributed Systems
Hi-index | 0.01 |
Since the introductionof public-key cryptography by Diffie and Hellman in 1976, thepotential for the use of the discrete logarithm problem in public-keycryptosystems has been recognized. Although the discrete logarithmproblem as first employed by Diffie and Hellman was defined explicitlyas the problem of finding logarithms with respect to a generatorin the multiplicative group of the integers modulo a prime, thisidea can be extended to arbitrary groups and, in particular,to elliptic curve groups. The resulting public-key systems providerelatively small block size, high speed, and high security. Thispaper surveys the development of elliptic curve cryptosystemsfrom their inception in 1985 by Koblitz and Miller to presentday implementations.