Almost all primes can be quickly certified
STOC '86 Proceedings of the eighteenth annual ACM symposium on Theory of computing
Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
A course in number theory and cryptography
A course in number theory and cryptography
Optimal normal bases in GF(pn)
Discrete Applied Mathematics
Reducing elliptic curve logarithms to logarithms in a finite field
STOC '91 Proceedings of the twenty-third annual ACM symposium on Theory of computing
Handbook of theoretical computer science (vol. A)
The State of Elliptic Curve Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Efficient Arithmetic on Koblitz Curves
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
On String Replacement Exponentiation
Designs, Codes and Cryptography
IEEE Transactions on Computers
Elliptic Curve Cryptography on a Palm OS Device
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
A Cyclic Window Algorithm for ECC Defined over Extension Fields
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Faster Attacks on Elliptic Curve Cryptosystems
SAC '98 Proceedings of the Selected Areas in Cryptography
Speeding up the Arithmetic on Koblitz Curves of Genus Two
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
An Improved Implementation of Elliptic Curves over GF(2) when Using Projective Point Arithmetic
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Efficient Multiplication on Certain Nonsupersingular Elliptic Curves
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Speeding up the Scalar Multiplication in the Jacobians of Hyperelliptic Curves Using Frobenius Map
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Elliptic Curve Discrete Logarithms and the Index Calculus
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Efficient Elliptic Curve Exponentiation Using Mixed Coordinates
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Lenient/Strict Batch Verification in Several Groups
ISC '01 Proceedings of the 4th International Conference on Information Security
Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
An Improved Method of Multiplication on Certain Elliptic Curves
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Elliptic Curve Scalar Multiplier Design Using FPGAs
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Software Implementation of Elliptic Curve Cryptography over Binary Fields
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
Protections against Differential Analysis for Elliptic Curve Cryptography
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2m) on an FPGA
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
Elliptic and hyperelliptic curves on embedded μP
ACM Transactions on Embedded Computing Systems (TECS)
An Improved Algorithm for uP + vQ on a Family of Elliptic Curves
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
Elliptic curve cryptography: Java implementation
Proceedings of the 1st annual conference on Information security curriculum development
A note on window τ-NAF algorithm
Information Processing Letters
Elliptic curve DSA (ECSDA): an enhanced DSA
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
On Τ-adic representations of integers
Designs, Codes and Cryptography
IEEE Transactions on Computers
Implementing public-key infrastructure for sensor networks
ACM Transactions on Sensor Networks (TOSN)
Implementing a feasible attack against ECC2K-130 certicom challenge (abstract only)
ACM Communications in Computer Algebra
FPGA Design of Self-certified Signature Verification on Koblitz Curves
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
The GPS Identification Scheme Using Frobenius Expansions
Research in Cryptology
Fast point multiplication on Koblitz curves: Parallelization method and implementations
Microprocessors & Microsystems
On parallelization of high-speed processors for elliptic curve cryptography
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
An Improvement to the Gaudry-Schost Algorithm for Multidimensional Discrete Logarithm Problems
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
A note on window τ-NAF algorithm
Information Processing Letters
Public-key cryptosystems with very small key lengths
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
An analysis of exponentiation based on formal languages
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Delaying and merging operations in scalar multiplication: applications to curve-based cryptosystems
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
On redundant T-adic expansions and non-adjacent digit sets
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
New Frobenius expansions for elliptic curves with efficient endomorphisms
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Improved algorithms for efficient arithmetic on elliptic curves using fast endomorphisms
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Koblitz curves and integer equivalents of frobenius expansions
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
Another look at square roots (and other less common operations) in fields of even characteristic
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
Efficient arithmetic on subfield elliptic curves over small finite fields of odd characteristic
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Efficient software implementation of binary field arithmetic using vector instruction sets
LATINCRYPT'10 Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America
Designs, Codes and Cryptography
A novel and efficient cryptosystem for large message encryption
International Journal of Information and Communication Technology
On the distribution of the coefficients of normal forms for Frobenius expansions
Designs, Codes and Cryptography
Remote timing attacks are still practical
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Extending scalar multiplication using double bases
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Scalar multiplication on koblitz curves using double bases
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Left-to-Right signed-bit τ-adic representations of n integers
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
FPGA implementation of point multiplication on koblitz curves using kleinian integers
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Efficient representations on koblitz curves with resistance to side channel attacks
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Efficiently computable endomorphisms for hyperelliptic curves
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
An improved popescu's authenticated key agreement protocol
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
Short memory scalar multiplication on koblitz curves
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
New families of hyperelliptic curves with efficient gallant-lambert-vanstone method
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
International Journal of Applied Cryptography
Efficient scalar multiplication by isogeny decompositions
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
A general methodology for pipelining the point multiplication operation in curve based cryptography
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
A DPA countermeasure by randomized frobenius decomposition
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Efficient countermeasures for thwarting the SCA attacks on the frobenius based methods
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
International Journal of Applied Cryptography
Sublinear scalar multiplication on hyperelliptic koblitz curves
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
Fast and scalable parallel processing of scalar multiplication in elliptic curve cryptosystems
Security and Communication Networks
Finite Fields and Their Applications
Efficient java implementation of elliptic curve cryptography for J2ME-Enabled mobile devices
WISTP'12 Proceedings of the 6th IFIP WG 11.2 international conference on Information Security Theory and Practice: security, privacy and trust in computing systems and ambient intelligent ecosystems
Faster implementation of scalar multiplication on koblitz curves
LATINCRYPT'12 Proceedings of the 2nd international conference on Cryptology and Information Security in Latin America
Securing ZigBee smart energy profile 1.x with OpenECC library
Proceedings of the first ACM workshop on Smart energy grid security
Hi-index | 0.01 |
Our purpose is to describe elliptic curves with complex multiplication which in characteristic 2 have the following useful properties for constructing Diffie-Hellman type cryptosystems: (1) they are nonsupersingular (so that one cannot use the Menezes-Okamoto-Vanstone reduction of discrete log from elliptic curves to finite fields); (2) the order of the group has a large prime factor (so that discrete logs cannot be computed by giant-step/baby-step or the Pollard rho method); (3) doubling of points can be carried out almost as efficiently as in the case of the supersingular curves used by Vanstone; (4) the curves are easy to find.