A New Addition Formula for Elliptic Curves over GF(2^n)
IEEE Transactions on Computers
An Improved Implementation of Elliptic Curves over GF(2) when Using Projective Point Arithmetic
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Software Implementation of Elliptic Curve Cryptography over Binary Fields
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
A Low-Power Design for an Elliptic Curve Digital Signature Chip
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Fast Normal Basis Multiplication Using General Purpose Processors
IEEE Transactions on Computers
On the Number of Trace-One Elements in Polynomial Bases for $$\mathbb{F}_{2^n}$$
Designs, Codes and Cryptography
Software Multiplication Using Gaussian Normal Bases
IEEE Transactions on Computers
Extractors for binary elliptic curves
Designs, Codes and Cryptography
New Point Addition Formulae for ECC Applications
WAIFI '07 Proceedings of the 1st international workshop on Arithmetic of Finite Fields
Delaying and merging operations in scalar multiplication: applications to curve-based cryptosystems
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
On redundant T-adic expansions and non-adjacent digit sets
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Efficient divisor class halving on genus two curves
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Another look at square roots (and other less common operations) in fields of even characteristic
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
wNAF, an efficient left-to-right signed digit recoding algorithm
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Designs, Codes and Cryptography
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Extending scalar multiplication using double bases
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Scalar multiplication on koblitz curves using double bases
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
A complete divisor class halving algorithm for hyperelliptic curve cryptosystems of genus two
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Memory-efficient fault countermeasures
CARDIS'11 Proceedings of the 10th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Halving for the 2-Sylow subgroup of genus 2 curves over binary fields
Finite Fields and Their Applications
Speeding up elliptic curve discrete logarithm computations with point halving
Designs, Codes and Cryptography
Lambda coordinates for binary elliptic curves
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
Hi-index | 0.01 |