Advances in Applied Mathematics
Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
Montgomery Multiplication in GF(2^k
Designs, Codes and Cryptography
A survey of fast exponentiation methods
Journal of Algorithms
The State of Elliptic Curve Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Efficient Arithmetic on Koblitz Curves
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Efficient elliptic curve exponentiation
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Improved Algorithms for Elliptic Curve Arithmetic in GF(2n)
SAC '98 Proceedings of the Selected Areas in Cryptography
CM-Curves with Good Cryptographic Properties
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Speeding up Elliptic Cryptosystems by Using a Signed Binary Window Method
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
More Flexible Exponentiation with Precomputation
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Efficient Algorithms for Elliptic Curve Cryptosystems
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
A Fast Software Implementation for Arithmetic Operations in GF(2n)
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Elliptic Scalar Multiplication Using Point Halving
ASIACRYPT '99 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
On the Performance of Signature Schemes Based on Elliptic Curves
ANTS-III Proceedings of the Third International Symposium on Algorithmic Number Theory
Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Fast Key Exchange with Elliptic Curve Systems
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
PGP in constrained wireless devices
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Fast exponentiation with precomputation
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Elliptic Curve Cryptography on a Palm OS Device
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Software Implementation of the NIST Elliptic Curves Over Prime Fields
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Efficient Software Implementation for Finite Field Multiplication in Normal Basis
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Fully Parameterizable Elliptic Curve Cryptography Processor over GF(2)
FPL '02 Proceedings of the Reconfigurable Computing Is Going Mainstream, 12th International Conference on Field-Programmable Logic and Applications
A Software Library for Elliptic Curve Cryptography
ESA '02 Proceedings of the 10th Annual European Symposium on Algorithms
Efficient Implementation of Elliptic Curve Cryptosystems on an ARM7 with Hardware Accelerator
ISC '01 Proceedings of the 4th International Conference on Information Security
On Montgomery-Like Representationsfor Elliptic Curves over GF(2k)
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
Dual-Field Arithmetic Unit for GF(p) and GF(2m)
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Genus Two Hyperelliptic Curve Coprocessor
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Rapid Prototyping for Hardware Accelerated Elliptic Curve Public-Key Cryptosystems
RSP '01 Proceedings of the 12th International Workshop on Rapid System Prototyping
Design of secure cryptography against the threat of power-attacks in DSP-embedded processors
ACM Transactions on Embedded Computing Systems (TECS)
Software Multiplication Using Gaussian Normal Bases
IEEE Transactions on Computers
Efficient Bit-Parallel Multiplier for Irreducible Pentanomials Using a Shifted Polynomial Basis
IEEE Transactions on Computers
Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations
IEEE Transactions on Computers
PGP in constrained wireless devices
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Effects of Optimizations for Software Implementations of Small Binary Field Arithmetic
WAIFI '07 Proceedings of the 1st international workshop on Arithmetic of Finite Fields
Highly Regular Right-to-Left Algorithms for Scalar Multiplication
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
On the Design and Optimization of a Quantum Polynomial-Time Attack on Elliptic Curve Cryptography
Theory of Quantum Computation, Communication, and Cryptography
Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
A high performance ECC hardware implementation with instruction-level parallelism over GF(2163)
Microprocessors & Microsystems
Efficient software implementation of binary field arithmetic using vector instruction sets
LATINCRYPT'10 Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America
IEEE Transactions on Wireless Communications
Customizable elliptic curve cryptosystems
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Design of flexible GF(2m) elliptic curve cryptography processors
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
An O(m2)-depth quantum algorithm for the elliptic curve discrete logarithm problem over GF(2m)a
Quantum Information & Computation
Improving security of SET protocol based on ECC
WISM'11 Proceedings of the 2011 international conference on Web information systems and mining - Volume Part I
Compressed jacobian coordinates for OEF
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Efficient software implementations of large finite fields GF(2n) for secure storage applications
ACM Transactions on Storage (TOS)
Efficient and secure elliptic curve point multiplication using double-base chains
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
A fast inversion algorithm and low-complexity architecture over GF(2m)
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Unified point addition formulæ and side-channel attacks
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Efficient tate pairing computation for elliptic curves over binary fields
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
A complete divisor class halving algorithm for hyperelliptic curve cryptosystems of genus two
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Efficient representations on koblitz curves with resistance to side channel attacks
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Scalar multiplication on elliptic curves defined over fields of small odd characteristic
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
A new security protocol based on elliptic curve cryptosystems for securing wireless sensor networks
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Two new fast methods for simultaneous scalar multiplication in elliptic curve cryptosystems
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Choosing parameter sets for NTRUEncrypt with NAEP and SVES-3
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Preventing delegation-based mobile authentications from man-in-the-middle attacks
Computer Standards & Interfaces
Hyperelliptic curve coprocessors on a FPGA
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Short memory scalar multiplication on koblitz curves
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Hardware/software co-design for hyperelliptic curve cryptography (HECC) on the 8051 µP
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
VLSI performance evaluation and analysis of systolic and semisystolic finite field multipliers
ACSAC'05 Proceedings of the 10th Asia-Pacific conference on Advances in Computer Systems Architecture
Curve25519: new diffie-hellman speed records
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Side channel attacks and countermeasures on pairing based cryptosystems over binary fields
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Efficient hardware implementation of elliptic curve cryptography over GF(pm)
WISA'05 Proceedings of the 6th international conference on Information Security Applications
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Finite Fields and Their Applications
Steganographic manipulations with elliptic curve cryptography
International Journal of Electronic Security and Digital Forensics
The tate pairing via elliptic nets
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
ISC'07 Proceedings of the 10th international conference on Information Security
Cryptography with fast point multiplication by using ASCII codes and its implementation
International Journal of Communication Networks and Distributed Systems
Computers and Electrical Engineering
Lambda coordinates for binary elliptic curves
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
Hi-index | 0.01 |
This paper presents an extensive and careful study of the software implementation on workstations of the NIST-recommended elliptic curves over binary fields. We also present the results of our implementation in C on a Pentium II 400MHz workstation.