Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation (Q3011912): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(4 intermediate revisions by 4 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: EFD / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-642-21969-6_11 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W79711112 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Computer Algorithm for Calculating the Product AB Modulo M / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3043950 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4426683 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4502796 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Co-Z Addition Formulæ and Binary Ladders on Elliptic Curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4826108 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4417414 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3043945 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4425714 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Elliptic Curve Cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941869 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Elliptic-Curve-Based Security Processor for RFID / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4950061 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Power Analysis Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Point Addition Formulae for ECC Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4718481 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Speeding the Pollard and Elliptic Curve Methods of Factorization / rank
 
Normal rank
Property / cites work
 
Property / cites work: A method for obtaining digital signatures and public-key cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4425738 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Checking before output may not be enough against fault-based cryptanalysis / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 05:28, 4 July 2024

scientific article
Language Label Description Also known as
English
Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation
scientific article

    Statements

    Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation (English)
    0 references
    0 references
    0 references
    0 references
    29 June 2011
    0 references
    public-key cryptography
    0 references
    elliptic curves
    0 references
    co-\(Z\) coordinates
    0 references
    out-of-place formulæ
    0 references
    Montgomery ladder
    0 references
    embedded systems
    0 references

    Identifiers