The state of elliptic curve cryptography

From MaRDI portal
Revision as of 16:40, 1 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:1976039

DOI10.1023/A:1008354106356zbMath0996.94032MaRDI QIDQ1976039

Scott A. Vanstone, Neal Koblitz, Alfred J. Menezes

Publication date: 22 October 2002

Published in: Designs, Codes and Cryptography (Search for Journal in Brave)





Related Items (30)

An efficient self-certified multi-proxy signature scheme based on elliptic curve discrete logarithm problemAn anonymous SIP authenticated key agreement protocol based on elliptic curve cryptographyAn efficient ECDSA-based signature scheme for wireless networksNew lattice attacks on DSA schemesOn the number of optimal base 2 representations of integersBootstrapping for approximate homomorphic encryptionA chaotic maps-based authenticated key agreement protocol with strong anonymityWeil polynomials of abelian varieties over finite fields with many rational pointsProvably secure randomized blind signature scheme based on bilinear pairingGuest editorial: Special issue in honor of Scott A. VanstoneAn application of crypto cloud computing in social networks by cooperative game theorySome lattice attacks on DSA and ECDSAEfficient certificateless proxy signature scheme with provable securityStrongly secure certificateless signature scheme supporting batch verificationMulti-recastable e-bidding game with dual-blindnessThe Diffie-Hellman key exchange protocol and non-Abelian nilpotent groupsConvertible multi-authenticated encryption schemeSimple authenticated key agreement and protected password change protocolA threshold signature scheme based on the elliptic curve cryptosystemA nonlinear elliptic curve cryptosystem based on matricesProvably convertible multi-authenticated encryption scheme for generalized group communicationsAn efficient undeniable group-oriented signature schemeAttacking (EC)DSA scheme with ephemeral keys sharing specific bitsGlobal Duality, Signature Calculus and the Discrete Logarithm ProblemAn efficient hierarchical key management scheme based on elliptic curvesSelf-certified multi-proxy signature schemes with message recoveryA new cryptosystem based on a twisted Hessian curve \(H^4_{a,d}\)Designated verifier proxy signature scheme with message recoverySeveral security schemes constructed using ECC-based self-certified public key cryptosystemsA Simple Generalization of the ElGamal Cryptosystem to Non-Abelian Groups II







This page was built for publication: The state of elliptic curve cryptography