The state of elliptic curve cryptography
From MaRDI portal
Publication:1976039
DOI10.1023/A:1008354106356zbMath0996.94032MaRDI QIDQ1976039
Scott A. Vanstone, Neal Koblitz, Alfred J. Menezes
Publication date: 22 October 2002
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Applications to coding theory and cryptography of arithmetic geometry (14G50)
Related Items
An efficient self-certified multi-proxy signature scheme based on elliptic curve discrete logarithm problem ⋮ An anonymous SIP authenticated key agreement protocol based on elliptic curve cryptography ⋮ An efficient ECDSA-based signature scheme for wireless networks ⋮ New lattice attacks on DSA schemes ⋮ On the number of optimal base 2 representations of integers ⋮ Bootstrapping for approximate homomorphic encryption ⋮ A chaotic maps-based authenticated key agreement protocol with strong anonymity ⋮ Weil polynomials of abelian varieties over finite fields with many rational points ⋮ Provably secure randomized blind signature scheme based on bilinear pairing ⋮ Guest editorial: Special issue in honor of Scott A. Vanstone ⋮ An application of crypto cloud computing in social networks by cooperative game theory ⋮ Some lattice attacks on DSA and ECDSA ⋮ Efficient certificateless proxy signature scheme with provable security ⋮ Strongly secure certificateless signature scheme supporting batch verification ⋮ Multi-recastable e-bidding game with dual-blindness ⋮ The Diffie-Hellman key exchange protocol and non-Abelian nilpotent groups ⋮ Convertible multi-authenticated encryption scheme ⋮ Simple authenticated key agreement and protected password change protocol ⋮ A threshold signature scheme based on the elliptic curve cryptosystem ⋮ A nonlinear elliptic curve cryptosystem based on matrices ⋮ Provably convertible multi-authenticated encryption scheme for generalized group communications ⋮ An efficient undeniable group-oriented signature scheme ⋮ Global Duality, Signature Calculus and the Discrete Logarithm Problem ⋮ An efficient hierarchical key management scheme based on elliptic curves ⋮ Self-certified multi-proxy signature schemes with message recovery ⋮ A new cryptosystem based on a twisted Hessian curve \(H^4_{a,d}\) ⋮ Designated verifier proxy signature scheme with message recovery ⋮ Several security schemes constructed using ECC-based self-certified public key cryptosystems ⋮ A Simple Generalization of the ElGamal Cryptosystem to Non-Abelian Groups II