The state of elliptic curve cryptography

From MaRDI portal
Publication:1976039

DOI10.1023/A:1008354106356zbMath0996.94032MaRDI QIDQ1976039

Scott A. Vanstone, Neal Koblitz, Alfred J. Menezes

Publication date: 22 October 2002

Published in: Designs, Codes and Cryptography (Search for Journal in Brave)




Related Items

An efficient self-certified multi-proxy signature scheme based on elliptic curve discrete logarithm problemAn anonymous SIP authenticated key agreement protocol based on elliptic curve cryptographyAn efficient ECDSA-based signature scheme for wireless networksNew lattice attacks on DSA schemesOn the number of optimal base 2 representations of integersBootstrapping for approximate homomorphic encryptionA chaotic maps-based authenticated key agreement protocol with strong anonymityWeil polynomials of abelian varieties over finite fields with many rational pointsProvably secure randomized blind signature scheme based on bilinear pairingGuest editorial: Special issue in honor of Scott A. VanstoneAn application of crypto cloud computing in social networks by cooperative game theorySome lattice attacks on DSA and ECDSAEfficient certificateless proxy signature scheme with provable securityStrongly secure certificateless signature scheme supporting batch verificationMulti-recastable e-bidding game with dual-blindnessThe Diffie-Hellman key exchange protocol and non-Abelian nilpotent groupsConvertible multi-authenticated encryption schemeSimple authenticated key agreement and protected password change protocolA threshold signature scheme based on the elliptic curve cryptosystemA nonlinear elliptic curve cryptosystem based on matricesProvably convertible multi-authenticated encryption scheme for generalized group communicationsAn efficient undeniable group-oriented signature schemeGlobal Duality, Signature Calculus and the Discrete Logarithm ProblemAn efficient hierarchical key management scheme based on elliptic curvesSelf-certified multi-proxy signature schemes with message recoveryA new cryptosystem based on a twisted Hessian curve \(H^4_{a,d}\)Designated verifier proxy signature scheme with message recoverySeveral security schemes constructed using ECC-based self-certified public key cryptosystemsA Simple Generalization of the ElGamal Cryptosystem to Non-Abelian Groups II