scientific article; zbMATH DE number 1440061
From MaRDI portal
Publication:4950049
zbMATH Open0969.94021MaRDI QIDQ4950049FDOQ4950049
Authors: Katsuyuki Okeya, Hiroyuki Kurumatani, Kouichi Sakurai
Publication date: 3 October 2001
Title of this publication is not available (Why is that?)
Recommendations
- Elliptic curves and their applications to cryptography. An introduction
- scientific article; zbMATH DE number 2066373
- Elliptic curves and cryptography
- scientific article; zbMATH DE number 1349933
- scientific article; zbMATH DE number 1727433
- Elliptic curves for applications
- scientific article; zbMATH DE number 1377039
- scientific article; zbMATH DE number 5809439
- scientific article; zbMATH DE number 1936525
- Elliptic curves. Number theory and cryptography
Cryptography (94A60) Elliptic curves over global fields (11G05) Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Applications to coding theory and cryptography of arithmetic geometry (14G50)
Cited In (11)
- Montgomery’s Trick and Fast Implementation of Masked AES
- Towards practical key exchange from ordinary isogeny graphs
- A review of mathematical and computational aspects of CSIDH algorithms
- Toric forms of elliptic curves and their arithmetic
- Two kinds of division polynomials for twisted Edwards curves
- Quantum lattice enumeration and tweaking discrete pruning
- The \(\mathbb Q\)-curve construction for endomorphism-accelerated elliptic curves
- Isogenies on twisted Hessian curves
- Power analysis to ECC using differential power between multiplication and squaring
- Twisted Edwards Curves
- Connecting Legendre with Kummer and Edwards
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4950049)