scientific article; zbMATH DE number 1440061
From MaRDI portal
Publication:4950049
Recommendations
- Elliptic curves and their applications to cryptography. An introduction
- scientific article; zbMATH DE number 2066373
- Elliptic curves and cryptography
- scientific article; zbMATH DE number 1349933
- scientific article; zbMATH DE number 1727433
- Elliptic curves for applications
- scientific article; zbMATH DE number 1377039
- scientific article; zbMATH DE number 5809439
- scientific article; zbMATH DE number 1936525
- Elliptic curves. Number theory and cryptography
Cited in
(11)- Montgomery’s Trick and Fast Implementation of Masked AES
- Towards practical key exchange from ordinary isogeny graphs
- Toric forms of elliptic curves and their arithmetic
- Two kinds of division polynomials for twisted Edwards curves
- A review of mathematical and computational aspects of CSIDH algorithms
- Quantum lattice enumeration and tweaking discrete pruning
- The Q-curve construction for endomorphism-accelerated elliptic curves
- Isogenies on twisted Hessian curves
- Power analysis to ECC using differential power between multiplication and squaring
- Twisted Edwards Curves
- Connecting Legendre with Kummer and Edwards
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4950049)