Advances in Elliptic Curve Cryptography

From MaRDI portal
Publication:5463612

DOI10.1017/CBO9780511546570zbMath1089.94018MaRDI QIDQ5463612

No author found.

Publication date: 5 August 2005





Related Items

Pairing-based cryptography on elliptic curvesA theta model for elliptic curvesConstructing locally leakage-resilient linear secret-sharing schemesFaster Ate pairing computation on Selmer's model of elliptic curvesTrapdoor DDH groups from pairings and isogeniesHECC (Hyperelliptic Curve Cryptography)Multibase scalar multiplications in cryptographic pairingsPower Analysis to ECC Using Differential Power Between Multiplication and SquaringSequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oraclesEfficient pairing computation on supersingular abelian varietiesGeneralised Mersenne numbers revisitedComplexity of computation in finite fieldsBreaking the decisional Diffie-Hellman problem for class group actions using genus theory: extended versionA survey of fault attacks in pairing based cryptographyFast subgroup membership testings for \(\mathbb{G}_1, \mathbb{G}_2\) and \(\mathbb{G}_T\) on pairing-friendly curvesOn the Security of Supersingular Isogeny CryptosystemsElliptic curves withj= 0,1728 and low embedding degreeOn isogeny classes of Edwards curves over finite fieldsShort signatures without random oracles and the SDH assumption in bilinear groupsFast hashing to \(\mathbb{G}_2\) on pairing-friendly curves with the lack of twistsPolynomial approximation of bilinear Diffie-Hellman mapsWeak instances of class group action based cryptography via self-pairingsThe "Elliptic" matrices and a new kind of cryptographyA Tree-Based Approach for Computing Double-Base ChainsSolving discrete logarithms on a 170-bit MNT curve by pairing reductionFinding composite order ordinary elliptic curves using the Cocks-Pinch methodConstructing pairing-friendly hyperelliptic curves using Weil restrictionRadical isogeniesFour decades of research on bent functionsRecent progress on the elliptic curve discrete logarithm problemScalable group key exchange protocol with provable securityHeuristics of the Cocks-Pinch methodOn Edwards curves and ZVP-attacksThe pairing computation on Edwards curvesFaster Addition and Doubling on Elliptic CurvesA novel elliptic curve scalar multiplication algorithm against power analysisOn hardware and software implementation of arithmetic in finite fields of characteristic 7 for calculation of pairingsOn the number of isogeny classes of pairing-friendly elliptic curves and statistics of MNT curvesON BOUNDS FOR BALANCED EMBEDDING DEGREEFixed argument pairing inversion on elliptic curvesАтаки на схемы электронной подписи, не учитываемые традиционными определениями стойкости, и меры противодействия имSupersingular Isogeny-based Cryptography: A SurveyNew designing of cryptosystems based on quadratic fieldsOn the Computation of Class Polynomials with “Thetanullwerte” and Its Applications to the Unit Group ComputationAlgebraic curves and cryptographyEfficient Self-pairing on Ordinary Elliptic CurvesHuff’s Model for Elliptic CurvesA taxonomy of pairing-friendly elliptic curvesProtecting ECC against fault attacks: the ring extension method revisitedPairing-Friendly Hyperelliptic Curves with Ordinary Jacobians of Type y 2 = x 5 + axThe double-base number system and its application to elliptic curve cryptographyAn Analysis of Affine Coordinates for Pairing ComputationAn Analysis of the Vector Decomposition ProblemAn identity-based strongly unforgeable signature without random oracles from bilinear pairingsConstructing Pairing-Friendly Elliptic Curves Using Gröbner Basis ReductionCryptography on twisted Edwards curves over local fieldsPairings for cryptographersОб алгоритмах построения изогений эллиптических кривых над конечными полями и их приложенияхО вычислении кратных точек на эллиптических кривых над конечными полями с использованием нескольких оснований систем счисления и новых видов координатBinary Huff CurvesStatistics about elliptic curves over finite prime fieldsBreaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive OpeningA short-list of pairing-friendly curves resistant to special TNFS at the 128-bit security levelA Schnorr-Like Lightweight Identity-Based Signature SchemeOn the Final Exponentiation for Calculating Pairings on Ordinary Elliptic CurvesFast Hashing to G 2 on Pairing-Friendly CurvesDistinguishing Multiplications from Squaring OperationsOn the Efficient Implementation of Pairing-Based ProtocolsEfficient Algorithms for Supersingular Isogeny Diffie-HellmanEscrow-free encryption supporting cryptographic workflowA Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor NetworksEfficient system parameters for Identity-Based Encryption using supersingular elliptic curvesAnother Approach to Pairing Computation in Edwards CoordinatesStill wrong use of pairings in cryptographyBreaking the decisional Diffie-Hellman problem for class group actions using genus theory