Public Key Cryptography - PKC 2006
From MaRDI portal
Publication:5898945
DOI10.1007/11745853zbMath1151.94480OpenAlexW4205680410MaRDI QIDQ5898945
Publication date: 2 May 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11745853
elliptic curvesDiffie-Hellmanpoint multiplicationhigh speedconstant timeshort keyshigh conjectured securitynew curvenew software
Cryptography (94A60) Elliptic curves over global fields (11G05) Applications to coding theory and cryptography of arithmetic geometry (14G50)
Related Items (73)
Fast cryptography in genus 2 ⋮ Kummer versus Montgomery Face-off over Prime Order Fields ⋮ Oblivious TLS via multi-party computation ⋮ Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange ⋮ High-throughput elliptic curve cryptography using AVX2 vector instructions ⋮ Elliptic curve with Optimal mixed Montgomery-Edwards model for low-end devices ⋮ An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable ⋮ On the statistical leak of the GGH13 multilinear map and some variants ⋮ Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors ⋮ A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA) ⋮ Implementing and measuring \textsf{KEMTLS} ⋮ An authenticated key scheme over elliptic curves for topological networks ⋮ Distribution of elliptic twin primes in isogeny and isomorphism classes ⋮ The \(\mathbb Q\)-curve construction for endomorphism-accelerated elliptic curves ⋮ Verifying constant-time implementations by abstract interpretation ⋮ Generalised Mersenne numbers revisited ⋮ The complete cost of cofactor \(h=1\) ⋮ The Simplest Protocol for Oblivious Transfer ⋮ Twisted Hessian Curves ⋮ Fast Implementation of Curve25519 Using AVX2 ⋮ Full-Size High-Security ECC Implementation on MSP430 Microcontrollers ⋮ TweetNaCl: A Crypto Library in 100 Tweets ⋮ High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers ⋮ Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings ⋮ Security Analysis of CPace ⋮ Provably unforgeable threshold EdDSA with an offline participant and trustless setup ⋮ DiSSECT: distinguisher of standard and simulated elliptic curves via traits ⋮ Protecting the most significant bits in scalar multiplication algorithms ⋮ Twisted Edwards Curves ⋮ New Differential-Algebraic Attacks and Reparametrization of Rainbow ⋮ Genus 2 point counting over prime fields ⋮ Improved straight-line extraction in the random oracle model with applications to signature aggregation ⋮ Time-efficient finite field microarchitecture design for Curve448 and Ed448 on Cortex-M4 ⋮ \textsc{SwiftEC}: Shallue-van de Woestijne indifferentiable function to elliptic curves. Faster indifferentiable hashing to elliptic curves ⋮ Batching base oblivious transfers ⋮ Semantic foundations for cost analysis of pipeline-optimized programs ⋮ Finite field arithmetic in large characteristic for classical and post-quantum cryptography ⋮ A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack ⋮ Fast, uniform scalar multiplication for genus 2 Jacobians with fast Kummers ⋮ Four\(\mathbb {Q}\)NEON: faster elliptic curve scalar multiplications on ARM processors ⋮ Improving speed and security in updatable encryption schemes ⋮ B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion ⋮ A formal security analysis of the Signal messaging protocol ⋮ Computing supersingular isogenies on Kummer surfaces ⋮ Endomorphisms for faster elliptic curve cryptography on a large class of curves ⋮ EPG-representations with Small Grid-Size ⋮ Connecting Legendre with Kummer and Edwards ⋮ Faster Addition and Doubling on Elliptic Curves ⋮ Sharing of Encrypted Files in Blockchain Made Simpler ⋮ Energy efficient modular exponentiation for public-key cryptography based on bit forwarding techniques ⋮ How to (pre-)compute a ladder -- improving the performance of X25519 and X448 ⋮ Toric forms of elliptic curves and their arithmetic ⋮ Equidistribution among cosets of elliptic curve points in intervals ⋮ Post-Quantum Forward-Secure Onion Routing ⋮ Toward Acceleration of RSA Using 3D Graphics Hardware ⋮ Cryptography on twisted Edwards curves over local fields ⋮ High-performance Implementation of Elliptic Curve Cryptography Using Vector Instructions ⋮ Sandy2x: New Curve25519 Speed Records ⋮ The arithmetic of characteristic 2 Kummer surfaces and of elliptic Kummer lines ⋮ Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves ⋮ Four-dimensional Gallant-Lambert-Vanstone scalar multiplication ⋮ Construction of strong elliptic curves suitable for cryptographic applications ⋮ Kummer for genus one over prime-order fields ⋮ Energy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor Nodes ⋮ Analysing the HPKE standard ⋮ Fast Elliptic-Curve Cryptography on the Cell Broadband Engine ⋮ An efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniable ⋮ Efficient Algorithms for Supersingular Isogeny Diffie-Hellman ⋮ OpenPGP email forwarding via diverted elliptic curve Diffie-Hellman key exchanges ⋮ Efficient arithmetic in (pseudo-)Mersenne prime order fields ⋮ On succinct arguments and witness encryption from groups ⋮ Bitcoin security with a twisted Edwards curve ⋮ PSI from PaXoS: fast, malicious private set intersection
Uses Software
This page was built for publication: Public Key Cryptography - PKC 2006