Public Key Cryptography - PKC 2006

From MaRDI portal
Publication:5898945

DOI10.1007/11745853zbMath1151.94480OpenAlexW4205680410MaRDI QIDQ5898945

Daniel J. Bernstein

Publication date: 2 May 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11745853




Related Items (73)

Fast cryptography in genus 2Kummer versus Montgomery Face-off over Prime Order FieldsOblivious TLS via multi-party computationMany a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key ExchangeHigh-throughput elliptic curve cryptography using AVX2 vector instructionsElliptic curve with Optimal mixed Montgomery-Edwards model for low-end devicesAn efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniableOn the statistical leak of the GGH13 multilinear map and some variantsLow-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR ProcessorsA Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA)Implementing and measuring \textsf{KEMTLS}An authenticated key scheme over elliptic curves for topological networksDistribution of elliptic twin primes in isogeny and isomorphism classesThe \(\mathbb Q\)-curve construction for endomorphism-accelerated elliptic curvesVerifying constant-time implementations by abstract interpretationGeneralised Mersenne numbers revisitedThe complete cost of cofactor \(h=1\)The Simplest Protocol for Oblivious TransferTwisted Hessian CurvesFast Implementation of Curve25519 Using AVX2Full-Size High-Security ECC Implementation on MSP430 MicrocontrollersTweetNaCl: A Crypto Library in 100 TweetsHigh-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollersElligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random StringsSecurity Analysis of CPaceProvably unforgeable threshold EdDSA with an offline participant and trustless setupDiSSECT: distinguisher of standard and simulated elliptic curves via traitsProtecting the most significant bits in scalar multiplication algorithmsTwisted Edwards CurvesNew Differential-Algebraic Attacks and Reparametrization of RainbowGenus 2 point counting over prime fieldsImproved straight-line extraction in the random oracle model with applications to signature aggregationTime-efficient finite field microarchitecture design for Curve448 and Ed448 on Cortex-M4\textsc{SwiftEC}: Shallue-van de Woestijne indifferentiable function to elliptic curves. Faster indifferentiable hashing to elliptic curvesBatching base oblivious transfersSemantic foundations for cost analysis of pipeline-optimized programsFinite field arithmetic in large characteristic for classical and post-quantum cryptographyA one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attackFast, uniform scalar multiplication for genus 2 Jacobians with fast KummersFour\(\mathbb {Q}\)NEON: faster elliptic curve scalar multiplications on ARM processorsImproving speed and security in updatable encryption schemesB-SIDH: supersingular isogeny Diffie-Hellman using twisted torsionA formal security analysis of the Signal messaging protocolComputing supersingular isogenies on Kummer surfacesEndomorphisms for faster elliptic curve cryptography on a large class of curvesEPG-representations with Small Grid-SizeConnecting Legendre with Kummer and EdwardsFaster Addition and Doubling on Elliptic CurvesSharing of Encrypted Files in Blockchain Made SimplerEnergy efficient modular exponentiation for public-key cryptography based on bit forwarding techniquesHow to (pre-)compute a ladder -- improving the performance of X25519 and X448Toric forms of elliptic curves and their arithmeticEquidistribution among cosets of elliptic curve points in intervalsPost-Quantum Forward-Secure Onion RoutingToward Acceleration of RSA Using 3D Graphics HardwareCryptography on twisted Edwards curves over local fieldsHigh-performance Implementation of Elliptic Curve Cryptography Using Vector InstructionsSandy2x: New Curve25519 Speed RecordsThe arithmetic of characteristic 2 Kummer surfaces and of elliptic Kummer linesEndomorphisms for Faster Elliptic Curve Cryptography on a Large Class of CurvesFour-dimensional Gallant-Lambert-Vanstone scalar multiplicationConstruction of strong elliptic curves suitable for cryptographic applicationsKummer for genus one over prime-order fieldsEnergy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor NodesAnalysing the HPKE standardFast Elliptic-Curve Cryptography on the Cell Broadband EngineAn efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniableEfficient Algorithms for Supersingular Isogeny Diffie-HellmanOpenPGP email forwarding via diverted elliptic curve Diffie-Hellman key exchangesEfficient arithmetic in (pseudo-)Mersenne prime order fieldsOn succinct arguments and witness encryption from groupsBitcoin security with a twisted Edwards curvePSI from PaXoS: fast, malicious private set intersection


Uses Software



This page was built for publication: Public Key Cryptography - PKC 2006