The following pages link to Elliptic Curve Cryptosystems (Q3760431):
Displaying 50 items.
- Fast cryptography in genus 2 (Q271578) (← links)
- Nonlinearities in elliptic curve authentication (Q296311) (← links)
- A new two-round dynamic authenticated contributory group key agreement protocol using elliptic curve Diffie-Hellman with privacy preserving public key infrastructure (Q301801) (← links)
- A reduction of semigroup DLP to classic DLP (Q306053) (← links)
- Analysis of the fault attack ECDLP over prime field (Q410803) (← links)
- An efficient collision detection method for computing discrete logarithms with Pollard's rho (Q411043) (← links)
- Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring \(Z_{N}\) (Q429602) (← links)
- First-order side channel attacks on Zhang's countermeasures (Q433061) (← links)
- Efficient precomputation schemes of \(kP+lQ\) (Q436568) (← links)
- Improved Pollard rho method for computing discrete logarithms over finite extension fields (Q442714) (← links)
- Computing elliptic curve discrete logarithms with the negation map (Q454851) (← links)
- An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments (Q458506) (← links)
- A novel elliptic curve scalar multiplication algorithm against power analysis (Q474700) (← links)
- Using symmetries in the index calculus for elliptic curves discrete logarithm (Q484325) (← links)
- Extended elliptic curve Montgomery ladder algorithm over binary fields with resistance to simple power analysis (Q497571) (← links)
- Computational hardness of IFP and ECDLP (Q505664) (← links)
- Provably secure proxy convertible authenticated encryption scheme based on RSA (Q506763) (← links)
- A new method for decomposition in the Jacobian of small genus hyperelliptic curves (Q510414) (← links)
- Multiple point compression on elliptic curves (Q521859) (← links)
- An alternative class of irreducible polynomials for optimal extension fields (Q543428) (← links)
- A new threshold authenticated encryption scheme using labor-division signature (Q545432) (← links)
- Toric forms of elliptic curves and their arithmetic (Q548601) (← links)
- ID-based threshold digital signature schemes on the elliptic curve discrete logarithm problem (Q556108) (← links)
- The generalized Weil pairing and the discrete logarithm problem on elliptic curves (Q596141) (← links)
- Traces of the group law on the Kummer surface of a curve of genus 2 in characteristic 2 (Q626948) (← links)
- Redundant \(\tau \)-adic expansions. I: Non-adjacent digit sets and their applications to scalar multiplication (Q629938) (← links)
- On the distribution of the coefficients of normal forms for Frobenius expansions (Q634134) (← links)
- Fault-based attack on Montgomery's ladder algorithm (Q656523) (← links)
- Private key agreement and secure communication for heterogeneous sensor networks (Q666197) (← links)
- A chosen message attack on Demytko's elliptic curve cryptosystem (Q676832) (← links)
- A traceable proxy multisignature scheme based on the elliptic curve cryptosystem (Q702590) (← links)
- Cyclicity of elliptic curves modulo \(p\) and elliptic curve analogues of Linnik's problem (Q707424) (← links)
- A new generalization of the KMOV cryptosystem (Q721553) (← links)
- Cryptanalysis of a key exchange scheme based on block matrices (Q726474) (← links)
- Index calculus for abelian varieties of small dimension and the elliptic curve discrete logarithm problem (Q733510) (← links)
- A public key cryptosystem based on Diophantine equations of degree increasing type (Q740123) (← links)
- On the isomorphism classes of Legendre elliptic curves over finite fields (Q763675) (← links)
- Complete addition formulas on the level four theta model of elliptic curves (Q780585) (← links)
- Counting points on \(C_{ab}\) curves using Monsky-Washnitzer cohomology (Q814764) (← links)
- Improved supersingularity testing of elliptic curves using Legendre form (Q831974) (← links)
- On index calculus algorithms for subfield curves (Q832332) (← links)
- A metric on the set of elliptic curves over \(\mathbb{F}_p\) (Q847404) (← links)
- A review on the isomorphism classes of hyperelliptic curves of genus 2 over finite fields admitting a Weierstrass point (Q850776) (← links)
- Efficient hardware implementation of finite fields with applications to cryptography (Q850794) (← links)
- Isomorphism classes of hyperelliptic curves of genus 2 over finite fields with characteristic 2 (Q854643) (← links)
- Fast elliptic scalar multiplication using new double-base chain and point halving (Q865543) (← links)
- Efficient elliptic curve scalar multiplication algorithms resistant to power analysis (Q881859) (← links)
- High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers (Q887435) (← links)
- Horizontal collision correlation attack on elliptic curves (Q892284) (← links)
- Fault attacks on hyperelliptic curve discrete logarithm problem over binary field (Q893699) (← links)