The following pages link to (Q4426683):
Displaying 10 items.
- Fast elliptic curve point multiplication based on binary and binary non-adjacent scalar form methods (Q1670419) (← links)
- Connecting Legendre with Kummer and Edwards (Q1726008) (← links)
- Fast elliptic curve point multiplication based on window non-adjacent form method (Q2335516) (← links)
- Improving the arithmetic of elliptic curves in the Jacobi model (Q2380005) (← links)
- Constructing Isogenies on Extended Jacobi Quartic Curves (Q2980870) (← links)
- Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation (Q3011912) (← links)
- Twisted Edwards Curves (Q3506395) (← links)
- Fast algorithms for computing isogenies between elliptic curves (Q3577024) (← links)
- Twisted Edwards Curves Revisited (Q3600383) (← links)
- What about Vulnerability to a Fault Attack of the Miller’s Algorithm During an Identity Based Protocol? (Q3634337) (← links)