Sciweavers

35 search results - page 6 / 7
» Generating Elliptic Curves of Prime Order
Sort
View
IPPS
2006
IEEE
13 years 11 months ago
Parallel calculation of volcanoes for cryptographic uses
Elliptic curve cryptosystems are nowadays widely used in the design of many security devices. Nevertheless, since not every elliptic curve is useful for cryptographic purposes, me...
Santi Martínez, R. Tomas, C. Roig, Magda Va...
CARDIS
2000
Springer
124views Hardware» more  CARDIS 2000»
13 years 10 months ago
Elliptic Curve Cryptography on Smart Cards without Coprocessors
Abstract This contribution describes how an elliptic curve cryptosystem can be implemented on very low cost microprocessors with reasonable performance. We focus in this paper on t...
Adam D. Woodbury, Daniel V. Bailey, Christof Paar
CRYPTO
2003
Springer
124views Cryptology» more  CRYPTO 2003»
13 years 11 months ago
Primality Proving via One Round in ECPP and One Iteration in AKS
On August 2002, Agrawal, Kayal and Saxena announced the first deterministic and polynomial time primality testing algorithm. For an input n, the AKS algorithm runs in heuristic t...
Qi Cheng
TAMC
2010
Springer
13 years 10 months ago
Twisted Jacobi Intersections Curves
In this paper, the twisted Jacobi intersections which contains Jacobi intersections as a special case is introduced. We show that every elliptic curve over the prime field with t...
Rongquan Feng, Menglong Nie, Hongfeng Wu
CHES
2006
Springer
125views Cryptology» more  CHES 2006»
13 years 9 months ago
Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware
A novel portable hardware architecture of the Elliptic Curve Method of factoring, designed and optimized for application in the relation collection step of the Number Field Sieve,...
Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbr...