Sciweavers

173 search results - page 3 / 35
» Overview of Elliptic Curve Cryptography
Sort
View
INDOCRYPT
2001
Springer
13 years 10 months ago
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography
We present an algorithm for generating elliptic curves of prime order over Optimal Extension Fields suitable for use in cryptography. The algorithm is based on the theory of Comple...
Harald Baier
ESORICS
2004
Springer
13 years 11 months ago
A Public-Key Encryption Scheme with Pseudo-random Ciphertexts
This work presents a practical public-key encryption scheme that offers security under adaptive chosen-ciphertext attack (CCA) and has pseudo-random ciphertexts, i.e. ciphertexts ...
Bodo Möller
FCCM
2008
IEEE
145views VLSI» more  FCCM 2008»
14 years 6 days ago
High-Speed Elliptic Curve Cryptography Accelerator for Koblitz Curves
Kimmo U. Järvinen, Jorma O. Skyttä
ACISP
2007
Springer
13 years 9 months ago
Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography
This paper presents a new approach to precompute all odd points [3]P, [5]P, . . . , [2k - 1]P, k 2 on an elliptic curve over Fp. Those points are required for the efficient evalua...
Erik Dahmen, Katsuyuki Okeya, Daniel Schepers
CHES
2010
Springer
132views Cryptology» more  CHES 2010»
13 years 6 months ago
Efficient Techniques for High-Speed Elliptic Curve Cryptography
In this paper, a thorough bottom-up optimization process (field, point and scalar arithmetic) is used to speed up the computation of elliptic curve point multiplication and report ...
Patrick Longa, Catherine H. Gebotys