Sciweavers

AAECC
2003
Springer
104views Algorithms» more  AAECC 2003»
13 years 8 months ago
Interpolation of the Elliptic Curve Diffie-Hellman Mapping
Abstract. We prove lower bounds on the degree of polynomials interpolating the Diffie
Tanja Lange, Arne Winterhof
AAECC
2003
Springer
165views Algorithms» more  AAECC 2003»
13 years 8 months ago
Fast Point Multiplication on Elliptic Curves through Isogenies
Elliptic curve cryptosystems are usually implemented over fields of characteristic two or over (large) prime fields. For large prime fields, projective coordinates are more suitabl...
Eric Brier, Marc Joye
AAECC
2003
Springer
119views Algorithms» more  AAECC 2003»
13 years 9 months ago
Optimal 2-Dimensional 3-Dispersion Lattices
We examine 2-dimensional 3-dispersion lattice interleavers in three connectivity models: the rectangular grid with either 4 or 8 neighbors, and the hexagonal grid. We provide tight...
Moshe Schwartz, Tuvi Etzion
AAECC
2003
Springer
139views Algorithms» more  AAECC 2003»
13 years 9 months ago
Fighting Two Pirates
A pirate is a person who buys a legal copy of a copyrighted work and who reproduces it to sell illegal copies. Artists and authors are worried as they do not get the income which i...
Hans Georg Schaathun
AAECC
2003
Springer
116views Algorithms» more  AAECC 2003»
13 years 9 months ago
The Jacobi Model of an Elliptic Curve and Side-Channel Analysis
Abstract. A way for preventing SPA-like attacks on elliptic curve systems is to use the same formula for the doubling and the general addition of points on the curve. Various propo...
Olivier Billet, Marc Joye