133
click to vote
AAECC
15 years 4 months ago
2003 Springer
Elliptic curve cryptosystems are usually implemented over fields of characteristic two or over (large) prime fields. For large prime fields, projective coordinates are more suitabl...
116
click to vote
AAECC
15 years 6 months ago
2003 Springer
A pirate is a person who buys a legal copy of a copyrighted work and who reproduces it to sell illegal copies. Artists and authors are worried as they do not get the income which i...
AAECC
15 years 6 months ago
2003 Springer
We examine 2-dimensional 3-dispersion lattice interleavers in three connectivity models: the rectangular grid with either 4 or 8 neighbors, and the hexagonal grid. We provide tight...
116
click to vote
AAECC
15 years 6 months ago
2003 Springer
Abstract. A way for preventing SPA-like attacks on elliptic curve systems is to use the same formula for the doubling and the general addition of points on the curve. Various propo...
AAECC
15 years 4 months ago
2003 Springer
Abstract. We prove lower bounds on the degree of polynomials interpolating the Diffie
|