Sciweavers

173 search results - page 5 / 35
» Overview of Elliptic Curve Cryptography
Sort
View
CRYPTOLOGIA
2007
116views more  CRYPTOLOGIA 2007»
14 years 11 months ago
Oblivious Transfer Using Elliptic Curves
In this article we propose an algorithm for oblivious transfer using elliptic curves. Also, we present its application to chosen one-out-of-two oblivious transfer. Keywords Ellipti...
Abhishek Parakh
ANTS
2004
Springer
114views Algorithms» more  ANTS 2004»
15 years 5 months ago
Montgomery Scalar Multiplication for Genus 2 Curves
Using powerful tools on genus 2 curves like the Kummer variety, we generalize the Montgomery method for scalar multiplication to the jacobian of these curves. Previously this metho...
Sylvain Duquesne
EUROCRYPT
2003
Springer
15 years 4 months ago
Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast Endomorphisms
Mathieu Ciet, Tanja Lange, Francesco Sica, Jean-Ja...
86
Voted
IEICET
2008
147views more  IEICET 2008»
14 years 11 months ago
Computing the Ate Pairing on Elliptic Curves with Embedding Degree k = 9
For AES 128 security level there are several natural choices for pairing-friendly elliptic curves. In particular, as we will explain, one might choose curves with k = 9 or curves w...
Xibin Lin, Changan Zhao, Fangguo Zhang, Yanming Wa...
ASAP
2010
IEEE
315views Hardware» more  ASAP 2010»
14 years 9 months ago
A compact FPGA-based architecture for elliptic curve cryptography over prime fields
Abstract--This paper proposes an FPGA-based applicationspecific elliptic curve processor over a prime field. This research targets applications for which compactness is more import...
Jo Vliegen, Nele Mentens, Jan Genoe, An Braeken, S...