Sciweavers

190 search results - page 8 / 38
» Supersingular Elliptic Curves in Cryptography
Sort
View
ACNS
2009
Springer
124views Cryptology» more  ACNS 2009»
15 years 6 months ago
Novel Precomputation Schemes for Elliptic Curve Cryptosystems
We present an innovative technique to add elliptic curve points with the form P Q± , and discuss its application to the generation of precomputed tables for the scalar multiplicat...
Patrick Longa, Catherine H. Gebotys
JSC
2011
100views more  JSC 2011»
14 years 2 months ago
Toric forms of elliptic curves and their arithmetic
We scan a large class of one-parameter families of elliptic curves for efficient arithmetic. The construction of the class is inspired by toric geometry, which provides a natural ...
Wouter Castryck, Frederik Vercauteren
CHES
2004
Springer
89views Cryptology» more  CHES 2004»
15 years 5 months ago
Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic
Erdinç Öztürk, Berk Sunar, Erkay ...
ASIACRYPT
2006
Springer
15 years 3 months ago
Extending Scalar Multiplication Using Double Bases
Abstract. It has been recently acknowledged [4, 6, 9] that the use of double bases representations of scalars n, that is an expression of the form n = e,s,t(-1)e As Bt can speed up...
Roberto Maria Avanzi, Vassil S. Dimitrov, Christop...
CRYPTOLOGIA
2007
116views more  CRYPTOLOGIA 2007»
14 years 11 months ago
Oblivious Transfer Using Elliptic Curves
In this article we propose an algorithm for oblivious transfer using elliptic curves. Also, we present its application to chosen one-out-of-two oblivious transfer. Keywords Ellipti...
Abhishek Parakh