Sciweavers

190 search results - page 8 / 38
» Supersingular Elliptic Curves in Cryptography
Sort
View
93
Voted
ACNS
2009
Springer
124views Cryptology» more  ACNS 2009»
15 years 8 months ago
Novel Precomputation Schemes for Elliptic Curve Cryptosystems
We present an innovative technique to add elliptic curve points with the form P Q± , and discuss its application to the generation of precomputed tables for the scalar multiplicat...
Patrick Longa, Catherine H. Gebotys
110
Voted
JSC
2011
100views more  JSC 2011»
14 years 4 months ago
Toric forms of elliptic curves and their arithmetic
We scan a large class of one-parameter families of elliptic curves for efficient arithmetic. The construction of the class is inspired by toric geometry, which provides a natural ...
Wouter Castryck, Frederik Vercauteren
CHES
2004
Springer
89views Cryptology» more  CHES 2004»
15 years 7 months ago
Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic
Erdinç Öztürk, Berk Sunar, Erkay ...
ASIACRYPT
2006
Springer
15 years 5 months ago
Extending Scalar Multiplication Using Double Bases
Abstract. It has been recently acknowledged [4, 6, 9] that the use of double bases representations of scalars n, that is an expression of the form n = e,s,t(-1)e As Bt can speed up...
Roberto Maria Avanzi, Vassil S. Dimitrov, Christop...
CRYPTOLOGIA
2007
116views more  CRYPTOLOGIA 2007»
15 years 1 months ago
Oblivious Transfer Using Elliptic Curves
In this article we propose an algorithm for oblivious transfer using elliptic curves. Also, we present its application to chosen one-out-of-two oblivious transfer. Keywords Ellipti...
Abhishek Parakh