Zobrazeno 1 - 10
of 126
pro vyhledávání: '"Schoof–Elkies–Atkin algorithm"'
Publikováno v:
Mathematics of Computation, 2005 Jan 01. 74(249), 429-454.
Externí odkaz:
https://www.jstor.org/stable/4100255
Publikováno v:
Mathematics of Computation, 2008 Jul 01. 77(263), 1755-1778.
Externí odkaz:
https://www.jstor.org/stable/40234583
Publikováno v:
IET Information Security. 11:195-198
Scalar multiplication is the most important and expensive operation in elliptic curve cryptosystems. In this study, the authors improve the efficiency of the elliptic net algorithm to compute scalar multiplication by using the equivalence of elliptic
Publikováno v:
Advances in Mathematics of Communications. 11:453-469
The negation map can be used to speed up the computation of elliptic curve discrete logarithms using either the baby-step giant-step algorithm (BSGS) or Pollard rho. Montgomery's simultaneous modular inversion can also be used to speed up Pollard rho
Autor:
Karim Bigou, Arnaud Tisserand
Publikováno v:
IEEE Transactions on Computers
IEEE Transactions on Computers, 2016, 65 (11), pp.3495-3501. ⟨10.1109/TC.2016.2529625⟩
IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers, 2016, 65 (11), pp.3495-3501. ⟨10.1109/TC.2016.2529625⟩
IEEE Transactions on Computers, 2016, 65 (11), pp.3495-3501. ⟨10.1109/TC.2016.2529625⟩
IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers, 2016, 65 (11), pp.3495-3501. ⟨10.1109/TC.2016.2529625⟩
International audience; A fast RNS modular inversion for finite fields arithmetic has been published at CHES 2013 conference. It is based on the binary version of the plus-minus Euclidean algorithm. In the context of elliptic curve cryptography (i.e.
Autor:
Bing-Long Chen, Chang-An Zhao
Publikováno v:
IEEE Transactions on Computers. 65:2903-2909
In this paper we propose a modified Elliptic Net algorithm to compute pairings. By reducing the number of the intermediate variables which should be updated in the iteration loop of the Elliptic Net algorithm, we speed up the computation of pairings.
Publikováno v:
Multimedia Tools and Applications. 75:14819-14831
In this work, we propose an algorithm to produce the Triple-base chain that optimize the time usage for computing an elliptic curve cryptosystem. Triple-base Chain is a scalar multiplication algorithm, which represents an integer k using three bases
Autor:
Russ Housley
This document describes the conventions for using Elliptic Curve Diffie-Hellman (ECDH) key agreement algorithm using curve25519 and curve448 in the Cryptographic Message Syntax (CMS).
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8c24c3e702a591e4a62b5856c091867c
https://doi.org/10.17487/rfc8418
https://doi.org/10.17487/rfc8418
Publikováno v:
Progress in Cryptology – INDOCRYPT 2018 ISBN: 9783030053772
INDOCRYPT
INDOCRYPT
In this paper, we describe a new Las Vegas algorithm to solve the elliptic curve discrete logarithm problem. The algorithm depends on a property of the group of rational points on an elliptic curve and is thus not a generic algorithm. The algorithm t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7a8e4239fa450013897966cc5152c194
https://doi.org/10.1007/978-3-030-05378-9_12
https://doi.org/10.1007/978-3-030-05378-9_12
Publikováno v:
Procedia Computer Science. 54:73-82
Elliptic Curve Cryptography has been a recent research area in the field of Cryptography. It provides higher level of security with lesser key size compared to other Cryptographic techniques. A new technique has been proposed in this paper where the