Fast Bit-Level, Word-Level and Parallel Arithmetic in Finite Fields for Elliptic Curve Cryptosystems (1998)

by Alper Halbutogullar

Active Bibliography

SEC 1: Elliptic . . . – n.n. - 2000
5 Efficient Algorithms for Implementing Elliptic Curve Public-Key Schemes – Dan Beauregard - 1996
Public Key Cryptography For The Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography – unknown authors - 1999
66 Efficient Algorithms for Elliptic Curve Cryptosystems – Jorge Guajardo - 1997
29 An Overview of Elliptic Curve Cryptography – Julio López, Ricardo Dahab - 2000
1 Computational Methods in Public Key Cryptology – Arjen K. Lenstra - 2002
Équipe CAIRN- ENSSAT et L’École Politechnique de Silésie à Gliwice – Thèse Université, De Rennes, Docteur De, L’université De Rennes, Danuta Pamula, Électronique Et Informatique, Aleksander Nawrat, Liam Marnane, Romuald Rocher, Arnaud Tisserand, Edward Hrynkiewicz, Danuta Pamuła - 2012
7 Fast Algorithms for Elliptic Curve Cryptosystems over Binary Finite Field – Yongfei Han, Peng-chor Leong, Peng-chong Tan, Jiang Zhang - 1999
1 Comparing the MOV and FR Reductions in Elliptic Curve Cryptography – Ryuichi Harasawa, Junji Shikata, Joe Suzuki, Hideki Imai - 1999
Fast Software Exponentiation in GF(2^k) – C. K. Koc, T. Acar - 1997
39 On the Performance of Signature Schemes based on Elliptic Curves – Erik De Win, Serge Mister, Bart Preneel, Michael Wiener - 1998
1 Counting points on elliptic curves over F p n using Couveignes's algorithm – Reynald Lercier, François Morain - 1995
26 The Diffie-Hellman Protocol – Ueli M. Maurer, Stefan Wolf - 1999
Public Key Cryptography For The Financial Services Industry: The Elliptic . . . – n.n. - 1998
19 Elliptic curve cryptosystems on reconfigurable hardware – Martin Christopher Rosner - 1998
14 Fast Hashing Onto Elliptic Curves Over Fields of Characteristic 3 – Paulo Barreto, Hae Y. Kim, Scopus Tecnologia S. A - 2001
5 Elliptic Curve Cryptography on Smart Cards – Henna Pietiläinen, Henna Pietilinen - 2000
12 Implementing Network Security Protocols based on Elliptic CurveCryptog y – M. Aydos, E. Savas, C. K. Koc, Ç. K. Koç - 1999
10 Elliptic & hyperelliptic curves on embedded µp – Thomas Wollinger, Jan Pelzl, Volker Wittelsberger