Sciweavers

126 search results - page 4 / 26
» On the Use of Weber Polynomials in Elliptic Curve Cryptograp...
Sort
View
INDOCRYPT
2001
Springer
13 years 11 months ago
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography
We present an algorithm for generating elliptic curves of prime order over Optimal Extension Fields suitable for use in cryptography. The algorithm is based on the theory of Comple...
Harald Baier
ESORICS
2004
Springer
14 years 22 days ago
A Public-Key Encryption Scheme with Pseudo-random Ciphertexts
This work presents a practical public-key encryption scheme that offers security under adaptive chosen-ciphertext attack (CCA) and has pseudo-random ciphertexts, i.e. ciphertexts ...
Bodo Möller
CHES
2004
Springer
89views Cryptology» more  CHES 2004»
14 years 23 days ago
Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic
Erdinç Öztürk, Berk Sunar, Erkay ...
CRYPTOLOGIA
2007
116views more  CRYPTOLOGIA 2007»
13 years 7 months ago
Oblivious Transfer Using Elliptic Curves
In this article we propose an algorithm for oblivious transfer using elliptic curves. Also, we present its application to chosen one-out-of-two oblivious transfer. Keywords Ellipti...
Abhishek Parakh
CHES
2010
Springer
132views Cryptology» more  CHES 2010»
13 years 8 months ago
Efficient Techniques for High-Speed Elliptic Curve Cryptography
In this paper, a thorough bottom-up optimization process (field, point and scalar arithmetic) is used to speed up the computation of elliptic curve point multiplication and report ...
Patrick Longa, Catherine H. Gebotys