Sciweavers

173 search results - page 18 / 35
» Overview of Elliptic Curve Cryptography
Sort
View
CTRSA
2005
Springer
78views Cryptology» more  CTRSA 2005»
14 years 3 months ago
New Minimal Weight Representations for Left-to-Right Window Methods
For an integer w ≥ 2, a radix 2 representation is called a width-w nonadjacent form (w-NAF, for short) if each nonzero digit is an odd integer with absolute value less than 2w−...
James A. Muir, Douglas R. Stinson
IJSN
2006
76views more  IJSN 2006»
13 years 9 months ago
Elliptic curve cryptography-based access control in sensor networks
: Access control in sensor networks is used to authorise and grant users the right to access the network and data collected by sensors. Different users have different access right ...
Haodong Wang, Bo Sheng, Qun Li
RECONFIG
2008
IEEE
184views VLSI» more  RECONFIG 2008»
14 years 4 months ago
FPGA Implementation of an Elliptic Curve Cryptosystem over GF(3^m)
This paper describes an efficient arithmetic processor for elliptic curve cryptography. The proposed processor consists of special architectural components, the most important of...
Ilker Yavuz, Siddika Berna Ors Yalcin, Çeti...
EUROCRYPT
2001
Springer
14 years 2 months ago
Finding Secure Curves with the Satoh-FGH Algorithm and an Early-Abort Strategy
The use of elliptic curves in cryptography relies on the ability to count the number of points on a given curve. Before 1999, the SEA algorithm was the only efficient method known ...
Mireille Fouquet, Pierrick Gaudry, Robert Harley
CHES
2005
Springer
149views Cryptology» more  CHES 2005»
14 years 3 months ago
Resistance of Randomized Projective Coordinates Against Power Analysis
Embedded devices implementing cryptographic services are the result of a trade-off between cost, performance and security. Aside from flaws in the protocols and the algorithms us...
William Dupuy, Sébastien Kunz-Jacques