Sciweavers

173 search results - page 4 / 35
» Overview of Elliptic Curve Cryptography
Sort
View
AAECC
2003
Springer
165views Algorithms» more  AAECC 2003»
14 years 1 months ago
Fast Point Multiplication on Elliptic Curves through Isogenies
Elliptic curve cryptosystems are usually implemented over fields of characteristic two or over (large) prime fields. For large prime fields, projective coordinates are more suitabl...
Eric Brier, Marc Joye
CARDIS
2000
Springer
124views Hardware» more  CARDIS 2000»
14 years 2 months ago
Elliptic Curve Cryptography on Smart Cards without Coprocessors
Abstract This contribution describes how an elliptic curve cryptosystem can be implemented on very low cost microprocessors with reasonable performance. We focus in this paper on t...
Adam D. Woodbury, Daniel V. Bailey, Christof Paar
ACNS
2009
Springer
124views Cryptology» more  ACNS 2009»
14 years 4 months ago
Novel Precomputation Schemes for Elliptic Curve Cryptosystems
We present an innovative technique to add elliptic curve points with the form P Q± , and discuss its application to the generation of precomputed tables for the scalar multiplicat...
Patrick Longa, Catherine H. Gebotys
JSC
2011
100views more  JSC 2011»
13 years 20 days ago
Toric forms of elliptic curves and their arithmetic
We scan a large class of one-parameter families of elliptic curves for efficient arithmetic. The construction of the class is inspired by toric geometry, which provides a natural ...
Wouter Castryck, Frederik Vercauteren
CHES
2004
Springer
89views Cryptology» more  CHES 2004»
14 years 3 months ago
Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic
Erdinç Öztürk, Berk Sunar, Erkay ...