Elliptic curves and cryptography

被引:0
|
作者
Silverman, JH [1 ]
机构
[1] Brown Univ, Dept Math, Providence, RI 02912 USA
来源
Public-Key Cryptography | 2005年 / 62卷
关键词
elliptic curve; elliptic curve cryptography;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We give a brief introduction, without proofs, to the theory of elliptic curves, with an emphasis on those aspects that are most relevant to cryptography.
引用
收藏
页码:91 / 112
页数:22
相关论文
共 50 条
  • [31] MPHELL: A fast and robust library with unified and versatile arithmetics for elliptic curves cryptography
    Coladon, Titouan
    Elbaz-Vincent, Philippe
    Hugounenq, Cyril
    2021 IEEE 28TH SYMPOSIUM ON COMPUTER ARITHMETIC (ARITH 2021), 2021, : 78 - 85
  • [32] Studie über die elliptischen Kurven in der KryptografieStudy on elliptic curves in cryptography
    R. Eier
    e & i Elektrotechnik und Informationstechnik, 2005, 122 (1-2) : 7 - 27
  • [33] On Constructing Prime Order Elliptic Curves Suitable for Pairing-Based Cryptography
    Zhang, Meng
    Chen, Xuehong
    Xu, Maozhi
    Wang, Jie
    BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2019, 2020, 1156 : 60 - 70
  • [34] Residue systems efficiency for modular products summation: Application to Elliptic Curves Cryptography
    Bajard, J. C.
    Duquesne, S.
    Ercegovac, M.
    Meloni, N.
    ADVANCED SIGNAL PROCESSING ALGORITHMS, ARCHITECTURES, AND IMPLEMENTATIONS XVI, 2006, 6313
  • [35] A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
    Yeh, Hsiu-Lien
    Chen, Tien-Ho
    Liu, Pin-Chuan
    Kim, Tai-Hoo
    Wei, Hsin-Wen
    SENSORS, 2011, 11 (05) : 4767 - 4779
  • [36] A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks
    Chen, Huifang
    Ge, Linlin
    Xie, Lei
    SENSORS, 2015, 15 (07) : 17057 - 17075
  • [37] Low latency elliptic curve cryptography accelerators for NIST curves over binary fields
    Shu, C
    Gaj, K
    Ei-Ghazawi, T
    FPT 05: 2005 IEEE INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE TECHNOLOGY, PROCEEDINGS, 2005, : 309 - 310
  • [38] Enhanced FPGA Implementations for Doubling Oriented and Jacobi- Quartics Elliptic Curves Cryptography
    Tawalbeh, Lo'ai
    Abu Al-Haija, Qasem
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2011, 6 (03): : 167 - 175
  • [39] A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
    Shi, Wenbo
    Gong, Peng
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [40] Analysis of Standard Elliptic Curves for the Implementation of Elliptic Curve Cryptography in Resource-Constrained E-commerce Applications
    Shaikh, Javed R.
    Nenova, Maria
    Iliev, Georgi
    Valkova-Jarvis, Zlatka
    2017 IEEE INTERNATIONAL CONFERENCE ON MICROWAVES, ANTENNAS, COMMUNICATIONS AND ELECTRONIC SYSTEMS (COMCAS), 2017, : 532 - 535