Elliptic curve cryptography

D Hankerson, A Menezes - Encyclopedia of Cryptography, Security and …, 2021 - Springer
Background Elliptic curve cryptographic schemes were proposed independently in 1985 by
Neal Koblitz (Koblitz 1987) and Victor Miller (Miller 1986). They are the elliptic curve …

Элементарное введение в эллиптическую криптографию

АА Болотов, СБ Гашков, АБ Фролов… - Протоколы …, 2006 - elibrary.ru
Настоящая книга посвящена перспективному направлению в области защиты
информации, математическую основу которого составляет теория эллиптических …

Efficient arithmetic on Hessian curves

RR Farashahi, M Joye - International Workshop on Public Key …, 2010 - Springer
This paper considers a generalized form for Hessian curves. The family of generalized
Hessian curves covers more isomorphism classes of elliptic curves. Over a finite field F_q, it …

Efficient FPGA implementations of point multiplication on binary Edwards and generalized Hessian curves using Gaussian normal basis

R Azarderakhsh… - IEEE Transactions on Very …, 2011 - ieeexplore.ieee.org
Efficient implementation of point multiplication is crucial for elliptic curve cryptographic
systems. This paper presents the implementation results of an elliptic curve crypto-processor …

On parallelization of high-speed processors for elliptic curve cryptography

K Jarvinen, J Skytta - IEEE Transactions on Very Large Scale …, 2008 - ieeexplore.ieee.org
This paper discusses parallelization of elliptic curve cryptography hardware accelerators
using elliptic curves over binary fields F 2m. Elliptic curve point multiplication, which is the …

Efficient algorithm and architecture for elliptic curve cryptography for extremely constrained secure applications

R Azarderakhsh, KU Järvinen… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Recently, considerable research has been performed in cryptography and security to
optimize the area, power, timing, and energy needed for the point multiplication operations …

Efficient software implementation of public-key cryptography on sensor networks using the MSP430X microcontroller

CPL Gouvêa, LB Oliveira, J López - Journal of Cryptographic Engineering, 2012 - Springer
In this work, we describe a software implementation of elliptic curve cryptography and
pairing-based cryptography for the MSP430 microcontroller family, which is used in wireless …

Two is the fastest prime: lambda coordinates for binary elliptic curves

T Oliveira, J López, DF Aranha… - Journal of Cryptographic …, 2014 - Springer
In this work, we present new arithmetic formulas for a projective version of the affine point
representation (x, x+ y/x),(x, x+ y/x), for x ≠ 0, x≠ 0, which leads to an efficient computation …

Optimized FPGA-based elliptic curve cryptography processor for high-speed applications

K Järvinen - Integration, 2011 - Elsevier
In this paper, we introduce an FPGA-based processor for elliptic curve cryptography on
Koblitz curves. The processor targets specifically to applications requiring very high speed …

Analyzing the Galbraith-Lin-Scott point multiplication method for elliptic curves over binary fields

D Hankerson, K Karabina… - IEEE Transactions on …, 2009 - ieeexplore.ieee.org
Galbraith, Lin, and Scott recently constructed efficiently computable endomorphisms for a
large family of elliptic curves defined over IF q 2 and showed, in the case where q is a prime …