<--- Back to Details
First PageDocument Content
Geometry / Edwards curve / Hessian form of an elliptic curve / Elliptic curve / Jacobian curve / Curve / Table of costs of operations in elliptic curves / Tripling-oriented Doche–Icart–Kohel curve / Elliptic curve cryptography / Elliptic curves / Abstract algebra
Date: 2007-10-28 14:06:36
Geometry
Edwards curve
Hessian form of an elliptic curve
Elliptic curve
Jacobian curve
Curve
Table of costs of operations in elliptic curves
Tripling-oriented Doche–Icart–Kohel curve
Elliptic curve cryptography
Elliptic curves
Abstract algebra

Add to Reading List

Source URL: cr.yp.to

Download Document from Source Website

Share Document on Facebook

Similar Documents

Chemistry / Nature / Plastics / Economy / Dielectrics / Polyolefins / Water conservation / Industrial processes / Pyrolysis / Recycling / Plastic / High-density polyethylene

The Next Bigly Thing : Plastic-To-Oil by Robert A. Nelson Many experts warn that we are on the down side of the "Peak Oil" Bell Curve of supply:demand -- but we clever hominids shall probe ever deeper with mighty microwa

DocID: 1xVPR - View Document

Algebra / Abstract algebra / Mathematics / Finite fields / Integer factorization algorithms / Elliptic curves / Group theory / Lenstra elliptic-curve factorization / Elliptic curve / Elliptic curve primality / Factorization of polynomials over finite fields

Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbrenner, Hoang Le, Mohammed Khaleeluddin, Ramakrishna Bachimanchi George Mason University {kg

DocID: 1xVNI - View Document

Cryptography / Abstract algebra / Algebra / Finite fields / Elliptic curve cryptography / Public-key cryptography / Group theory / Elliptic-curve cryptography / Elliptic curve / XTR / Elliptic curve only hash / Supersingular isogeny key exchange

Hardware for Collision Search on Elliptic Curve over GF(2m) Philippe Bulens∗, Guerric Meurice de Dormale† and Jean-Jacques Quisquater UCL Crypto Group Universit´e Catholique de Louvain

DocID: 1xVem - View Document

Cryptography / Abstract algebra / Algebra / Finite fields / Elliptic curve cryptography / Computational hardness assumptions / Group theory / Public-key cryptography / Elliptic-curve cryptography / Elliptic curve / Key size / Discrete logarithm

On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp

DocID: 1xUIc - View Document