Home
/
Books
/
cryptography&mathematics
/
elliptic curve cryptography
File Name
Size
Date
..
—
—
A New Sign Change Attack on the Montgomery Ladders (2016) - Batten, Amain.pdf.gz
230.00B
04-07-2024 16:33:15
An Updated Survey on Secure ECC Implementations Attacks, Countermeasures and Cost (2012) - Fan, Verbauwhede.pdf.gz
192.18KB
04-07-2024 16:33:16
Complete Addition Formulas for Prime Order Elliptic Curves (2016) - Renes, Costello, Batina.pdf.gz
369.52KB
04-07-2024 16:33:14
Cryptographic Engineering, Chapter 16 Leakage from Montgomery Multiplication - Walter.pdf.gz
251.00B
04-07-2024 16:33:14
Curve25519 new Diffie-Hellman speed records (2006) - Bernstein.pdf.gz
195.78KB
04-07-2024 16:33:14
Curve41417 Karatsuba revisited (2014) - Bernstein, Chuengsatiansup, Lange.pdf.gz
311.37KB
04-07-2024 16:33:14
Decaf Elliminating Cofactors Through Point Compression (2015) - Hamburg.pdf.gz
322.20KB
04-07-2024 16:33:15
Ed3363 (High Five) An Alternate Elliptic Curve (2015) - Scott.pdf.gz
75.01KB
04-07-2024 16:33:16
Elligator Elliptic-Curve Points Indistinguishable From Random Strings (2013) - Berstein, Hamburg, Krasnova, Lange.pdf.gz
455.24KB
04-07-2024 16:33:14
Elliptic Curve Cryptography (2004) - MIT Course Notes.pdf.gz
187.32KB
04-07-2024 16:33:16
Elliptic Curve Cryptography The Serpentine Course of a Paradigm Shift (2008) - Koblitz², Menezes.pdf.gz
388.12KB
04-07-2024 16:33:14
Elliptic Curve Cryptosystems (1987) - Koblitz.pdf.gz
835.09KB
04-07-2024 16:33:15
Elliptic Curves, Group Law, and Efficient Computation (2010) [thesis] - Hişil.pdf.gz
1.41MB
04-07-2024 16:33:14
Fast and Compact Elliptic Curve Cryptography (2015) - Hamburg.pdf.gz
274.14KB
04-07-2024 16:33:14
Fault Attacks on the Montgomery Powering Ladder (2011) - Schmidt, Medwed.pdf.gz
229.00B
04-07-2024 16:33:15
Fault Detection and a Differential Fault Analysis Countermeasure for the Montgomery power ladder in elliptic curve cryptography (2012) - Vasyltsov, Saldamli.pdf.gz
371.00B
04-07-2024 16:33:14
FourQ Four-Dimensional Decompositions on a Q-curve over the Mersenne Prime (2015) - Microsoft.pdf.gz
433.47KB
04-07-2024 16:33:16
Guide to Elliptic Curve Cryptography (2004) - Hankerson, Menezes, Vanstone.pdf.gz
2.46MB
04-07-2024 16:33:14
Highly Regular Right-to-Left Algorithms for Scalar Multiplication (2007) - Joye.pdf.gz
206.52KB
04-07-2024 16:33:14
Improving the Big Mac Attack on Elliptic Curve Cryptography (2015) - Danger, Guilley, Hoogvorst, Murdica, Nacchache.pdf.gz
421.58KB
04-07-2024 16:33:15
Kernvak Algebra (1997) - Stevenhagen, de Smit.pdf.gz
574.30KB
04-07-2024 16:33:16
May the Forth Be With You A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 (2017) - Genkin, Valenta, Yarom.pdf.gz
701.36KB
04-07-2024 16:33:14
Montgomery Curves and Their Arithmetic (2017) - Costello, Smith.pdf.gz
412.44KB
04-07-2024 16:33:16
Montgomery Multiplication in GF(2^k) (1998) - Koc, Acar.pdf.gz
129.83KB
04-07-2024 16:33:16
Rational Points on Elliptic Curves (2015) - Silverman, Tate.pdf.gz
2.27MB
04-07-2024 16:33:15
Recommended Elliptic Curves for Federal Government Use (1999) - NIST.pdf.gz
533.64KB
04-07-2024 16:33:14
Some Simple ECC Tricks [slides] (2015) - Hamburg.pdf.gz
1.62MB
04-07-2024 16:33:15
Speeding the Pollard and Elliptic Curve Methods of Factorization (1987) - Montgomery.pdf.gz
2.15MB
04-07-2024 16:33:15
The Montgomery Powering Ladder (2003) - Joye, Yen.pdf.gz
186.49KB
04-07-2024 16:33:16
The Square-Free Sieve and the Rank of Elliptic Curves (1980) - Gouvéa, Mazur.pdf.gz
2.66MB
04-07-2024 16:33:15
Twisted Edwards Curves (2008) - Bernstein, Birkner, Joye, Lange, Peters.pdf.gz
199.00KB
04-07-2024 16:33:16
Twisted Edwards Curves Revisited (2008) - Hisil, Wong, Carter, Dawson.pdf.gz
201.32KB
04-07-2024 16:33:16
10" >