Kumar, Kamal; Chen, Shyi-Ming Group decision making based on linguistic intuitionistic fuzzy Yager weighted arithmetic aggregation operator of linguistic intuitionistic fuzzy numbers. (English) Zbl 1522.91082 Inf. Sci. 647, Article ID 119228, 26 p. (2023). MSC: 91B06 91B86 91F20 PDFBibTeX XMLCite \textit{K. Kumar} and \textit{S.-M. Chen}, Inf. Sci. 647, Article ID 119228, 26 p. (2023; Zbl 1522.91082) Full Text: DOI
Li, Luying; Yu, Wei A note on inverted twisted Edwards curve. (English) Zbl 1519.94158 Deng, Yi (ed.) et al., Information security and cryptology. 18th International conference, Inscrypt 2022, Beijing, China, December 11–13, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13837, 295-304 (2023). MSC: 94A60 11G07 14H52 PDFBibTeX XMLCite \textit{L. Li} and \textit{W. Yu}, Lect. Notes Comput. Sci. 13837, 295--304 (2023; Zbl 1519.94158) Full Text: DOI
Ajeena, Ruma Kareem K. Integer matrix size \(2\times 2\) sub-decomposition method for elliptic curve cryptography. (English) Zbl 1524.94060 Int. J. Math. Comput. Sci. 18, No. 4, 599-606 (2023). MSC: 94A60 14H52 15B36 PDFBibTeX XMLCite \textit{R. K. K. Ajeena}, Int. J. Math. Comput. Sci. 18, No. 4, 599--606 (2023; Zbl 1524.94060) Full Text: Link
Tao, Zheng; Hu, Zhi; Zhou, Zijian Faster isogeny computation on twisted Hessian curves. (English) Zbl 1511.11102 Appl. Math. Comput. 444, Article ID 127823, 9 p. (2023). MSC: 11T71 14G50 14H52 PDFBibTeX XMLCite \textit{Z. Tao} et al., Appl. Math. Comput. 444, Article ID 127823, 9 p. (2023; Zbl 1511.11102) Full Text: DOI
Rezaeian Farashahi, Reza; Hosseini, Seyed Gholamhossein Differential addition on binary elliptic curves. (English) Zbl 1522.11132 Finite Fields Appl. 87, Article ID 102141, 36 p. (2023). Reviewer: Sami Omar (Sukhair) MSC: 11Y16 11G05 11G20 14H52 14G50 14K02 PDFBibTeX XMLCite \textit{R. Rezaeian Farashahi} and \textit{S. G. Hosseini}, Finite Fields Appl. 87, Article ID 102141, 36 p. (2023; Zbl 1522.11132) Full Text: DOI
Silambarasan, I. Generalized orthopair fuzzy matrices based on hamacher operations. (English) Zbl 07804625 Math. Morav. 26, No. 1, 1-26 (2022). MSC: 03E72 15B15 PDFBibTeX XMLCite \textit{I. Silambarasan}, Math. Morav. 26, No. 1, 1--26 (2022; Zbl 07804625) Full Text: DOI
Li, Xiuxiu; Yu, Wei; Wang, Kunpeng Efficient scalar multiplication on Koblitz curves with pre-computation. (English) Zbl 07722869 Susilo, Willy (ed.) et al., Information security. 25th international conference, ISC 2022, Bali, Indonesia, December 18–22, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13640, 162-172 (2022). MSC: 94A60 14H52 PDFBibTeX XMLCite \textit{X. Li} et al., Lect. Notes Comput. Sci. 13640, 162--172 (2022; Zbl 07722869) Full Text: DOI
Agievich, S. V.; Poruchnik, S. V.; Semenov, V. I. Small scalar multiplication on Weierstrass curves using division polynomials. (English) Zbl 1497.11165 Mat. Vopr. Kriptografii 13, No. 2, 17-35 (2022). MSC: 11G20 11T71 11Y16 94A60 PDFBibTeX XMLCite \textit{S. V. Agievich} et al., Mat. Vopr. Kriptografii 13, No. 2, 17--35 (2022; Zbl 1497.11165) Full Text: DOI MNR
Nath, Kaushik; Sarkar, Palash Efficient arithmetic in (pseudo-)Mersenne prime order fields. (English) Zbl 1500.94045 Adv. Math. Commun. 16, No. 2, 303-348 (2022). MSC: 94A60 12E20 11A25 14G50 11G07 68P25 PDFBibTeX XMLCite \textit{K. Nath} and \textit{P. Sarkar}, Adv. Math. Commun. 16, No. 2, 303--348 (2022; Zbl 1500.94045) Full Text: DOI
Dhanda, Sumit Singh; Singh, Brahmjit; Jindal, Poonam Elliptic curve cryptography: a software implementation. (English) Zbl 07616663 Singh, Brahmjit (ed.) et al., Intelligent computing and communication systems. Singapore: Springer. Algorithms Intell. Syst., 143-148 (2021). MSC: 68P25 68Nxx 94A60 14H52 PDFBibTeX XMLCite \textit{S. S. Dhanda} et al., in: Intelligent computing and communication systems. Singapore: Springer. 143--148 (2021; Zbl 07616663) Full Text: DOI
Silambarasan, I. \(q\)-rung picture fuzzy matrices. (English) Zbl 1499.15114 Bull. Int. Math. Virtual Inst. 11, No. 3, 569-582 (2021). MSC: 15B15 PDFBibTeX XMLCite \textit{I. Silambarasan}, Bull. Int. Math. Virtual Inst. 11, No. 3, 569--582 (2021; Zbl 1499.15114) Full Text: DOI
Silambarasan, I. Some algebraic properties of picture fuzzy sets. (English) Zbl 1499.03048 Bull. Int. Math. Virtual Inst. 11, No. 3, 429-442 (2021). MSC: 03E72 PDFBibTeX XMLCite \textit{I. Silambarasan}, Bull. Int. Math. Virtual Inst. 11, No. 3, 429--442 (2021; Zbl 1499.03048) Full Text: DOI
Aljamaly, Karrar Taher R.; Ajeena, Ruma Kareem K. The elliptic scalar multiplication graph and its application in elliptic curve cryptography. (English) Zbl 1483.94032 J. Discrete Math. Sci. Cryptography 24, No. 6, 1793-1807 (2021). MSC: 94A60 14H52 05C50 PDFBibTeX XMLCite \textit{K. T. R. Aljamaly} and \textit{R. K. K. Ajeena}, J. Discrete Math. Sci. Cryptography 24, No. 6, 1793--1807 (2021; Zbl 1483.94032) Full Text: DOI
Ajeena, Ruma Kareem K. The soft graphic integer sub-decomposition method for elliptic scalar multiplication. (English) Zbl 1483.94029 J. Discrete Math. Sci. Cryptography 24, No. 6, 1751-1765 (2021). MSC: 94A60 14H52 05C99 68Q17 PDFBibTeX XMLCite \textit{R. K. K. Ajeena}, J. Discrete Math. Sci. Cryptography 24, No. 6, 1751--1765 (2021; Zbl 1483.94029) Full Text: DOI
Alimoradi, Reza; Arkian, Hamid Reza; Razavian, Seiied-Mohammad-Javad; Ramzi, Ali Scalar multiplication in elliptic curve libraries. (English) Zbl 1483.94031 J. Discrete Math. Sci. Cryptography 24, No. 3, 657-666 (2021). MSC: 94A60 14H52 PDFBibTeX XMLCite \textit{R. Alimoradi} et al., J. Discrete Math. Sci. Cryptography 24, No. 3, 657--666 (2021; Zbl 1483.94031) Full Text: DOI
Yu, Wei; Xu, Guangwu Pre-computation scheme of window \(\tau\)NAF for Koblitz curves revisited. (English) Zbl 1479.94353 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12697, 187-218 (2021). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{W. Yu} and \textit{G. Xu}, Lect. Notes Comput. Sci. 12697, 187--218 (2021; Zbl 1479.94353) Full Text: DOI
Hu, Zhi; Lin, Dongdai; Zhao, Chang-An Fast scalar multiplication of degenerate divisors for hyperelliptic curve cryptosystems. (English) Zbl 1510.11120 Appl. Math. Comput. 404, Article ID 126239, 8 p. (2021). MSC: 11G20 14G50 94A60 PDFBibTeX XMLCite \textit{Z. Hu} et al., Appl. Math. Comput. 404, Article ID 126239, 8 p. (2021; Zbl 1510.11120) Full Text: DOI
Eom, Sookyung; Lee, Hyang-Sook; Lim, Seongan; Song, Kyunghwan Analysis on Yu et al.’s dynamic algorithm for canonic DBC. (English) Zbl 1462.94035 Discrete Appl. Math. 294, 31-40 (2021). MSC: 94A60 68W40 PDFBibTeX XMLCite \textit{S. Eom} et al., Discrete Appl. Math. 294, 31--40 (2021; Zbl 1462.94035) Full Text: DOI
Hutchinson, Aaron; Karabina, Koray A new encoding algorithm for a multidimensional version of the Montgomery ladder. (English) Zbl 1504.94148 Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2020. 12th international conference on cryptology in Africa, Cairo, Egypt, July 20–22, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12174, 403-422 (2020). MSC: 94A60 94A29 11Y16 PDFBibTeX XMLCite \textit{A. Hutchinson} and \textit{K. Karabina}, Lect. Notes Comput. Sci. 12174, 403--422 (2020; Zbl 1504.94148) Full Text: DOI
Roelofs, Niels; Samwel, Niels; Batina, Lejla; Daemen, Joan Online template attack on ECDSA: extracting keys via the other side. (English) Zbl 1504.94182 Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2020. 12th international conference on cryptology in Africa, Cairo, Egypt, July 20–22, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12174, 323-336 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Roelofs} et al., Lect. Notes Comput. Sci. 12174, 323--336 (2020; Zbl 1504.94182) Full Text: DOI
Dutta, Abhraneel; Hutchinson, Aaron; Karabina, Koray Extending the signed non-zero bit and sign-aligned columns methods to general bases for use in cryptography. (English) Zbl 1492.94094 Bhargavan, Karthikeyan (ed.) et al., Progress in cryptology – INDOCRYPT 2020. 21st international conference on cryptology in India, Bangalore, India, December 13–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12578, 248-270 (2020). MSC: 94A60 14G50 14H52 PDFBibTeX XMLCite \textit{A. Dutta} et al., Lect. Notes Comput. Sci. 12578, 248--270 (2020; Zbl 1492.94094) Full Text: DOI
Sohn, Gyoyong Efficient computable homomorphisms on Hessian curves. (English) Zbl 1499.94032 Adv. Stud. Contemp. Math., Kyungshang 30, No. 1, 135-143 (2020). MSC: 94A55 11T71 PDFBibTeX XMLCite \textit{G. Sohn}, Adv. Stud. Contemp. Math., Kyungshang 30, No. 1, 135--143 (2020; Zbl 1499.94032) Full Text: DOI
Yu, Wei; Musa, Saud Al; Li, Bao Double-base chains for scalar multiplications on elliptic curves. (English) Zbl 1479.94276 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12107, 538-565 (2020). MSC: 94A60 11G05 PDFBibTeX XMLCite \textit{W. Yu} et al., Lect. Notes Comput. Sci. 12107, 538--565 (2020; Zbl 1479.94276) Full Text: DOI
Jin, Yaoan; Miyaji, Atsuko Secure and compact elliptic curve LR scalar multiplication. (English) Zbl 1466.94030 Liu, Joseph K. (ed.) et al., Information security and privacy. 25th Australasian conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12248, 605-618 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Jin} and \textit{A. Miyaji}, Lect. Notes Comput. Sci. 12248, 605--618 (2020; Zbl 1466.94030) Full Text: DOI
Muslim, N.; Yunos, F.; Razali, Z.; Said, M. R. M. Elliptic net scalar multiplication upon Koblitz curves. (English) Zbl 1461.11171 Malays. J. Math. Sci. 14, No. 3, 373-388 (2020). MSC: 11T71 11G05 14G50 PDFBibTeX XMLCite \textit{N. Muslim} et al., Malays. J. Math. Sci. 14, No. 3, 373--388 (2020; Zbl 1461.11171) Full Text: Link
Hone, Andrew Efficient ECM factorization in parallel with the lyness map. (English) Zbl 07300076 Mantzaflaris, Angelos (ed.), Proceedings of the 45th international symposium on symbolic and algebraic computation, ISSAC ’20, Kalamata, Greece, July 20–23, 2020. New York, NY: Association for Computing Machinery (ACM). 234-240 (2020). MSC: 68W30 PDFBibTeX XMLCite \textit{A. Hone}, in: Proceedings of the 45th international symposium on symbolic and algebraic computation, ISSAC '20, Kalamata, Greece, July 20--23, 2020. New York, NY: Association for Computing Machinery (ACM). 234--240 (2020; Zbl 07300076) Full Text: DOI arXiv Link
Kim, Kwang Ho; Choe, Junyop; Kim, Song Yun; Kim, Namsu; Hong, Sekung Speeding up regular elliptic curve scalar multiplication without precomputation. (English) Zbl 1451.94028 Adv. Math. Commun. 14, No. 4, 703-726 (2020). MSC: 94A60 14G50 11T71 14Q05 14H52 PDFBibTeX XMLCite \textit{K. H. Kim} et al., Adv. Math. Commun. 14, No. 4, 703--726 (2020; Zbl 1451.94028) Full Text: DOI
Karati, Sabyasachi; Sarkar, Palash Kummer for genus one over prime-order fields. (English) Zbl 1455.94169 J. Cryptology 33, No. 1, 92-129 (2020). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{S. Karati} and \textit{P. Sarkar}, J. Cryptology 33, No. 1, 92--129 (2020; Zbl 1455.94169) Full Text: DOI
Watanabe, Keiichi Cauchy-Bunyakovsky-Schwarz type inequalities related to Möbius operations. (English) Zbl 1499.30015 J. Inequal. Appl. 2019, Paper No. 179, 18 p. (2019). MSC: 30A10 PDFBibTeX XMLCite \textit{K. Watanabe}, J. Inequal. Appl. 2019, Paper No. 179, 18 p. (2019; Zbl 1499.30015) Full Text: DOI
Antony, S. N. F. M. A.; Kamarulhaili, H. Construction of endomorphisms for the ISD method on elliptic curves with j-invariant 1728. (English) Zbl 1451.14084 Malays. J. Math. Sci. 13, Spec. Iss.: The 6th International Cryptology and Information Security Conference (CRYPTOLOGY2018), 67-76 (2019). Reviewer: Juan Tena Ayuso (Valladolid) MSC: 14G50 11G20 94A60 11G15 11T71 14H37 PDFBibTeX XMLCite \textit{S. N. F. M. A. Antony} and \textit{H. Kamarulhaili}, Malays. J. Math. Sci. 13, 67--76 (2019; Zbl 1451.14084) Full Text: Link
Hadani, N. H.; Yunos, F.; Ariffin, M. R. K.; Sapar, S. H.; Rahman, N. N. A. Alternative method to find the number of points on Koblitz curve. (English) Zbl 1448.11117 Malays. J. Math. Sci. 13, Spec. Iss.: The 6th International Cryptology and Information Security Conference (CRYPTOLOGY2018), 13-30 (2019). MSC: 11G20 11T71 94A60 PDFBibTeX XMLCite \textit{N. H. Hadani} et al., Malays. J. Math. Sci. 13, 13--30 (2019; Zbl 1448.11117) Full Text: Link
Liu, Shuanggen; Li, Dandan; Li, Xiao Elliptic curve scalar multiplication algorithm based on bronze ratio addition chain. (Chinese. English summary) Zbl 1449.94071 J. Shandong Univ., Nat. Sci. 54, No. 11, 12-19 (2019). MSC: 94A62 11T71 PDFBibTeX XMLCite \textit{S. Liu} et al., J. Shandong Univ., Nat. Sci. 54, No. 11, 12--19 (2019; Zbl 1449.94071)
Jin, Yaoan; Miyaji, Atsuko Secure and compact elliptic curve cryptosystems. (English) Zbl 1434.94069 Jang-Jaccard, Julian (ed.) et al., Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11547, 639-650 (2019). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{Y. Jin} and \textit{A. Miyaji}, Lect. Notes Comput. Sci. 11547, 639--650 (2019; Zbl 1434.94069) Full Text: DOI
Schwabe, Peter; Sprenkels, Daan The complete cost of cofactor \(h=1\). (English) Zbl 1456.94111 Hao, Feng (ed.) et al., Progress in cryptology – INDOCRYPT 2019. 20th international conference on cryptology in India, Hyderabad, India, December 15–18, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11898, 375-397 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Schwabe} and \textit{D. Sprenkels}, Lect. Notes Comput. Sci. 11898, 375--397 (2019; Zbl 1456.94111) Full Text: DOI
Leiva, Cristobal; Thériault, Nicolas Optimal 2-3 chains for scalar multiplication. (English) Zbl 1454.94081 Lange, Tanja (ed.) et al., Progress in cryptology – LATINCRYPT 2017. 5th international conference on cryptology and information security in Latin America, Havana, Cuba, September 20–22, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11368, 89-108 (2019). MSC: 94A60 68W30 PDFBibTeX XMLCite \textit{C. Leiva} and \textit{N. Thériault}, Lect. Notes Comput. Sci. 11368, 89--108 (2019; Zbl 1454.94081) Full Text: DOI
Detrey, Jérémie; Imbert, Laurent Breaking randomized mixed-radix scalar multiplication algorithms. (English) Zbl 1453.94074 Schwabe, Peter (ed.) et al., Progress in cryptology – LATINCRYPT 2019. 6th international conference on cryptology and information security in Latin America, Santiago de Chile, Chile, October 2–4, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11774, 24-39 (2019). MSC: 94A60 11A07 68M07 PDFBibTeX XMLCite \textit{J. Detrey} and \textit{L. Imbert}, Lect. Notes Comput. Sci. 11774, 24--39 (2019; Zbl 1453.94074) Full Text: DOI Link
Yi, Hairong; Luo, Guiwen; Lin, Dongdai Faster scalar multiplication on the \(x\)-line: three-dimensional GLV method with three-dimensional differential addition chains. (English) Zbl 1461.94088 Carlet, Claude (ed.) et al., Codes, cryptology and information security. Third international conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019. Proceedings – in honor of Said el Hajji. Cham: Springer. Lect. Notes Comput. Sci. 11445, 236-253 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Yi} et al., Lect. Notes Comput. Sci. 11445, 236--253 (2019; Zbl 1461.94088) Full Text: DOI
Liu, Shuanggen; Wang, Rongrong; Li, Shengyu Ternary Montgomery algorithm on Hessian curve over \(\mathrm{GF}(3^m)\). (Chinese. English summary) Zbl 1438.94055 J. Shandong Univ., Nat. Sci. 54, No. 1, 96-102, 115 (2019). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{S. Liu} et al., J. Shandong Univ., Nat. Sci. 54, No. 1, 96--102, 115 (2019; Zbl 1438.94055) Full Text: DOI
Sohn, Gyoyong Scalar multiplication on Jacobi curves using the Frobenius map. (English) Zbl 1440.94081 Proc. Jangjeon Math. Soc. 22, No. 1, 7-14 (2019). MSC: 94A60 14G50 11T71 14H25 PDFBibTeX XMLCite \textit{G. Sohn}, Proc. Jangjeon Math. Soc. 22, No. 1, 7--14 (2019; Zbl 1440.94081)
Hieronymi, Philipp When is scalar multiplication decidable? (English) Zbl 1446.03029 Ann. Pure Appl. Logic 170, No. 10, 1162-1175 (2019). Reviewer: Saeed Salehi (Tabriz) MSC: 03B25 03C64 03C60 03D05 11A67 11U05 PDFBibTeX XMLCite \textit{P. Hieronymi}, Ann. Pure Appl. Logic 170, No. 10, 1162--1175 (2019; Zbl 1446.03029) Full Text: DOI arXiv
Hisil, Huseyin; Hutchinson, Aaron; Karabina, Koray \(d\)-MUL: optimizing and implementing a multidimensional scalar multiplication algorithm over elliptic curves. (English) Zbl 1525.94042 Chattopadhyay, Anupam (ed.) et al., Security, privacy, and applied cryptography engineering. 8th international conference, SPACE 2018, Kanpur, India, December 15–19, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11348, 198-217 (2018). MSC: 94A60 94A62 11G07 14H52 PDFBibTeX XMLCite \textit{H. Hisil} et al., Lect. Notes Comput. Sci. 11348, 198--217 (2018; Zbl 1525.94042) Full Text: DOI
Sim, Bo-Yeon; Choi, Kyu Young; Moon, Dukjae; Yoon, Hyo Jin; Cho, Jihoon; Han, Dong-Guk \(\mathrm{T\_SM}\): elliptic curve scalar multiplication algorithm secure against single-trace attacks. (English) Zbl 1518.94092 Su, Chunhua (ed.) et al., Information security practice and experience. 14th international conference, ISPEC 2018, Tokyo, Japan, September 25–27, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11125, 407-423 (2018). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{B.-Y. Sim} et al., Lect. Notes Comput. Sci. 11125, 407--423 (2018; Zbl 1518.94092) Full Text: DOI
Watanabe, Keiichi A Cauchy type inequality for Möbius operations. (English) Zbl 1497.26037 J. Inequal. Appl. 2018, Paper No. 97, 9 p. (2018). MSC: 26D15 40A05 PDFBibTeX XMLCite \textit{K. Watanabe}, J. Inequal. Appl. 2018, Paper No. 97, 9 p. (2018; Zbl 1497.26037) Full Text: DOI
Khleborodov, Denis Fast elliptic curve point multiplication based on window non-adjacent form method. (English) Zbl 1427.94080 Appl. Math. Comput. 334, 41-59 (2018). MSC: 94A60 14G50 11Y16 11T71 PDFBibTeX XMLCite \textit{D. Khleborodov}, Appl. Math. Comput. 334, 41--59 (2018; Zbl 1427.94080) Full Text: DOI
Orhon, Neriman Gamze; Hisil, Huseyin Speeding up Huff form of elliptic curves. (English) Zbl 1442.94044 Des. Codes Cryptography 86, No. 12, 2807-2823 (2018). MSC: 94A60 11T71 14G50 14H52 68P25 PDFBibTeX XMLCite \textit{N. G. Orhon} and \textit{H. Hisil}, Des. Codes Cryptography 86, No. 12, 2807--2823 (2018; Zbl 1442.94044) Full Text: DOI
Khleborodov, Denis Fast elliptic curve point multiplication based on binary and binary non-adjacent scalar form methods. (English) Zbl 1408.94939 Adv. Comput. Math. 44, No. 4, 1275-1293 (2018). MSC: 94A60 11T71 14G50 14H52 68Q25 PDFBibTeX XMLCite \textit{D. Khleborodov}, Adv. Comput. Math. 44, No. 4, 1275--1293 (2018; Zbl 1408.94939) Full Text: DOI
Oliveira, Thomaz; López, Julio; Hışıl, Hüseyin; Faz-Hernández, Armando; Rodríguez-Henríquez, Francisco How to (pre-)compute a ladder – improving the performance of X25519 and X448. (English) Zbl 1384.94093 Adams, Carlisle (ed.) et al., Selected areas in cryptography – SAC 2017. 24th international conference, Ottawa, ON, Canada, August 16–18, 2017. Revised selected papers. Cham: Springer (ISBN 978-3-319-72564-2/pbk; 978-3-319-72565-9/ebook). Lecture Notes in Computer Science 10719, 172-191 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Oliveira} et al., Lect. Notes Comput. Sci. 10719, 172--191 (2018; Zbl 1384.94093) Full Text: DOI
Krenn, Daniel; Ziegler, Volker Non-minimality of the width-\(w\) non-adjacent form in conjunction with trace one \(\tau\)-adic digit expansions and Koblitz curves in characteristic two. (English) Zbl 1432.11011 Math. Comput. 87, No. 310, 821-854 (2018). MSC: 11A63 11D75 11Y50 11H06 11J86 PDFBibTeX XMLCite \textit{D. Krenn} and \textit{V. Ziegler}, Math. Comput. 87, No. 310, 821--854 (2018; Zbl 1432.11011) Full Text: DOI arXiv
Al-Somani, Turki F. High-performance generic-point parallel scalar multiplication. (English) Zbl 1391.94828 Arab. J. Sci. Eng. 42, No. 2, 507-512 (2017). MSC: 94A62 14G50 65Y05 65Y04 PDFBibTeX XMLCite \textit{T. F. Al-Somani}, Arab. J. Sci. Eng. 42, No. 2, 507--512 (2017; Zbl 1391.94828) Full Text: DOI
Karati, Sabyasachi; Sarkar, Palash Kummer for genus one over prime order fields. (English) Zbl 1380.94105 Takagi, Tsuyoshi (ed.) et al., Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-70696-2/pbk; 978-3-319-70697-9/ebook). Lecture Notes in Computer Science 10625, 3-32 (2017). MSC: 94A60 14G50 14J28 PDFBibTeX XMLCite \textit{S. Karati} and \textit{P. Sarkar}, Lect. Notes Comput. Sci. 10625, 3--32 (2017; Zbl 1380.94105) Full Text: DOI
Roy, Sanjay; Mandal, Dhananjoy; Samanta, T. K. Soft vector spaces and soft topological vector spaces. (English) Zbl 1381.46064 Jordan J. Math. Stat. 10, No. 2, 143-167 (2017). MSC: 46S40 54A40 15A03 PDFBibTeX XMLCite \textit{S. Roy} et al., Jordan J. Math. Stat. 10, No. 2, 143--167 (2017; Zbl 1381.46064) Full Text: Link
Chung, Ping Ngai; Costello, Craig; Smith, Benjamin Fast, uniform scalar multiplication for genus 2 Jacobians with fast Kummers. (English) Zbl 1418.94038 Avanzi, Roberto (ed.) et al., Selected areas in cryptography – SAC 2016. 23rd international conference, St. John’s, NL, Canada, August 10–12, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10532, 465-481 (2017). MSC: 94A60 14G50 14Q05 PDFBibTeX XMLCite \textit{P. N. Chung} et al., Lect. Notes Comput. Sci. 10532, 465--481 (2017; Zbl 1418.94038) Full Text: DOI HAL
Wroński, Michał; Dryło, Robert; Kijko, Tomasz; Bora, Piotr Constructing elliptic curves for the GLV method with low-cost decomposition. (English) Zbl 1432.94146 Fundam. Inform. 153, No. 4, 399-413 (2017). MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{M. Wroński} et al., Fundam. Inform. 153, No. 4, 399--413 (2017; Zbl 1432.94146) Full Text: DOI
Sohn, Gyoyong Scalar multiplication on Huff curves using the Frobenius map. (English) Zbl 1371.94617 Adv. Stud. Contemp. Math., Kyungshang 27, No. 2, 223-228 (2017). MSC: 94A55 11T71 PDFBibTeX XMLCite \textit{G. Sohn}, Adv. Stud. Contemp. Math., Kyungshang 27, No. 2, 223--228 (2017; Zbl 1371.94617) Full Text: DOI
Hisil, Huseyin; Costello, Craig Jacobian coordinates on genus 2 curves. (English) Zbl 1377.94053 J. Cryptology 30, No. 2, 572-600 (2017). MSC: 94A60 14G50 14Q05 PDFBibTeX XMLCite \textit{H. Hisil} and \textit{C. Costello}, J. Cryptology 30, No. 2, 572--600 (2017; Zbl 1377.94053) Full Text: DOI
El Mrabet, Nadia (ed.); Joye, Marc (ed.) Guide to pairing-based cryptography. (English) Zbl 1371.94003 Chapman & Hall/CRC Cryptography and Network Security. Boca Raton, FL: CRC Press (ISBN 978-1-4987-2950-5/hbk; 978-1-315-37017-0/ebook). ix, 402 p., not consecutively paged (2017). Reviewer: Fernando Hernando (Castellón) MSC: 94-02 94A60 94-06 11T71 11G05 14G50 PDFBibTeX XMLCite \textit{N. El Mrabet} (ed.) and \textit{M. Joye} (ed.), Guide to pairing-based cryptography. Boca Raton, FL: CRC Press (2017; Zbl 1371.94003) Full Text: DOI
Grebnev, S. V. Optimizing memory cost of multi-scalar multiplication. (English) Zbl 1475.94178 Mat. Vopr. Kriptografii 7, No. 2, 53-60 (2016). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{S. V. Grebnev}, Mat. Vopr. Kriptografii 7, No. 2, 53--60 (2016; Zbl 1475.94178) Full Text: DOI MNR
Mazzoli, M. Non-commutative digit expansions for arithmetic on supersingular elliptic curves. (English) Zbl 1389.11021 Acta Math. Hung. 149, No. 1, 149-159 (2016). Reviewer: Florian Luca (Morelia) MSC: 11A63 14H52 PDFBibTeX XMLCite \textit{M. Mazzoli}, Acta Math. Hung. 149, No. 1, 149--159 (2016; Zbl 1389.11021) Full Text: DOI
Gayoso Martínez, Víctor; Hernández Encinas, Luis; Martín Muñoz, Agustín Implementation of cryptographic algorithms for elliptic curves. (English) Zbl 1421.94051 Castrillón López, Marco (ed.) et al., Geometry, algebra and applications: from mechanics to cryptography. In honor of Jaime Muñoz Masqué on the occasion of his 65th birthday. Cham: Springer. Springer Proc. Math. Stat. 161, 121-133 (2016). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{V. Gayoso Martínez} et al., Springer Proc. Math. Stat. 161, 121--133 (2016; Zbl 1421.94051) Full Text: DOI
Roy, Sanjay; Samanta, T. K. Some properties of vector sum and scalar multiplication of soft sets over a linear space. (English) Zbl 1400.03068 Ann. Fuzzy Math. Inform. 12, No. 3, 351-359 (2016). MSC: 03E72 15A03 PDFBibTeX XMLCite \textit{S. Roy} and \textit{T. K. Samanta}, Ann. Fuzzy Math. Inform. 12, No. 3, 351--359 (2016; Zbl 1400.03068) Full Text: Link
Smith, Benjamin The \(\mathbb Q\)-curve construction for endomorphism-accelerated elliptic curves. (English) Zbl 1365.94460 J. Cryptology 29, No. 4, 806-832 (2016). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{B. Smith}, J. Cryptology 29, No. 4, 806--832 (2016; Zbl 1365.94460) Full Text: DOI arXiv
Li, Weixuan; Yu, Wei; Wang, Kunpeng Improved tripling on elliptic curves. (English) Zbl 1409.94892 Lin, Dongdai (ed.) et al., Information security and cryptology. 11th international conference, Inscrypt 2015, Beijing, China, November 1–3, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9589, 193-205 (2016). MSC: 94A60 14G50 14H52 PDFBibTeX XMLCite \textit{W. Li} et al., Lect. Notes Comput. Sci. 9589, 193--205 (2016; Zbl 1409.94892) Full Text: DOI
Subramanya Rao, Srinivasa Rao Three dimensional Montgomery ladder, differential point tripling on Montgomery curves and point quintupling on weierstrass’ and Edwards curves. (English) Zbl 1404.94116 Pointcheval, David (ed.) et al., Progress in cryptology – AFRICACRYPT 2016. 8th international conference on cryptology in Africa, Fes, Morocco, April 13–15, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-31516-4/pbk; 978-3-319-31517-1/ebook). Lecture Notes in Computer Science 9646, 84-106 (2016). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{S. R. Subramanya Rao}, Lect. Notes Comput. Sci. 9646, 84--106 (2016; Zbl 1404.94116) Full Text: DOI
Hu, Zhi; Zhang, Guoliang; Xu, Maozhi Some techniques for faster scalar multiplication on GLS curves. (English) Zbl 1343.94065 Inf. Process. Lett. 116, No. 1, 41-46 (2016). MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{Z. Hu} et al., Inf. Process. Lett. 116, No. 1, 41--46 (2016; Zbl 1343.94065) Full Text: DOI
Saffar, Najlae Falah Hameed Al; Said, Mohamad Rushdan Md Speeding up the elliptic curve scalar multiplication using non adjacent form. (English) Zbl 1510.94107 J. Discrete Math. Sci. Cryptography 18, No. 6, 801-821 (2015). MSC: 94C60 11G07 14G50 PDFBibTeX XMLCite \textit{N. F. H. A. Saffar} and \textit{M. R. M. Said}, J. Discrete Math. Sci. Cryptography 18, No. 6, 801--821 (2015; Zbl 1510.94107) Full Text: DOI
Li, Weixuan; Yu, Wei; Wang, Kunpeng Analysis of fractional \(\omega\)mbNAF for scalar multiplication. (English) Zbl 1403.94068 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 109-120 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{W. Li} et al., Lect. Notes Comput. Sci. 9065, 109--120 (2015; Zbl 1403.94068) Full Text: DOI
Yu, Wei; Kim, Kwang Ho; Jo, Myong Song New fast algorithms for elliptic curve arithmetic in affine coordinates. (English) Zbl 1398.11158 Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 56-64 (2015). MSC: 11Y16 11G20 11T71 94A60 PDFBibTeX XMLCite \textit{W. Yu} et al., Lect. Notes Comput. Sci. 9241, 56--64 (2015; Zbl 1398.11158) Full Text: DOI
Smith, Benjamin Easy scalar decompositions for efficient scalar multiplication on elliptic curves and genus 2 Jacobians. (English) Zbl 1365.11081 Ballet, Stéphane (ed.) et al., Algorithmic arithmetic, geometry, and coding theory. 14th international conference on arithmetic, geometry, cryptography, and coding theory (AGCT), CIRM, Marseille, France, June 3–7, 2013. Proceedings. Providence, RI: American Mathematical Society (AMS) (ISBN 978-1-4704-1461-0/pbk; 978-1-4704-2339-1/ebook). Contemporary Mathematics 637, 127-141 (2015). MSC: 11G20 11T71 11Y16 14G50 PDFBibTeX XMLCite \textit{B. Smith}, Contemp. Math. 637, 127--141 (2015; Zbl 1365.11081) Full Text: DOI arXiv
Mineo, Yasunori; Uchiyama, Shigenori Scalar multiplication for twisted Edwards curves using the extended double-base number system. (English) Zbl 1408.94952 JSIAM Lett. 6, 37-39 (2014). MSC: 94A60 14G50 11T71 PDFBibTeX XMLCite \textit{Y. Mineo} and \textit{S. Uchiyama}, JSIAM Lett. 6, 37--39 (2014; Zbl 1408.94952) Full Text: DOI
Oliveira, Thomaz; Aranha, Diego F.; López, Julio; Rodríguez-Henríquez, Francisco Fast point multiplication algorithms for binary elliptic curves with and without precomputation. (English) Zbl 1382.94150 Joux, Antoine (ed.) et al., Selected areas in cryptography – SAC 2014. 21st international conference, Montreal, QC, Canada, August 14–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-13050-7/pbk; 978-3-319-13051-4/ebook). Lecture Notes in Computer Science 8781, 324-344 (2014). MSC: 94A60 14Q05 PDFBibTeX XMLCite \textit{T. Oliveira} et al., Lect. Notes Comput. Sci. 8781, 324--344 (2014; Zbl 1382.94150) Full Text: DOI
Hu, Zhi; Xu, Maozhi The Gallant-Lambert-Vanstone decomposition revisited. (English) Zbl 1347.94038 Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 201-216 (2014). MSC: 94A60 14Q05 PDFBibTeX XMLCite \textit{Z. Hu} and \textit{M. Xu}, Lect. Notes Comput. Sci. 8567, 201--216 (2014; Zbl 1347.94038) Full Text: DOI
Doche, Christophe; Sutantyo, Daniel Faster repeated doublings on binary elliptic curves. (English) Zbl 1362.94028 Lange, Tanja (ed.) et al., Selected areas in cryptography – SAC 2013. 20th international conference, Burnaby, BC, Canada, August 14–16, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43413-0/pbk; 978-3-662-43414-7/ebook). Lecture Notes in Computer Science 8282, 456-470 (2014). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{C. Doche} and \textit{D. Sutantyo}, Lect. Notes Comput. Sci. 8282, 456--470 (2014; Zbl 1362.94028) Full Text: DOI
Batina, Lejla; Chmielewski, Łukasz; Papachristodoulou, Louiza; Schwabe, Peter; Tunstall, Michael Online template attacks. (English) Zbl 1344.94030 Meier, Willi (ed.) et al., Progress in cryptology – INDOCRYPT 2014. 15th international conference on cryptology in India, New Delhi, India, December 14–17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-13038-5/pbk; 978-3-319-13039-2/ebook). Lecture Notes in Computer Science 8885, 21-36 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Batina} et al., Lect. Notes Comput. Sci. 8885, 21--36 (2014; Zbl 1344.94030) Full Text: DOI
Feix, Benoit; Roussellet, Mylène; Venelli, Alexandre Side-channel analysis on blinded regular scalar multiplications. (English) Zbl 1326.94095 Meier, Willi (ed.) et al., Progress in cryptology – INDOCRYPT 2014. 15th international conference on cryptology in India, New Delhi, India, December 14–17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-13038-5/pbk; 978-3-319-13039-2/ebook). Lecture Notes in Computer Science 8885, 3-20 (2014). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{B. Feix} et al., Lect. Notes Comput. Sci. 8885, 3--20 (2014; Zbl 1326.94095) Full Text: DOI
Suzuki, Koutarou; Yoneyama, Kazuki Secure multi-party computation for elliptic curves. (English) Zbl 1420.68021 Yoshida, Maki (ed.) et al., Advances in information and computer security. 9th international workshop on security, IWSEC 2014, Hirosaki, Japan, August 27–29, 2014. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8639, 98-108 (2014). MSC: 68M12 11G05 68P25 PDFBibTeX XMLCite \textit{K. Suzuki} and \textit{K. Yoneyama}, Lect. Notes Comput. Sci. 8639, 98--108 (2014; Zbl 1420.68021) Full Text: DOI
Jacobson, Michael J. jun.; Rezai Rad, Monireh; Scheidler, Renate Comparison of scalar multiplication on real hyperelliptic curves. (English) Zbl 1364.11117 Adv. Math. Commun. 8, No. 4, 389-406 (2014). MSC: 11G20 11Y40 14G50 94A60 PDFBibTeX XMLCite \textit{M. J. Jacobson jun.} et al., Adv. Math. Commun. 8, No. 4, 389--406 (2014; Zbl 1364.11117) Full Text: DOI
Hisil, Huseyin; Costello, Craig Jacobian coordinates on genus 2 curves. (English) Zbl 1306.94062 Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 338-357 (2014). MSC: 94A60 14G50 14Q05 PDFBibTeX XMLCite \textit{H. Hisil} and \textit{C. Costello}, Lect. Notes Comput. Sci. 8873, 338--357 (2014; Zbl 1306.94062) Full Text: DOI
Longa, Patrick; Sica, Francesco Four-dimensional Gallant-Lambert-Vanstone scalar multiplication. (English) Zbl 1297.94088 J. Cryptology 27, No. 2, 248-283 (2014). MSC: 94A60 14G50 14H45 PDFBibTeX XMLCite \textit{P. Longa} and \textit{F. Sica}, J. Cryptology 27, No. 2, 248--283 (2014; Zbl 1297.94088) Full Text: DOI
Bernstein, Daniel J.; Lange, Tanja Hyper-and-elliptic-curve cryptography. (English) Zbl 1296.94083 LMS J. Comput. Math. 17A, Spec. Iss., 181-202 (2014). MSC: 94A60 11G20 14G50 PDFBibTeX XMLCite \textit{D. J. Bernstein} and \textit{T. Lange}, LMS J. Comput. Math. 17A, 181--202 (2014; Zbl 1296.94083) Full Text: DOI
Heuberger, Clemens; Mazzoli, Michela Symmetric digit sets for elliptic curve scalar multiplication without precomputation. (English) Zbl 1416.11170 Theor. Comput. Sci. 547, 18-33 (2014). MSC: 11T71 68W40 PDFBibTeX XMLCite \textit{C. Heuberger} and \textit{M. Mazzoli}, Theor. Comput. Sci. 547, 18--33 (2014; Zbl 1416.11170) Full Text: DOI
Costello, Craig; Hisil, Huseyin; Smith, Benjamin Faster compact Diffie-Hellman: endomorphisms on the \(x\)-line. (English) Zbl 1332.94063 Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 183-200 (2014). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{C. Costello} et al., Lect. Notes Comput. Sci. 8441, 183--200 (2014; Zbl 1332.94063) Full Text: DOI
Faz-Hernández, Armando; Longa, Patrick; Sánchez, Ana H. Efficient and secure algorithms for GLV-based scalar multiplication and their implementation on GLV-GLS curves. (English) Zbl 1294.94045 Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 1-27 (2014). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{A. Faz-Hernández} et al., Lect. Notes Comput. Sci. 8366, 1--27 (2014; Zbl 1294.94045) Full Text: DOI
Dygin, D. M.; Grebnev, S. V. Efficient implementation of the GOST R 34.10 digital signature scheme using modern approaches to elliptic curve scalar multiplication. (English) Zbl 1475.94177 Mat. Vopr. Kriptografii 4, No. 2, 47-57 (2013). MSC: 94A62 94A60 11G07 PDFBibTeX XMLCite \textit{D. M. Dygin} and \textit{S. V. Grebnev}, Mat. Vopr. Kriptografii 4, No. 2, 47--57 (2013; Zbl 1475.94177) Full Text: DOI MNR
Platonov, A. S.; Gamova, A. N. Efficient algorithms for scalar multiplication over elliptic curves. (Russian. English summary) Zbl 1434.94076 Chebyshevskiĭ Sb. 14, No. 4(48), 180-187 (2013). MSC: 94A60 11G05 68P25 PDFBibTeX XMLCite \textit{A. S. Platonov} and \textit{A. N. Gamova}, Chebyshevskiĭ Sb. 14, No. 4(48), 180--187 (2013; Zbl 1434.94076) Full Text: MNR
Shou, Yanbo; Guyennet, Herve; Lehsaini, Mohamed Parallel scalar multiplication on elliptic curves in wireless sensor networks. (English) Zbl 1351.68094 Frey, Davide (ed.) et al., Distributed computing and networking. 14th international conference, ICDCN 2013, Mumbai, India, January 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-35667-4/pbk). Lecture Notes in Computer Science 7730, 300-314 (2013). MSC: 68P25 68M10 68W10 68W30 PDFBibTeX XMLCite \textit{Y. Shou} et al., Lect. Notes Comput. Sci. 7730, 300--314 (2013; Zbl 1351.68094) Full Text: DOI
Farashahi, Reza R.; Wu, Hongfeng; Zhao, Chang-An Efficient arithmetic on elliptic curves over fields of characteristic three. (English) Zbl 1328.14045 Knudsen, Lars R. (ed.) et al., Selected areas in cryptography. 19th international conference, SAC 2012, Windsor, Canada, August 15–16, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-35998-9/pbk; 978-3-642-35999-6/ebook). Lecture Notes in Computer Science 7707, 135-148 (2013). MSC: 14G50 94A60 PDFBibTeX XMLCite \textit{R. R. Farashahi} et al., Lect. Notes Comput. Sci. 7707, 135--148 (2013; Zbl 1328.14045) Full Text: DOI
Feng, Jun; Wang, Xueming; Sun, Hong Efficiently computable endomorphism for genus 3 hyperelliptic curve cryptosystems. (English) Zbl 1358.94061 Inf. Process. Lett. 113, No. 12, 405-408 (2013). MSC: 94A60 11T71 14G50 PDFBibTeX XMLCite \textit{J. Feng} et al., Inf. Process. Lett. 113, No. 12, 405--408 (2013; Zbl 1358.94061) Full Text: DOI
Li, Ming; Kong, Fanyu; Zhu, Daming Fast addition formulae for Montgomery ladder scalar multiplication on hyperelliptic curves. (Chinese. English summary) Zbl 1299.94086 J. Softw. 24, No. 10, 2275-2288 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Li} et al., J. Softw. 24, No. 10, 2275--2288 (2013; Zbl 1299.94086) Full Text: DOI
Heuberger, C.; Krenn, D. Existence and optimality of \(w\)-non-adjacent forms with an algebraic integer base. (English) Zbl 1289.11004 Acta Math. Hung. 140, No. 1-2, 90-104 (2013). Reviewer: Richard A. Mollin (Calgary) MSC: 11A63 11H06 11R04 94A60 PDFBibTeX XMLCite \textit{C. Heuberger} and \textit{D. Krenn}, Acta Math. Hung. 140, No. 1--2, 90--104 (2013; Zbl 1289.11004) Full Text: DOI arXiv
Heuberger, Clemens; Krenn, Daniel Optimality of the width-\(w\) non-adjacent form: general characterisation and the case of imaginary quadratic bases. (English. French summary) Zbl 1282.11005 J. Théor. Nombres Bordx. 25, No. 2, 353-386 (2013). MSC: 11A63 94A60 11R04 14G50 PDFBibTeX XMLCite \textit{C. Heuberger} and \textit{D. Krenn}, J. Théor. Nombres Bordx. 25, No. 2, 353--386 (2013; Zbl 1282.11005) Full Text: DOI arXiv
Feix, Benoit; Verneuil, Vincent There’s something about \(m\)-ary. Fixed-point scalar multiplication protected against physical attacks. (English) Zbl 1295.94064 Paul, Goutam (ed.) et al., Progress in cryptology – INDOCRYPT 2013. 14th international conference on cryptology in India, Mumbai, India, December 7–10, 2013. Proceedings. Berlin: Springer (ISBN 978-3-319-03514-7/pbk). Lecture Notes in Computer Science 8250, 197-214 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Feix} and \textit{V. Verneuil}, Lect. Notes Comput. Sci. 8250, 197--214 (2013; Zbl 1295.94064) Full Text: DOI
Feng, Rongquan; Nie, Menglong; Wu, Hongfeng Twisted Jacobi intersections curves. (English) Zbl 1295.14028 Theor. Comput. Sci. 494, 24-35 (2013). MSC: 14G50 11T71 94A60 PDFBibTeX XMLCite \textit{R. Feng} et al., Theor. Comput. Sci. 494, 24--35 (2013; Zbl 1295.14028) Full Text: DOI
Krenn, Daniel Analysis of the width-\(w\) non-adjacent form in conjunction with hyperelliptic curve cryptography and with lattices. (English) Zbl 1347.11010 Theor. Comput. Sci. 491, 47-70 (2013). MSC: 11A63 11T71 94A60 14G50 PDFBibTeX XMLCite \textit{D. Krenn}, Theor. Comput. Sci. 491, 47--70 (2013; Zbl 1347.11010) Full Text: DOI arXiv
Smith, Benjamin Families of fast elliptic curves from \(\mathbb Q\)-curves. (English) Zbl 1320.94083 Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-42032-0/pbk). Lecture Notes in Computer Science 8269, 61-78 (2013). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{B. Smith}, Lect. Notes Comput. Sci. 8269, 61--78 (2013; Zbl 1320.94083) Full Text: DOI arXiv
Yu, Wei; Wang, Kunpeng; Li, Bao; Tian, Song Triple-base number system for scalar multiplication. (English) Zbl 1312.94105 Youssef, Amr (ed.) et al., Progress in cryptology – AFRICACRYPT 2013. 6th international conference on cryptology in Africa, Cairo, Egypt, June 22–24, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38552-0/pbk). Lecture Notes in Computer Science 7918, 433-451 (2013). MSC: 94A60 14G50 11A67 PDFBibTeX XMLCite \textit{W. Yu} et al., Lect. Notes Comput. Sci. 7918, 433--451 (2013; Zbl 1312.94105) Full Text: DOI
Negre, Christophe; Robert, Jean-Marc Impact of optimized field operations \(AB\), \(AC\) and \(AB + CD\) in scalar multiplication over binary elliptic curve. (English) Zbl 1314.68415 Youssef, Amr (ed.) et al., Progress in cryptology – AFRICACRYPT 2013. 6th international conference on cryptology in Africa, Cairo, Egypt, June 22–24, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38552-0/pbk). Lecture Notes in Computer Science 7918, 279-296 (2013). MSC: 68W30 11-04 11T71 11Y16 PDFBibTeX XMLCite \textit{C. Negre} and \textit{J.-M. Robert}, Lect. Notes Comput. Sci. 7918, 279--296 (2013; Zbl 1314.68415) Full Text: DOI
Heuberger, Clemens; Krenn, Daniel Analysis of width-\(w\) non-adjacent forms to imaginary quadratic bases. (English) Zbl 1300.11013 J. Number Theory 133, No. 5, 1752-1808 (2013). Reviewer: Volker Ziegler (Salzburg) MSC: 11A63 11T71 28A80 94A60 PDFBibTeX XMLCite \textit{C. Heuberger} and \textit{D. Krenn}, J. Number Theory 133, No. 5, 1752--1808 (2013; Zbl 1300.11013) Full Text: DOI arXiv
Bernstein, Daniel J.; Doumen, Jeroen; Lange, Tanja; Oosterwijk, Jan-Jaap Faster batch forgery identification. (English) Zbl 1295.94173 Galbraith, Steven (ed.) et al., Progress in cryptology – INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 454-473 (2012). MSC: 94A62 14G50 PDFBibTeX XMLCite \textit{D. J. Bernstein} et al., Lect. Notes Comput. Sci. 7668, 454--473 (2012; Zbl 1295.94173) Full Text: DOI
Longa, Patrick; Sica, Francesco Four-dimensional Gallant-Lambert-Vanstone scalar multiplication. (English) Zbl 1292.94107 Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 718-739 (2012). MSC: 94A60 14H45 14G50 PDFBibTeX XMLCite \textit{P. Longa} and \textit{F. Sica}, Lect. Notes Comput. Sci. 7658, 718--739 (2012; Zbl 1292.94107) Full Text: DOI arXiv
Rebeiro, Chester; Roy, Sujoy Sinha; Mukhopadhyay, Debdeep Pushing the limits of high-speed \(\mathrm{GF}(2^m)\) elliptic curve scalar multiplication on FPGAs. (English) Zbl 1294.94071 Prouff, Emmanuel (ed.) et al., Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33026-1/pbk). Lecture Notes in Computer Science 7428, 494-511 (2012). MSC: 94A60 11T71 68W40 PDFBibTeX XMLCite \textit{C. Rebeiro} et al., Lect. Notes Comput. Sci. 7428, 494--511 (2012; Zbl 1294.94071) Full Text: DOI