×

Found 134 Documents (Results 1–100)

Binary Kummer line. (English) Zbl 07763071

Tibouchi, Mehdi (ed.) et al., Applied cryptography and network security. 21st international conference, ACNS 2023, Kyoto, Japan, June 19–22, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13905, 363-393 (2023).
MSC:  94A60 11G07 14H52
PDFBibTeX XMLCite
Full Text: DOI

How to verifiably encrypt many bits for an election? (English) Zbl 1524.94064

Atluri, Vijayalakshmi (ed.) et al., Computer security – ESORICS 2022. 27th European symposium on research in computer security, Copenhagen, Denmark, September 26–30, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13555, 653-671 (2022).
MSC:  94A60 91B12
PDFBibTeX XMLCite
Full Text: DOI

Half-aggregation of Schnorr signatures with tight reductions. (English) Zbl 1524.94078

Atluri, Vijayalakshmi (ed.) et al., Computer security – ESORICS 2022. 27th European symposium on research in computer security, Copenhagen, Denmark, September 26–30, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13555, 385-404 (2022).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

The rank-based cryptography library. (English) Zbl 1494.94032

Wachter-Zeh, Antonia (ed.) et al., Code-based cryptography. 9th international workshop, CBCrypto 2021, Munich, Germany, June 21–22, 2021. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13150, 22-41 (2022).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A formula for disaster: a unified approach to elliptic curve special-point-based attacks. (English) Zbl 1514.94129

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13090, 130-159 (2021).
MSC:  94A60 11G07 14H52
PDFBibTeX XMLCite
Full Text: DOI

High-throughput elliptic curve cryptography using AVX2 vector instructions. (English) Zbl 1485.94071

Dunkelman, Orr (ed.) et al., Selected areas in cryptography. 27th international conference, Halifax, NS, Canada (virtual event), October 21–23, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12804, 698-719 (2021).
PDFBibTeX XMLCite
Full Text: DOI Link

Efficient FPGA design of exception-free generic elliptic curve cryptosystems. (English) Zbl 1498.94083

Sako, Kazue (ed.) et al., Applied cryptography and network security. 19th international conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12726, 393-414 (2021).
PDFBibTeX XMLCite
Full Text: DOI

Pre-computation scheme of window \(\tau\)NAF for Koblitz curves revisited. (English) Zbl 1479.94353

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12697, 187-218 (2021).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Online template attack on ECDSA: extracting keys via the other side. (English) Zbl 1504.94182

Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2020. 12th international conference on cryptology in Africa, Cairo, Egypt, July 20–22, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12174, 323-336 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Divisor class group arithmetic on \(C_{3,4}\) curves. (English) Zbl 1457.14075

Galbraith, Steven D. (ed.), ANTS XIV. Proceedings of the fourteenth algorithmic number theory symposium, Auckland, New Zealand, virtual event, June 29 – July 4, 2020. Berkeley, CA: Mathematical Sciences Publishers (MSP). Open Book Ser. 4, 317-334 (2020).
PDFBibTeX XMLCite
Full Text: DOI

Injective encodings to binary ordinary elliptic curves. (English) Zbl 1447.94036

Cid, Carlos (ed.) et al., Selected areas in cryptography – SAC 2018. 25th international conference, Calgary, AB, Canada, August 15–17, 2018. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11349, 434-449 (2019).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

EPG-representations with small grid-size. (English) Zbl 1503.68208

Frati, Fabrizio (ed.) et al., Graph drawing and network visualization. 25th international symposium, GD 2017, Boston, MA, USA, September 25–27, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10692, 184-196 (2018).
MSC:  68R10 05C62 68U05
PDFBibTeX XMLCite
Full Text: DOI arXiv

Big prime field FFT on the GPU. (English) Zbl 1472.94046

Burr, Michael (ed.), Proceedings of the 42nd international symposium on symbolic and algebraic computation, ISSAC 2017, Kaiserslautern, Germany, July 25–28, 2017. New York, NY: Association for Computing Machinery (ACM). 85-92 (2017).
MSC:  94A60 65T50 68W30
PDFBibTeX XMLCite
Full Text: DOI HAL

Energy-efficient elliptic curve cryptography for MSP430-based wireless sensor nodes. (English) Zbl 1348.94068

Liu, Joseph K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-40252-9/pbk; 978-3-319-40253-6/ebook). Lecture Notes in Computer Science 9722, 94-112 (2016).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI Link

ECC on your fingertips: a single instruction approach for lightweight ECC design in \(\mathrm{GF}(p)\). (English) Zbl 1396.94095

Dunkelman, Orr (ed.) et al., Selected areas in cryptography – SAC 2015. 22nd international conference, Sackville, NB, Canada, August 12–14, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-31300-9/pbk; 978-3-319-31301-6/ebook). Lecture Notes in Computer Science 9566, 161-177 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Ultra high-performance ASIC implementation of SM2 with SPA resistance. (English) Zbl 1384.94113

Qing, Sihan (ed.) et al., Information and communications security. 17th international conference, ICICS 2015, Beijing, China, December 9–11, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-29813-9/pbk; 978-3-319-29814-6/ebook). Lecture Notes in Computer Science 9543, 212-219 (2016).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data. (English) Zbl 1398.68148

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 242-261 (2015).
MSC:  68P25 92D10 94A60
PDFBibTeX XMLCite
Full Text: DOI

Leakage-resilient cryptography over large finite fields: theory and practice. (English) Zbl 1423.94046

Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9092, 655-674 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cold boot attacks in the discrete logarithm setting. (English) Zbl 1382.94155

Nyberg, Kaisa (ed.), Topics in cryptology – CT-RSA 2015. The cryptographer’s track at the RSA conference 2015, San Francisco, CA, USA, April 20–24, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-16714-5/pbk; 978-3-319-16715-2/ebook). Lecture Notes in Computer Science 9048, 449-465 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Low-weight primes for lightweight elliptic curve cryptography on 8-bit AVR processors. (English) Zbl 1347.94050

Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 217-235 (2014).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI Link

Square always exponentiation. (English) Zbl 1291.94069

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – INDOCRYPT 2011. 12th international conference on cryptology in India, Chennai, India, December 11–14, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25577-9/pbk). Lecture Notes in Computer Science 7107, 40-57 (2011).
MSC:  94A60 68M07
PDFBibTeX XMLCite
Full Text: DOI Link

Improved precomputation scheme for scalar multiplication on elliptic curves. (English) Zbl 1292.14040

Chen, Liqun (ed.), Cryptography and coding. 13th IMA international conference, IMACC 2011, Oxford, UK, December 12–15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25515-1/pbk). Lecture Notes in Computer Science 7089, 327-343 (2011).
PDFBibTeX XMLCite
Full Text: DOI

Improving smart card security using elliptic curve cryptography over prime field \((F_{p})\). (English) Zbl 1228.94020

Lee, Roger (ed.), Software engineering, artificial intelligence, networking and parallel/distributed computing 2011. Selected papers based on the presentations at the 12th international conference (SNPD 2011), Sydney, Australia, July 6–8, 2011. Berlin: Springer (ISBN 978-3-642-22287-0/hbk; 978-3-642-22288-7/ebook). Studies in Computational Intelligence 368, 127-140 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Memory-constrained implementations of elliptic curve cryptography in co-\(Z\) coordinate representation. (English) Zbl 1280.94071

Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2011. 4th international conference on cryptology in Africa, Dakar, Senegal, July 5–7, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21968-9/pbk). Lecture Notes in Computer Science 6737, 170-187 (2011).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Batch computations revisited: combining key computations and batch verifications. (English) Zbl 1290.94157

Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 130-142 (2011).
MSC:  94A62 14G50 68P25
PDFBibTeX XMLCite
Full Text: DOI

Secure data aggregation in wireless sensor networks: homomorphism versus watermarking approach. (English) Zbl 1208.68030

Zheng, Jun (ed.) et al., Ad hoc networks. Second international conference, ADHOCNETS 2010, Victoria, BC, Canada, August 18–20, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-17993-8/pbk; 978-3-642-17994-5/ebook). Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 49, 344-358 (2010).
MSC:  68M10 68P25 94A62
PDFBibTeX XMLCite
Full Text: DOI HAL

Faster Montgomery modular multiplication without pre-computational phase for some classes of finite fields. (English) Zbl 1202.68162

Gelenbe, Erol (ed.) et al., Computer and information science. Proceedings of the 25th international symposium on computer and information sciences, London, UK, September 22–24, 2010. Dordrecht: Springer (ISBN 978-90-481-9793-4/hbk; 978-90-481-9794-1/ebook). Lecture Notes in Electrical Engineering 62, 405-408 (2010).
MSC:  68M07 14G50 94A40
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

Biographic Reference

all top 3

Software