## Found 220 Documents (Results 1–100)

### Explicit formulas for hashing into $$\mathbb{G}_2$$ on BLS pairing-friendly curves. (Abstract). (English)Zbl 07623886

Morgari, Guglielmo (ed.) et al., Cryptography and coding theory conference 2021. With a preface by Massimiliano Sala. Rome: Aracne Editrice. Collectio Ciphrarum 3, 51-52 (2022).
MSC:  94A60 14G50
Full Text:

Full Text:

Full Text:

### Elliptic curve cryptography: a software implementation. (English)Zbl 07616663

Singh, Brahmjit (ed.) et al., Intelligent computing and communication systems. Singapore: Springer. Algorithms Intell. Syst., 143-148 (2021).
Full Text:

MSC:  15B15
Full Text:

MSC:  03E72
Full Text:

### The elliptic scalar multiplication graph and its application in elliptic curve cryptography. (English)Zbl 1483.94032

MSC:  94A60 14H52 05C50
Full Text:

Full Text:

### Scalar multiplication in elliptic curve libraries. (English)Zbl 1483.94031

MSC:  94A60 14H52
Full Text:

### Pre-computation scheme of window $$\tau$$NAF for Koblitz curves revisited. (English)Zbl 1479.94353

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12697, 187-218 (2021).
MSC:  94A62 94A60
Full Text:

### Fast scalar multiplication of degenerate divisors for hyperelliptic curve cryptosystems. (English)Zbl 07424132

MSC:  11G20 14G50
Full Text:

### Analysis on Yu et al.’s dynamic algorithm for canonic DBC. (English)Zbl 1462.94035

MSC:  94A60 68W40
Full Text:

### A new encoding algorithm for a multidimensional version of the Montgomery ladder. (English)Zbl 07614654

Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2020. 12th international conference on cryptology in Africa, Cairo, Egypt, July 20–22, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12174, 403-422 (2020).
MSC:  94A60 94A29 11Y16
Full Text:

### Online template attack on ECDSA: extracting keys via the other side. (English)Zbl 07614648

Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2020. 12th international conference on cryptology in Africa, Cairo, Egypt, July 20–22, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12174, 323-336 (2020).
MSC:  94A60
Full Text:

### Extending the signed non-zero bit and sign-aligned columns methods to general bases for use in cryptography. (English)Zbl 1492.94094

Bhargavan, Karthikeyan (ed.) et al., Progress in cryptology – INDOCRYPT 2020. 21st international conference on cryptology in India, Bangalore, India, December 13–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12578, 248-270 (2020).
MSC:  94A60 14G50 14H52
Full Text:

### Efficient computable homomorphisms on Hessian curves. (English)Zbl 1499.94032

MSC:  94A55 11T71
Full Text:

### Double-base chains for scalar multiplications on elliptic curves. (English)Zbl 1479.94276

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12107, 538-565 (2020).
MSC:  94A60 11G05
Full Text:

### Secure and compact elliptic curve LR scalar multiplication. (English)Zbl 1466.94030

Liu, Joseph K. (ed.) et al., Information security and privacy. 25th Australasian conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12248, 605-618 (2020).
MSC:  94A60
Full Text:

### Elliptic net scalar multiplication upon Koblitz curves. (English)Zbl 1461.11171

MSC:  11T71 11G05 14G50
Full Text:

### Efficient ECM factorization in parallel with the lyness map. (English)Zbl 07300076

Mantzaflaris, Angelos (ed.), Proceedings of the 45th international symposium on symbolic and algebraic computation, ISSAC ’20, Kalamata, Greece, July 20–23, 2020. New York, NY: Association for Computing Machinery (ACM). 234-240 (2020).
MSC:  68W30
Full Text:

Full Text:

### Kummer for genus one over prime-order fields. (English)Zbl 1455.94169

MSC:  94A60 14G50
Full Text:

MSC:  30A10
Full Text:

Full Text:

### Alternative method to find the number of points on Koblitz curve. (English)Zbl 1448.11117

MSC:  11G20 11T71 94A60
Full Text:

### Elliptic curve scalar multiplication algorithm based on bronze ratio addition chain. (Chinese. English summary)Zbl 1449.94071

MSC:  94A62 11T71

### Secure and compact elliptic curve cryptosystems. (English)Zbl 1434.94069

Jang-Jaccard, Julian (ed.) et al., Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11547, 639-650 (2019).
MSC:  94A60 14G50
Full Text:

### The complete cost of cofactor $$h=1$$. (English)Zbl 1456.94111

Hao, Feng (ed.) et al., Progress in cryptology – INDOCRYPT 2019. 20th international conference on cryptology in India, Hyderabad, India, December 15–18, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11898, 375-397 (2019).
MSC:  94A60
Full Text:

### Optimal 2-3 chains for scalar multiplication. (English)Zbl 1454.94081

Lange, Tanja (ed.) et al., Progress in cryptology – LATINCRYPT 2017. 5th international conference on cryptology and information security in Latin America, Havana, Cuba, September 20–22, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11368, 89-108 (2019).
MSC:  94A60 68W30
Full Text:

### Breaking randomized mixed-radix scalar multiplication algorithms. (English)Zbl 1453.94074

Schwabe, Peter (ed.) et al., Progress in cryptology – LATINCRYPT 2019. 6th international conference on cryptology and information security in Latin America, Santiago de Chile, Chile, October 2–4, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11774, 24-39 (2019).
MSC:  94A60 11A07 68M07
Full Text:

### Faster scalar multiplication on the $$x$$-line: three-dimensional GLV method with three-dimensional differential addition chains. (English)Zbl 1461.94088

Carlet, Claude (ed.) et al., Codes, cryptology and information security. Third international conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019. Proceedings – in honor of Said el Hajji. Cham: Springer. Lect. Notes Comput. Sci. 11445, 236-253 (2019).
MSC:  94A60
Full Text:

### Ternary Montgomery algorithm on Hessian curve over $$\mathrm{GF}(3^m)$$. (Chinese. English summary)Zbl 1438.94055

MSC:  94A60 14G50
Full Text:

Full Text:

### A Cauchy type inequality for Möbius operations. (English)Zbl 1497.26037

MSC:  26D15 40A05
Full Text:

Full Text:

Full Text:

Full Text:

### How to (pre-)compute a ladder – improving the performance of X25519 and X448. (English)Zbl 1384.94093

Adams, Carlisle (ed.) et al., Selected areas in cryptography – SAC 2017. 24th international conference, Ottawa, ON, Canada, August 16–18, 2017. Revised selected papers. Cham: Springer (ISBN 978-3-319-72564-2/pbk; 978-3-319-72565-9/ebook). Lecture Notes in Computer Science 10719, 172-191 (2018).
MSC:  94A60
Full Text:

Full Text:

Full Text:

### Kummer for genus one over prime order fields. (English)Zbl 1380.94105

Takagi, Tsuyoshi (ed.) et al., Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-70696-2/pbk; 978-3-319-70697-9/ebook). Lecture Notes in Computer Science 10625, 3-32 (2017).
MSC:  94A60 14G50 14J28
Full Text:

### Soft vector spaces and soft topological vector spaces. (English)Zbl 1381.46064

MSC:  46S40 54A40 15A03
Full Text:

### Fast, uniform scalar multiplication for genus 2 Jacobians with fast Kummers. (English)Zbl 1418.94038

Avanzi, Roberto (ed.) et al., Selected areas in cryptography – SAC 2016. 23rd international conference, St. John’s, NL, Canada, August 10–12, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10532, 465-481 (2017).
MSC:  94A60 14G50 14Q05
Full Text:

### Constructing elliptic curves for the GLV method with low-cost decomposition. (English)Zbl 1432.94146

MSC:  94A60 11T71
Full Text:

### Scalar multiplication on Huff curves using the Frobenius map. (English)Zbl 1371.94617

MSC:  94A55 11T71
Full Text:

### Jacobian coordinates on genus 2 curves. (English)Zbl 1377.94053

MSC:  94A60 14G50 14Q05
Full Text:

### Guide to pairing-based cryptography. (English)Zbl 1371.94003

Chapman & Hall/CRC Cryptography and Network Security. Boca Raton, FL: CRC Press (ISBN 978-1-4987-2950-5/hbk; 978-1-315-37017-0/ebook). ix, 402 p., not consecutively paged (2017).
Full Text:

### Optimizing memory cost of multi-scalar multiplication. (English)Zbl 1475.94178

MSC:  94A62 94A60
Full Text:

### Non-commutative digit expansions for arithmetic on supersingular elliptic curves. (English)Zbl 1389.11021

MSC:  11A63 14H52
Full Text:

### Implementation of cryptographic algorithms for elliptic curves. (English)Zbl 1421.94051

Castrillón López, Marco (ed.) et al., Geometry, algebra and applications: from mechanics to cryptography. In honor of Jaime Muñoz Masqué on the occasion of his 65th birthday. Cham: Springer. Springer Proc. Math. Stat. 161, 121-133 (2016).
MSC:  94A60 14G50
Full Text:

### Some properties of vector sum and scalar multiplication of soft sets over a linear space. (English)Zbl 1400.03068

MSC:  03E72 15A03
Full Text:

### The $$\mathbb Q$$-curve construction for endomorphism-accelerated elliptic curves. (English)Zbl 1365.94460

MSC:  94A60 14G50
Full Text:

### Improved tripling on elliptic curves. (English)Zbl 1409.94892

Lin, Dongdai (ed.) et al., Information security and cryptology. 11th international conference, Inscrypt 2015, Beijing, China, November 1–3, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9589, 193-205 (2016).
MSC:  94A60 14G50 14H52
Full Text:

### Three dimensional Montgomery ladder, differential point tripling on Montgomery curves and point quintupling on weierstrass’ and Edwards curves. (English)Zbl 1404.94116

Pointcheval, David (ed.) et al., Progress in cryptology – AFRICACRYPT 2016. 8th international conference on cryptology in Africa, Fes, Morocco, April 13–15, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-31516-4/pbk; 978-3-319-31517-1/ebook). Lecture Notes in Computer Science 9646, 84-106 (2016).
MSC:  94A60 14G50
Full Text:

### Some techniques for faster scalar multiplication on GLS curves. (English)Zbl 1343.94065

MSC:  94A60 11T71
Full Text:

### Speeding up the elliptic curve scalar multiplication using non adjacent form. (English)Zbl 07509084

MSC:  65-XX 11-XX
Full Text:

### Analysis of fractional $$\omega$$mbNAF for scalar multiplication. (English)Zbl 1403.94068

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 109-120 (2015).
MSC:  94A60
Full Text:

### New fast algorithms for elliptic curve arithmetic in affine coordinates. (English)Zbl 1398.11158

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 56-64 (2015).
Full Text:

### Easy scalar decompositions for efficient scalar multiplication on elliptic curves and genus 2 Jacobians. (English)Zbl 1365.11081

Ballet, Stéphane (ed.) et al., Algorithmic arithmetic, geometry, and coding theory. 14th international conference on arithmetic, geometry, cryptography, and coding theory (AGCT), CIRM, Marseille, France, June 3–7, 2013. Proceedings. Providence, RI: American Mathematical Society (AMS) (ISBN 978-1-4704-1461-0/pbk; 978-1-4704-2339-1/ebook). Contemporary Mathematics 637, 127-141 (2015).
Full Text:

### Scalar multiplication for twisted Edwards curves using the extended double-base number system. (English)Zbl 1408.94952

MSC:  94A60 14G50 11T71
Full Text:

### Fast point multiplication algorithms for binary elliptic curves with and without precomputation. (English)Zbl 1382.94150

Joux, Antoine (ed.) et al., Selected areas in cryptography – SAC 2014. 21st international conference, Montreal, QC, Canada, August 14–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-13050-7/pbk; 978-3-319-13051-4/ebook). Lecture Notes in Computer Science 8781, 324-344 (2014).
MSC:  94A60 14Q05
Full Text:

### The Gallant-Lambert-Vanstone decomposition revisited. (English)Zbl 1347.94038

Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 201-216 (2014).
MSC:  94A60 14Q05
Full Text:

### Faster repeated doublings on binary elliptic curves. (English)Zbl 1362.94028

Lange, Tanja (ed.) et al., Selected areas in cryptography – SAC 2013. 20th international conference, Burnaby, BC, Canada, August 14–16, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43413-0/pbk; 978-3-662-43414-7/ebook). Lecture Notes in Computer Science 8282, 456-470 (2014).
MSC:  94A60 14G50
Full Text:

### Online template attacks. (English)Zbl 1344.94030

Meier, Willi (ed.) et al., Progress in cryptology – INDOCRYPT 2014. 15th international conference on cryptology in India, New Delhi, India, December 14–17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-13038-5/pbk; 978-3-319-13039-2/ebook). Lecture Notes in Computer Science 8885, 21-36 (2014).
MSC:  94A60
Full Text:

### Side-channel analysis on blinded regular scalar multiplications. (English)Zbl 1326.94095

Meier, Willi (ed.) et al., Progress in cryptology – INDOCRYPT 2014. 15th international conference on cryptology in India, New Delhi, India, December 14–17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-13038-5/pbk; 978-3-319-13039-2/ebook). Lecture Notes in Computer Science 8885, 3-20 (2014).
MSC:  94A60 14G50
Full Text:

### Secure multi-party computation for elliptic curves. (English)Zbl 1420.68021

Yoshida, Maki (ed.) et al., Advances in information and computer security. 9th international workshop on security, IWSEC 2014, Hirosaki, Japan, August 27–29, 2014. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8639, 98-108 (2014).
MSC:  68M12 11G05 68P25
Full Text:

Full Text:

### Jacobian coordinates on genus 2 curves. (English)Zbl 1306.94062

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 338-357 (2014).
MSC:  94A60 14G50 14Q05
Full Text:

### Four-dimensional Gallant-Lambert-Vanstone scalar multiplication. (English)Zbl 1297.94088

MSC:  94A60 14G50 14H45
Full Text:

### Hyper-and-elliptic-curve cryptography. (English)Zbl 1296.94083

MSC:  94A60 11G20 14G50
Full Text:

### Symmetric digit sets for elliptic curve scalar multiplication without precomputation. (English)Zbl 1416.11170

MSC:  11T71 68W40
Full Text:

### Faster compact Diffie-Hellman: endomorphisms on the $$x$$-line. (English)Zbl 1332.94063

Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 183-200 (2014).
MSC:  94A60 14G50
Full Text:

### Efficient and secure algorithms for GLV-based scalar multiplication and their implementation on GLV-GLS curves. (English)Zbl 1294.94045

Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 1-27 (2014).
MSC:  94A60 14G50
Full Text:

### Efficient implementation of the GOST R 34.10 digital signature scheme using modern approaches to elliptic curve scalar multiplication. (English)Zbl 1475.94177

MSC:  94A62 94A60 11G07
Full Text:

### Efficient algorithms for scalar multiplication over elliptic curves. (Russian. English summary)Zbl 1434.94076

MSC:  94A60 11G05 68P25
Full Text:

### Parallel scalar multiplication on elliptic curves in wireless sensor networks. (English)Zbl 1351.68094

Frey, Davide (ed.) et al., Distributed computing and networking. 14th international conference, ICDCN 2013, Mumbai, India, January 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-35667-4/pbk). Lecture Notes in Computer Science 7730, 300-314 (2013).
Full Text:

### Efficient arithmetic on elliptic curves over fields of characteristic three. (English)Zbl 1328.14045

Knudsen, Lars R. (ed.) et al., Selected areas in cryptography. 19th international conference, SAC 2012, Windsor, Canada, August 15–16, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-35998-9/pbk; 978-3-642-35999-6/ebook). Lecture Notes in Computer Science 7707, 135-148 (2013).
MSC:  14G50 94A60
Full Text:

### Efficiently computable endomorphism for genus 3 hyperelliptic curve cryptosystems. (English)Zbl 1358.94061

MSC:  94A60 11T71 14G50
Full Text:

MSC:  94A60
Full Text:

Full Text:

Full Text:

### There’s something about $$m$$-ary. Fixed-point scalar multiplication protected against physical attacks. (English)Zbl 1295.94064

Paul, Goutam (ed.) et al., Progress in cryptology – INDOCRYPT 2013. 14th international conference on cryptology in India, Mumbai, India, December 7–10, 2013. Proceedings. Berlin: Springer (ISBN 978-3-319-03514-7/pbk). Lecture Notes in Computer Science 8250, 197-214 (2013).
MSC:  94A60
Full Text:

### Twisted Jacobi intersections curves. (English)Zbl 1295.14028

MSC:  14G50 11T71 94A60
Full Text:

Full Text:

### Families of fast elliptic curves from $$\mathbb Q$$-curves. (English)Zbl 1320.94083

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-42032-0/pbk). Lecture Notes in Computer Science 8269, 61-78 (2013).
MSC:  94A60 14G50
Full Text:

### Triple-base number system for scalar multiplication. (English)Zbl 1312.94105

Youssef, Amr (ed.) et al., Progress in cryptology – AFRICACRYPT 2013. 6th international conference on cryptology in Africa, Cairo, Egypt, June 22–24, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38552-0/pbk). Lecture Notes in Computer Science 7918, 433-451 (2013).
MSC:  94A60 14G50 11A67
Full Text:

### Impact of optimized field operations $$AB$$, $$AC$$ and $$AB + CD$$ in scalar multiplication over binary elliptic curve. (English)Zbl 1314.68415

Youssef, Amr (ed.) et al., Progress in cryptology – AFRICACRYPT 2013. 6th international conference on cryptology in Africa, Cairo, Egypt, June 22–24, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38552-0/pbk). Lecture Notes in Computer Science 7918, 279-296 (2013).
Full Text:

Full Text:

### Faster batch forgery identification. (English)Zbl 1295.94173

Galbraith, Steven (ed.) et al., Progress in cryptology – INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 454-473 (2012).
MSC:  94A62 14G50
Full Text:

### Four-dimensional Gallant-Lambert-Vanstone scalar multiplication. (English)Zbl 1292.94107

Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 718-739 (2012).
MSC:  94A60 14H45 14G50
Full Text:

### Pushing the limits of high-speed $$\mathrm{GF}(2^m)$$ elliptic curve scalar multiplication on FPGAs. (English)Zbl 1294.94071

Prouff, Emmanuel (ed.) et al., Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33026-1/pbk). Lecture Notes in Computer Science 7428, 494-511 (2012).
MSC:  94A60 11T71 68W40
Full Text:

### Faster implementation of scalar multiplication on Koblitz curves. (English)Zbl 1304.94032

Hevia, Alejandro (ed.) et al., Progress in cryptology – LATINCRYPT 2012. 2nd international conference on cryptology and information security in Latin America, Santiago, Chile, October 7–10, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33480-1/pbk). Lecture Notes in Computer Science 7533, 177-193 (2012).
MSC:  94A60
Full Text:

Full Text:

### Efficient precomputation schemes of $$kP+lQ$$. (English)Zbl 1243.94028

MSC:  94A60 68W30
Full Text:

### Improved fixed-base comb method for fast scalar multiplication. (English)Zbl 1291.94134

Mitrokotsa, Aikaterini (ed.) et al., Progress in cryptology – AFRICACRYPT 2012. 5th international conference on cryptology in Africa, Ifrane, Morocco, July 10–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31409-4/pbk). Lecture Notes in Computer Science 7374, 342-359 (2012).
MSC:  94A60 14G50 68M07
Full Text:

### A duality in space usage between left-to-right and right-to-left exponentiation. (English)Zbl 1292.94148

Dunkelman, Orr (ed.), Topics in cryptology – CT-RSA 2012. The cryptographers’ track at the RSA conference 2012, San Francisco, CA, USA, February 27–March 2, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-27953-9/pbk). Lecture Notes in Computer Science 7178, 84-97 (2012).
MSC:  94A60 14G50
Full Text:

### Sublinear scalar multiplication on hyperelliptic Koblitz curves. (English)Zbl 1266.94023

Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 399-411 (2012).
MSC:  94A60 14G50
Full Text:

MSC:  11G20
Full Text:

### Bounds and trade-offs for double-base number systems. (English)Zbl 1260.94046

MSC:  94A60 14H52 68W40
Full Text:

all top 5

all top 5

all top 5

all top 3

all top 3