×

Found 6 Documents (Results 1–6)

Efficient and secure algorithms for GLV-based scalar multiplication and their implementation on GLV-GLS curves. (English) Zbl 1294.94045

Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 1-27 (2014).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Fast cryptography in genus 2. (English) Zbl 1306.94033

Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 194-210 (2013).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Jacobi quartic curves revisited. (English) Zbl 1284.94078

Boyd, Colin (ed.) et al., Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1–3, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02619-5/pbk). Lecture Notes in Computer Science 5594, 452-468 (2009).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

Main Field

all top 3

Software