Battagliola, Michele; Longo, Riccardo; Meneghetti, Alessio; Sala, Massimiliano Provably unforgeable threshold EdDSA with an offline participant and trustless setup. (English) Zbl 1520.94040 Mediterr. J. Math. 20, No. 5, Paper No. 253, 30 p. (2023). MSC: 94A60 94A62 12E20 14H52 68W40 14G50 PDFBibTeX XMLCite \textit{M. Battagliola} et al., Mediterr. J. Math. 20, No. 5, Paper No. 253, 30 p. (2023; Zbl 1520.94040) Full Text: DOI
Chavez-Saab, Jorge; Rodríguez-Henríquez, Francisco; Tibouchi, Mehdi SwiftEC: Shallue-van de Woestijne indifferentiable function to elliptic curves. Faster indifferentiable hashing to elliptic curves. (English) Zbl 1519.94083 Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13791, 63-92 (2023). MSC: 94A60 14G50 14H52 PDFBibTeX XMLCite \textit{J. Chavez-Saab} et al., Lect. Notes Comput. Sci. 13791, 63--92 (2023; Zbl 1519.94083) Full Text: DOI
Alpirez Bock, Estuardo; Chmielewski, Lukasz; Miteloudi, Konstantina Protecting the most significant bits in scalar multiplication algorithms. (English) Zbl 07722923 Batina, Lejla (ed.) et al., Security, privacy, and applied cryptography engineering. 12th international conference, SPACE 2022, Jaipur, India, December 9–12, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13783, 118-137 (2022). MSC: 94A60 14G50 14H52 68P25 PDFBibTeX XMLCite \textit{E. Alpirez Bock} et al., Lect. Notes Comput. Sci. 13783, 118--137 (2022; Zbl 07722923) Full Text: DOI
Nath, Kaushik; Sarkar, Palash Efficient arithmetic in (pseudo-)Mersenne prime order fields. (English) Zbl 1500.94045 Adv. Math. Commun. 16, No. 2, 303-348 (2022). MSC: 94A60 12E20 11A25 14G50 11G07 68P25 PDFBibTeX XMLCite \textit{K. Nath} and \textit{P. Sarkar}, Adv. Math. Commun. 16, No. 2, 303--348 (2022; Zbl 1500.94045) Full Text: DOI
Cheng, Hao; Großschädl, Johann; Tian, Jiaqi; Rønne, Peter B.; Ryan, Peter Y. A. High-throughput elliptic curve cryptography using AVX2 vector instructions. (English) Zbl 1485.94071 Dunkelman, Orr (ed.) et al., Selected areas in cryptography. 27th international conference, Halifax, NS, Canada (virtual event), October 21–23, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12804, 698-719 (2021). MSC: 94A60 11G20 11G07 14G50 PDFBibTeX XMLCite \textit{H. Cheng} et al., Lect. Notes Comput. Sci. 12804, 698--719 (2021; Zbl 1485.94071) Full Text: DOI Link
Costello, Craig B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion. (English) Zbl 1511.94082 Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12492, 440-463 (2020). MSC: 94A60 81P94 14G50 PDFBibTeX XMLCite \textit{C. Costello}, Lect. Notes Comput. Sci. 12492, 440--463 (2020; Zbl 1511.94082) Full Text: DOI
Karati, Sabyasachi; Sarkar, Palash Kummer for genus one over prime-order fields. (English) Zbl 1455.94169 J. Cryptology 33, No. 1, 92-129 (2020). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{S. Karati} and \textit{P. Sarkar}, J. Cryptology 33, No. 1, 92--129 (2020; Zbl 1455.94169) Full Text: DOI
Karati, Sabyasachi; Sarkar, Palash Connecting Legendre with Kummer and Edwards. (English) Zbl 1409.14057 Adv. Math. Commun. 13, No. 1, 41-66 (2019). Reviewer: Dimitros Poulakis (Thessaloniki) MSC: 14H52 11T71 14G50 94A60 PDFBibTeX XMLCite \textit{S. Karati} and \textit{P. Sarkar}, Adv. Math. Commun. 13, No. 1, 41--66 (2019; Zbl 1409.14057) Full Text: DOI
Karati, Sabyasachi; Sarkar, Palash Kummer for genus one over prime order fields. (English) Zbl 1380.94105 Takagi, Tsuyoshi (ed.) et al., Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-70696-2/pbk; 978-3-319-70697-9/ebook). Lecture Notes in Computer Science 10625, 3-32 (2017). MSC: 94A60 14G50 14J28 PDFBibTeX XMLCite \textit{S. Karati} and \textit{P. Sarkar}, Lect. Notes Comput. Sci. 10625, 3--32 (2017; Zbl 1380.94105) Full Text: DOI
Longa, Patrick Four\(\mathbb {Q}\)NEON: faster elliptic curve scalar multiplications on ARM processors. (English) Zbl 1418.94054 Avanzi, Roberto (ed.) et al., Selected areas in cryptography – SAC 2016. 23rd international conference, St. John’s, NL, Canada, August 10–12, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10532, 501-519 (2017). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{P. Longa}, Lect. Notes Comput. Sci. 10532, 501--519 (2017; Zbl 1418.94054) Full Text: DOI
Costello, Craig; Longa, Patrick; Naehrig, Michael Efficient algorithms for supersingular isogeny Diffie-Hellman. (English) Zbl 1384.94046 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53017-7/pbk; 978-3-662-53018-4/ebook). Lecture Notes in Computer Science 9814, 572-601 (2016). MSC: 94A60 14G50 81P94 PDFBibTeX XMLCite \textit{C. Costello} et al., Lect. Notes Comput. Sci. 9814, 572--601 (2016; Zbl 1384.94046) Full Text: DOI
Smith, Benjamin The \(\mathbb Q\)-curve construction for endomorphism-accelerated elliptic curves. (English) Zbl 1365.94460 J. Cryptology 29, No. 4, 806-832 (2016). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{B. Smith}, J. Cryptology 29, No. 4, 806--832 (2016; Zbl 1365.94460) Full Text: DOI arXiv
Liu, Zhe; Großschädl, Johann; Li, Lin; Xu, Qiuliang Energy-efficient elliptic curve cryptography for MSP430-based wireless sensor nodes. (English) Zbl 1348.94068 Liu, Joseph K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-40252-9/pbk; 978-3-319-40253-6/ebook). Lecture Notes in Computer Science 9722, 94-112 (2016). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{Z. Liu} et al., Lect. Notes Comput. Sci. 9722, 94--112 (2016; Zbl 1348.94068) Full Text: DOI Link
Bos, Joppe W.; Costello, Craig; Hisil, Huseyin; Lauter, Kristin Fast cryptography in genus 2. (English) Zbl 1351.94028 J. Cryptology 29, No. 1, 28-60 (2016). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{J. W. Bos} et al., J. Cryptology 29, No. 1, 28--60 (2016; Zbl 1351.94028) Full Text: DOI
Düll, Michael; Haase, Björn; Hinterwälder, Gesine; Hutter, Michael; Paar, Christof; Sánchez, Ana Helena; Schwabe, Peter High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers. (English) Zbl 1327.94042 Des. Codes Cryptography 77, No. 2-3, 493-514 (2015). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{M. Düll} et al., Des. Codes Cryptography 77, No. 2--3, 493--514 (2015; Zbl 1327.94042) Full Text: DOI Link
Tang, Chunming; Xu, Maozhi; Qi, Yanfeng Cryptography on twisted Edwards curves over local fields. (English) Zbl 1357.94075 Sci. China, Inf. Sci. 58, No. 1, Article ID 012109, 15 p. (2015). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{C. Tang} et al., Sci. China, Inf. Sci. 58, No. 1, Article ID 012109, 15 p. (2015; Zbl 1357.94075) Full Text: DOI Link
Tibouchi, Mehdi Elligator squared: uniform points on elliptic curves of prime order as uniform random strings. (English) Zbl 1366.94538 Christin, Nicolas (ed.) et al., Financial cryptography and data security. 18th international conference, FC 2014, Christ Church, Barbados, March 3–7, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-45471-8/pbk). Lecture Notes in Computer Science 8437, 139-156 (2014). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{M. Tibouchi}, Lect. Notes Comput. Sci. 8437, 139--156 (2014; Zbl 1366.94538) Full Text: DOI
Longa, Patrick; Sica, Francesco Four-dimensional Gallant-Lambert-Vanstone scalar multiplication. (English) Zbl 1297.94088 J. Cryptology 27, No. 2, 248-283 (2014). MSC: 94A60 14G50 14H45 PDFBibTeX XMLCite \textit{P. Longa} and \textit{F. Sica}, J. Cryptology 27, No. 2, 248--283 (2014; Zbl 1297.94088) Full Text: DOI
Gaudry, Pierrick; Schost, Éric Genus 2 point counting over prime fields. (English) Zbl 1267.11127 J. Symb. Comput. 47, No. 4, 368-400 (2012). MSC: 11Y16 11G20 11T71 14G50 94A60 PDFBibTeX XMLCite \textit{P. Gaudry} and \textit{É. Schost}, J. Symb. Comput. 47, No. 4, 368--400 (2012; Zbl 1267.11127) Full Text: DOI
Galbraith, Steven D.; Lin, Xibin; Scott, Michael Endomorphisms for faster elliptic curve cryptography on a large class of curves. (English) Zbl 1258.94036 J. Cryptology 24, No. 3, 446-469 (2011). MSC: 94A60 11T71 14G50 PDFBibTeX XMLCite \textit{S. D. Galbraith} et al., J. Cryptology 24, No. 3, 446--469 (2011; Zbl 1258.94036) Full Text: DOI
Castryck, Wouter; Vercauteren, Frederik Toric forms of elliptic curves and their arithmetic. (English) Zbl 1228.14024 J. Symb. Comput. 46, No. 8, 943-966 (2011). Reviewer: Enric Nart Viñals (Barcelona) MSC: 14G50 14H52 14Q05 11G20 PDFBibTeX XMLCite \textit{W. Castryck} and \textit{F. Vercauteren}, J. Symb. Comput. 46, No. 8, 943--966 (2011; Zbl 1228.14024) Full Text: DOI
Bernstein, Daniel J. Curve25519: new Diffie-Hellman speed records. (English) Zbl 1151.94480 Yung, Moti (ed.) et al., Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33851-9/pbk). Lecture Notes in Computer Science 3958, 207-228 (2006). MSC: 94A60 11G05 14G50 PDFBibTeX XMLCite \textit{D. J. Bernstein}, Lect. Notes Comput. Sci. 3958, 207--228 (2006; Zbl 1151.94480) Full Text: DOI