Guide to Elliptic Curve Cryptography
Citations
1,113 citations
1,081 citations
Cites background from "Guide to Elliptic Curve Cryptograph..."
...2 For a detailed introduction to ECC the reader is referred to [10]....
[...]
966 citations
929 citations
Cites methods from "Guide to Elliptic Curve Cryptograph..."
...The result is shown in Table 4. The ECC-based signature is generated and verified using the Elliptic Curve Digital Signature Algorithm (ECDSA) [ 41 ]....
[...]
846 citations
Cites background from "Guide to Elliptic Curve Cryptograph..."
...For applications that do not require secure communication, three factors dominate the overall energy consumed; idle listening, application-specific operations and communication....
[...]
References
25,929 citations
14,980 citations
"Guide to Elliptic Curve Cryptograph..." refers background or methods in this paper
...247 Acronyms AES Advanced Encryption Standard AIA Almost Inverse Algorithm ANSI American National Standards Institute ASIC Application-Specific Integrated Circuit BEA Binary Extended Algorithm DES Data Encryption Standard DH Diffie-Hellman DHP Diffie-Hellman Problem DL Discrete Logarithm DLP Discrete Logarithm Problem DPA Differential Power Analysis DSA Digital Signature Algorithm DSS Digital Signature Standard ECC Elliptic Curve Cryptography ECDDHP Elliptic Curve Decision Diffie-Hellman Problem ECDH Elliptic Curve Diffie-Hellman ECDHP Elliptic Curve Diffie-Hellman Problem ECDLP Elliptic Curve Discrete Logarithm Problem ECDSA Elliptic Curve Digital Signature Algorithm ECIES Elliptic Curve Integrated Encryption Scheme EC-KCDSA Elliptic Curve Korean Certificate-based Digital Signature Algorithm ECMQV Elliptic Curve Menezes-Qu-Vanstone EEA Extended Euclidean Algorithm FIPS Federal Information Processing Standards FPGA Field-Programmable Gate Array gcd Greatest Common Divisor GHS Gaudry-Hess-Smart GMR Goldwasser-Micali-Rivest HCDLP Hyperelliptic Curve Discrete Logarithm Problem xviii Acronyms HMAC Hash-based Message Authentication Code IEC International Electrotechnical Commission IEEE Institute of Electrical and Electronics Engineers IFP Integer Factorization Problem ISO International Organization for Standardization JSF Joint Sparse Form KDF Key Derivation Function KEM Key Encapsulation Mechanism LD López-Dahab MAC Message Authentication Code NAF Non-Adjacent Form NESSIE New European Schemes for Signatures, Integrity and Encryption NFS Number Field Sieve NIST National Institute of Standards and Technology OEF Optimal Extension Field PKI Public-Key Infrastructure PSEC Provably Secure Elliptic Curve encryption RSA Rivest-Shamir-Adleman SEC Standards for Efficient Cryptography SECG Standards for Efficient Cryptography Group SHA-1 Secure Hash Algorithm (revised) SIMD Single-Instruction Multiple-Data SPA Simple Power Analysis SSL Secure Sockets Layer STS Station-To-Station TLS Transport Layer Security TNAF τ -adic NAF VLSI Very Large Scale Integration Preface The study of elliptic curves by algebraists, algebraic geometers and number theorists dates back to the middle of the nineteenth century....
[...]
...4.1 The elliptic curve discrete logarithm problem . . . . . . . . . . . . . 153 4.1.1 Pohlig-Hellman attack . . . . . . . . . . . . . . . . . . . . ....
[...]
...4 The concept of a signature scheme was introduced in 1976 by Diffie and Hellman [121]....
[...]
...6 The Diffie-Hellman key agreement protocol was introduced in the landmark paper of Diffie and Hellman [121]....
[...]
...The notion of public-key cryptography, depicted in Figure 1.2(b), was introduced in 1975 by Diffie, Hellman and Merkle to address the aforementioned shortcomings 1This approach of using a centralized third-party to distribute keys for symmetric-key algorithms to parties as they are needed is used by the Kerberos network authentication protocol for client/server applications....
[...]
14,659 citations
13,597 citations
"Guide to Elliptic Curve Cryptograph..." refers background in this paper
...247 Acronyms AES Advanced Encryption Standard AIA Almost Inverse Algorithm ANSI American National Standards Institute ASIC Application-Specific Integrated Circuit BEA Binary Extended Algorithm DES Data Encryption Standard DH Diffie-Hellman DHP Diffie-Hellman Problem DL Discrete Logarithm DLP Discrete Logarithm Problem DPA Differential Power Analysis DSA Digital Signature Algorithm DSS Digital Signature Standard ECC Elliptic Curve Cryptography ECDDHP Elliptic Curve Decision Diffie-Hellman Problem ECDH Elliptic Curve Diffie-Hellman ECDHP Elliptic Curve Diffie-Hellman Problem ECDLP Elliptic Curve Discrete Logarithm Problem ECDSA Elliptic Curve Digital Signature Algorithm ECIES Elliptic Curve Integrated Encryption Scheme EC-KCDSA Elliptic Curve Korean Certificate-based Digital Signature Algorithm ECMQV Elliptic Curve Menezes-Qu-Vanstone EEA Extended Euclidean Algorithm FIPS Federal Information Processing Standards FPGA Field-Programmable Gate Array gcd Greatest Common Divisor GHS Gaudry-Hess-Smart GMR Goldwasser-Micali-Rivest HCDLP Hyperelliptic Curve Discrete Logarithm Problem xviii Acronyms HMAC Hash-based Message Authentication Code IEC International Electrotechnical Commission IEEE Institute of Electrical and Electronics Engineers IFP Integer Factorization Problem ISO International Organization for Standardization JSF Joint Sparse Form KDF Key Derivation Function KEM Key Encapsulation Mechanism LD López-Dahab MAC Message Authentication Code NAF Non-Adjacent Form NESSIE New European Schemes for Signatures, Integrity and Encryption NFS Number Field Sieve NIST National Institute of Standards and Technology OEF Optimal Extension Field PKI Public-Key Infrastructure PSEC Provably Secure Elliptic Curve encryption RSA Rivest-Shamir-Adleman SEC Standards for Efficient Cryptography SECG Standards for Efficient Cryptography Group SHA-1 Secure Hash Algorithm (revised) SIMD Single-Instruction Multiple-Data SPA Simple Power Analysis SSL Secure Sockets Layer STS Station-To-Station TLS Transport Layer Security TNAF τ -adic NAF VLSI Very Large Scale Integration Preface The study of elliptic curves by algebraists, algebraic geometers and number theorists dates back to the middle of the nineteenth century....
[...]
...2 Menezes, van Oorshot, and Vanstone [319] concisely cover algorithms for ordinary and modular integer arithmetic of practical interest in cryptography....
[...]
...Guide to Elliptic Curve Cryptography Darrel Hankerson Alfred Menezes Scott Vanstone Springer Guide to Elliptic Curve Cryptography Springer New York Berlin Heidelberg Hong Kong London Milan Paris Tokyo Darrel Hankerson Alfred Menezes Scott Vanstone Guide to Elliptic Curve Cryptography With 38 Illustrations Springer Darrel Hankcrsnn Department of Mathematics Auburn University Auhuni, Al....
[...]
...Thanks also to Cindy Hankerson and Sherry Shannon-Vanstone for suggestions on the general theme of “curves in nature” represented in the illustrations....
[...]
...Darrel R. Hankerson, Alfred J. Menezes, Scott A. Vanstone Auburn & Waterloo July 2003 CHAPTER 1 Introduction and Overview Elliptic curves have a rich and beautiful history, having been studied by mathematicians for over a hundred years....
[...]
7,514 citations