Handbook of Applied Cryptography
- A. Menezes, P. V. Oorschot, S. Vanstone
- Computer Science, Mathematics
- 7 December 2018
From the Publisher:
A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of…
Guide to Elliptic Curve Cryptography
- D. Hankerson, S. Vanstone, A. Menezes
- Computer ScienceSpringer Professional Computing
- 2004
This guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment, as well as side-channel attacks and countermeasures.
The Elliptic Curve Digital Signature Algorithm (ECDSA)
- D. Johnson, A. Menezes, S. Vanstone
- Computer Science, MathematicsInternational Journal of Information Security
- 1 August 2001
The ANSI X9.62 ECDSA is described and related security, implementation, and interoperability issues are discussed, and the strength-per-key-bit is substantially greater in an algorithm that uses elliptic curves.
Elliptic curve public key cryptosystems
- A. Menezes
- Mathematics, Computer ScienceThe Kluwer International Series in Engineering…
- 31 July 1993
In conclusion, the proposed solution to the Elliptic Curve Logarithm Problem is a simple one-size-fits-all approach that can be applied to many different types of cryptosystems.
Reducing elliptic curve logarithms to logarithms in a finite field
- A. Menezes, S. Vanstone, T. Okamoto
- Mathematics, Computer ScienceSymposium on the Theory of Computing
- 3 January 1991
The main result of the paper is to demonstrate the reduction of the elliptic curve logarithm problem to the logariths problem in the multiplicative group of an extension of the underlying finite field, thus providing a probabilistic subexponential time algorithm for the former problem.
Key Agreement Protocols and Their Security Analysis
- S. Blake-Wilson, D. Johnson, A. Menezes
- Computer Science, MathematicsIMA Conference on Cryptography and Coding
- 17 December 1997
The protocols proposed are proven correct within this framework in the random oracle model and emphasize the relevance of these theoretical results to the security of systems used in practice.
Software Implementation of Elliptic Curve Cryptography over Binary Fields
- D. Hankerson, J. C. López-Hernández, A. Menezes
- Computer Science, MathematicsWorkshop on Cryptographic Hardware and Embedded…
- 17 August 2000
This paper presents an extensive and careful study of the software implementation on workstations of the NIST-recommended elliptic curves over binary fields. We also present the results of our…
The State of Elliptic Curve Cryptography
- N. Koblitz, A. Menezes, S. Vanstone
- Mathematics, Computer ScienceDes. Codes Cryptogr.
- 1 March 2000
This paper surveys the development of elliptic curve cryptosystems from their inception in 1985 by Koblitz and Miller to present day implementations.
Pairing-Based Cryptography at High Security Levels
- N. Koblitz, A. Menezes
- Computer Science, MathematicsIMA Conference on Cryptography and Coding
- 19 December 2005
This paper examines the implications of heightened security needs for pairing-based cryptosystems and describes three different reasons why high-security users might have concerns about the long-term viability of these systems.
An Efficient Protocol for Authenticated Key Agreement
- L. Law, A. Menezes, Minghua Qu, J. Solinas, S. Vanstone
- Computer Science, MathematicsDes. Codes Cryptogr.
- 1 March 2003
This paper proposes an efficient two-pass protocol for authenticated key agreement in the asymmetric (public-key) setting. The protocol is based on Diffie-Hellman key agreement and can be modified to…
...
...