# Guide to Elliptic Curve Cryptography

@inproceedings{Hankerson2004GuideTE, title={Guide to Elliptic Curve Cryptography}, author={D. Hankerson and S. Vanstone and A. Menezes}, booktitle={Springer Professional Computing}, year={2004} }

After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism. Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-keyâ€¦Â Expand

#### Figures, Tables, and Topics from this paper

figure 1.1 table 1.1 figure 1.2 table 2.1 figure 2.2 table 2.2 figure 2.3 table 2.3 figure 2.5 figure 2.6 figure 2.7 figure 2.8 figure 2.9 figure 3.1 table 3.1 table 3.10 table 3.11 table 3.12 table 3.13 table 3.14 figure 3.2 table 3.2 figure 3.3 table 3.3 table 3.4 table 3.5 figure 3.5 figure 3.6 table 3.6 table 3.7 figure 3.8 table 3.8 table 3.9 figure 4.1 figure 4.2 table 5.1 figure 5.1 figure 5.10 figure 5.11 figure 5.12 figure 5.13 figure 5.14 figure 5.15 figure 5.16 table 5.2 figure 5.2 table 5.3 figure 5.3 table 5.4 figure 5.4 table 5.5 figure 5.5 table 5.6 figure 5.6 table 5.7 figure 5.7 table 5.8 figure 5.8 figure 5.9 table 5.9 table A.1 table A.2 table A.3 table A.4 table A.5 table B.1 table B.2

#### 2,741 Citations

A Survey of Hardware Implementations of Elliptic Curve Cryptographic Systems

- Computer Science
- IACR Cryptol. ePrint Arch.
- 2016

Increasing the Robustness of Point Operations in Co-Z Arithmetic against Side-Channel Attacks

- Mathematics
- 2013

A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware

- Computer Science
- J. Sens. Actuator Networks
- 2021

#### References

SHOWING 1-10 OF 378 REFERENCES

Implementation of Elliptic Curve Cryptography with Built-In Counter Measures against Side Channel Attacks

- Computer Science
- CHES
- 2002

A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems

- Computer Science
- Public Key Cryptography
- 2003

A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis

- Computer Science
- ACISP
- 2002

Advances in Cryptology â€” CRYPTO â€™85 Proceedings

- Mathematics
- Lecture Notes in Computer Science
- 2000

A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-bit Microcomputer

- Computer Science
- Public Key Cryptography
- 1998