Guide to Elliptic Curve Cryptography

@inproceedings{Hankerson2004GuideTE,
  title={Guide to Elliptic Curve Cryptography},
  author={D. Hankerson and S. Vanstone and A. Menezes},
  booktitle={Springer Professional Computing},
  year={2004}
}
After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism. Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key… Expand
A Survey of Hardware Implementations of Elliptic Curve Cryptographic Systems
Review of Hardware Implementations of Elliptic Curve Cryptography System
Introduction to Public-Key Cryptography
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 378 REFERENCES
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
  • L. Goubin
  • Computer Science
  • Public Key Cryptography
  • 2003
Validation of Elliptic Curve Public Keys
Elliptic curves in cryptography
Generic GF(2) Arithmetic in Software and Its Application to ECC
Advances in Cryptology — CRYPTO ’85 Proceedings
Exponentiation Cryptosystems on the IBM PC
  • P. Comba
  • Computer Science
  • IBM Syst. J.
  • 1990
...
1
2
3
4
5
...