Software Implementation of Elliptic Curve Cryptography over Binary Fields

  title={Software Implementation of Elliptic Curve Cryptography over Binary Fields},
  author={Darrel Hankerson and Julio L{\'o}pez Hernandez and Alfred Menezes},
This paper presents an extensive and careful study of the software implementation on workstations of the NIST-recommended elliptic curves over binary fields. We also present the results of our implementation in C on a Pentium II 400 MHz workstation. 
Highly Influential
This paper has highly influenced 48 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 507 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.


Publications citing this paper.
Showing 1-10 of 308 extracted citations

Defeating Simple Power Analysis on Koblitz Curves

View 16 Excerpts
Highly Influenced

Software implementation of Tate pairing over GF(2/sup m/)

Proceedings of the Design Automation & Test in Europe Conference • 2006
View 9 Excerpts
Highly Influenced

Comparison of ECC and RSA Algorithm in Resource Constrained Devices

2013 International Conference on IT Convergence and Security (ICITCS) • 2013
View 5 Excerpts
Highly Influenced

Fast Exponentiation Using Split Exponents

IEEE Transactions on Information Theory • 2011
View 5 Excerpts
Highly Influenced

Hardware implementation of arithmetic for elliptic curve cryptosystems over GF(2m)

2011 World Congress on Internet Security (WorldCIS-2011) • 2011
View 4 Excerpts
Highly Influenced

508 Citations

Citations per Year
Semantic Scholar estimates that this publication has 508 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 31 references

Efficient Arithmetic on Koblitz Curves

Des. Codes Cryptography • 2000
View 4 Excerpts
Highly Influenced

Speeding up the Pollard and elliptic curve methods of factorization

P. Montgomery
Mathematics of Computation, • 1987
View 4 Excerpts
Highly Influenced

The Elliptic Curve Digital Signature Algorithm (ECDSA)

International Journal of Information Security • 2001
View 4 Excerpts

Elliptic curve point halving wins big

R. Schroeppel
View 1 Excerpt

PGP in Constrained Wireless Devices

USENIX Security Symposium • 2000
View 2 Excerpts

Similar Papers

Loading similar papers…