Use of Elliptic Curves in Cryptography

@inproceedings{Miller1985UseOE,
  title={Use of Elliptic Curves in Cryptography},
  author={Victor S. Miller},
  booktitle={CRYPTO},
  year={1985}
}
Highly Influential
This paper has highly influenced 259 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 5,127 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 2,109 extracted citations

Implementation of ElGamal Elliptic Curve Cryptography over prime field using C

International Conference on Information Communication and Embedded Systems (ICICES2014) • 2014
View 5 Excerpts
Highly Influenced

Authentication and consensus overhead in vehicular ad hoc networks

Telecommunication Systems • 2013
View 7 Excerpts
Highly Influenced

Elliptic curves in Huff’s model

Wuhan University Journal of Natural Sciences • 2010
View 12 Excerpts
Highly Influenced

Two efficient algorithms against power attacks for elliptic curve cryptosystems

2010 2nd International Conference on Signal Processing Systems • 2010
View 12 Excerpts
Highly Influenced

Pairing-based Cryptography

View 20 Excerpts
Highly Influenced

A High Speed VLSI Implementation of 256-bit Scalar Point Multiplier for ECC over GF (p)

2018 IEEE International Conference on Intelligence and Safety for Robotics (ISR) • 2018
View 10 Excerpts
Highly Influenced

5,127 Citations

0200400'89'95'02'09'16
Citations per Year
Semantic Scholar estimates that this publication has 5,127 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-4 of 4 references

Lower bound for the canonical height on elliptic curves

A. M. Odlyzko, J. Silverman
Duke Math . J . • 1981

A subexponential algorithm for the discrete logarithm problem with applications to cryptography

20th Annual Symposium on Foundations of Computer Science (sfcs 1979) • 1979

An improved algorithm for computing logarithms over GF ( p ) and its cryptgraphic significance , IEEE Inform

J. Buhler, B. Gross, D. Zagier, S. Pohlig, M. Hellman
1978

On the difference of the Weil height and the Neron? ’ ate height

D. Wiedemann, D. Coppersmith, M. Odlyzko.A., R. Schroeppel, H. G. Zirnmer
Math . Z .

Similar Papers

Loading similar papers…