Elliptic curve cryptography

Known as: ECC, Elliptic curve cryptography (ECC), Elliptic-curve cryptography 
Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Public-key cryptography is based on the intractability of certain mathematical problems. Early public-key systems, such as the… (More)
Is this relevant?
2008
2008
This paper describes the Elliptic Curve Cryptography algorithm and its suitability for smart cards. 
  • figure 1
  • table 1
  • table 2
Is this relevant?
Highly Cited
2008
Highly Cited
2008
This paper details the design of a new high-speed pipelined application-specific instruction set processor (ASIP) for elliptic… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table II
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Public Key Cryptography (PKC) has been the enabling technology underlying many security services and protocols in traditional… (More)
  • table 1
  • table 2
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2007
2007
In this thesis, we study the software implementation of the NIST-recommended elliptic curves over prime fields. Our… (More)
  • table 2.1
  • figure 2.1
  • table 2.2
  • table 2.3
  • table 2.4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
This work describes a low-cost Public-Key Cryptography (PKC) based solution for security services such as key-distribution and… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Randomization techniques play an important role in the protection of cryptosystems against implementation attacks. This paper… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Since its proposal by Victor Miller [17] and Neal Koblitz [15] in the mid 1980s, Elliptic Curve Cryptography (ECC) has evolved… (More)
  • figure 1
  • figure 2
  • figure 4
  • table 1
  • figure 6
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We propose several new methods to protect the scalar multiplication on an elliptic curve against Differential Analysis. The basic… (More)
  • table 1
  • table 2
Is this relevant?
Highly Cited
2000
Highly Cited
2000
This paper presents an extensive and careful study of the software implementation on workstations of the NIST-recommended… (More)
Is this relevant?