# Elliptic curve cryptography

## Papers overview

Semantic Scholar uses AI to extract papers important to this topic.

2010

2010

- 2010

Public-key cryptography is based on the intractability of certain mathematical problems. Early public-key systems, such as theâ€¦Â (More)

Is this relevant?

2008

2008

- Ubiquity
- 2008

This paper describes the Elliptic Curve Cryptography algorithm and its suitability for smart cards.Â

Is this relevant?

Highly Cited

2008

Highly Cited

2008

- IEEE Transactions on Very Large Scale Integrationâ€¦
- 2008

This paper details the design of a new high-speed pipelined application-specific instruction set processor (ASIP) for ellipticâ€¦Â (More)

Is this relevant?

Highly Cited

2008

Highly Cited

2008

- International Conference on Informationâ€¦
- 2008

Public Key Cryptography (PKC) has been the enabling technology underlying many security services and protocols in traditionalâ€¦Â (More)

Is this relevant?

2007

2007

- 2007

In this thesis, we study the software implementation of the NIST-recommended elliptic curves over prime fields. Ourâ€¦Â (More)

Is this relevant?

Highly Cited

2006

Highly Cited

2006

- ESAS
- 2006

This work describes a low-cost Public-Key Cryptography (PKC) based solution for security services such as key-distribution andâ€¦Â (More)

Is this relevant?

Highly Cited

2003

Highly Cited

2003

- ICICS
- 2003

Randomization techniques play an important role in the protection of cryptosystems against implementation attacks. This paperâ€¦Â (More)

Is this relevant?

Highly Cited

2002

Highly Cited

2002

- CHES
- 2002

Since its proposal by Victor Miller [17] and Neal Koblitz [15] in the mid 1980s, Elliptic Curve Cryptography (ECC) has evolvedâ€¦Â (More)

Is this relevant?

Highly Cited

2001

Highly Cited

2001

- CHES
- 2001

We propose several new methods to protect the scalar multiplication on an elliptic curve against Differential Analysis. The basicâ€¦Â (More)

Is this relevant?

Highly Cited

2000

Highly Cited

2000

- CHES
- 2000

This paper presents an extensive and careful study of the software implementation on workstations of the NIST-recommendedâ€¦Â (More)

Is this relevant?