scientific article; zbMATH DE number 1955800
From MaRDI portal
Publication:4417414
zbMath1033.11502MaRDI QIDQ4417414
Tetsuya Izu, Tsuyoshi Takagi, Bodo Möller
Publication date: 29 July 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2551/25510296.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
elliptic curve cryptosystemsscalar multiplicationside channel attackswindow methodmemory constraints
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Applications to coding theory and cryptography of arithmetic geometry (14G50)
Related Items (7)
A metric on the set of elliptic curves over \(\mathbb{F}_p\) ⋮ Lattice attacks against elliptic-curve signatures with blinded scalar multiplication ⋮ Speeding up regular elliptic curve scalar multiplication without precomputation ⋮ Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation ⋮ The double-base number system and its application to elliptic curve cryptography ⋮ О вычислении кратных точек на эллиптических кривых над конечными полями с использованием нескольких оснований систем счисления и новых видов координат ⋮ Construction of metrics on the set of elliptic curves over a finite field
This page was built for publication: