Online citations, reference lists, and bibliographies.

Elliptic Curve Cryptography

D. Hankerson, A. Menezes
Published 2005 · Computer Science, Mathematics

Cite This
Download PDF
Analyze on Scholarcy
For a reference on elliptic curves and their cryptographic applications, see: • Alfred J. Menezes, Elliptic curve public key cryptosystems, 1993. • Joseph H. Silverman and John Tate, Rational points on elliptic curves, 1992. (An undergraduate mathematics text on elliptic curves.) • J.W.S. Cassels, Lectures on elliptic curves, 1991. (Informal and mathematical.) An elliptic curve is not an ellipse! An ellipse is a degree 2 equation of the form x + ay = b. (However, given such an ellipse, you could try to compute the arc length of a certain portion of the curve; the integral which arises can be associated to an elliptic curve.)

This paper is referenced by
An overview of memristive cryptography
Alex Pappachen James (2019)
An Efficient Peer-to-Peer Bitcoin Protocol with Probabilistic Flooding
H. Vu (2019)
Research on Cloud Computing Data Security based on ECDH and ECC
Jia Cui (2016)
Implementation of an Efficient Blind Signature Scheme
Aye Aye Thu (2014)
Efficiency evaluation of different types of cryptography curves on low-power devices
Radek Fujdiak (2015)
DABSTERS: A Privacy Preserving e-Voting Protocol for Permissioned Blockchain
Marwa Chaieb (2019)
ECDSA for Data Origin Authentication and Vehicle Security in VANET
R. Kushwah (2019)
Improving Pollard's Rho attack on elliptic curve cryptosystems
Siham Ezzouak (2012)
A Secure G-Cloud-Based Framework for Government Healthcare Services
Sanaa Sharaf (2019)
Performance evaluation of ECC scalar multiplication using parallel modular algorithms on mobile devices
Tiago V. de Arruda (2015)
OFFM-ANFIS analysis for flood prediction using mobile IoS, fog and cloud computing
Nitin Khanna (2020)
Secure and Efficient Authentication Scheme for Remote Systems
M. Das (2008)
Secure and trusted cloud of things
T. Bhattasali (2013)
Double character sums over elliptic curves and finite fields
W. Banks (2006)
Isogenies of Elliptic Curves: A Computational Approach
D. Shumow (2009)
Key-escrow free multi-signature scheme using bilinear pairings
Manik Lal Das (2015)
Semantic Scholar Logo Some data provided by SemanticScholar