Online citations, reference lists, and bibliographies.

Elliptic Curve Cryptography

D. Hankerson, A. Menezes
Published 2005 · Computer Science, Mathematics

Cite This
Download PDF
Analyze on Scholarcy
Share
For a reference on elliptic curves and their cryptographic applications, see: • Alfred J. Menezes, Elliptic curve public key cryptosystems, 1993. • Joseph H. Silverman and John Tate, Rational points on elliptic curves, 1992. (An undergraduate mathematics text on elliptic curves.) • J.W.S. Cassels, Lectures on elliptic curves, 1991. (Informal and mathematical.) An elliptic curve is not an ellipse! An ellipse is a degree 2 equation of the form x + ay = b. (However, given such an ellipse, you could try to compute the arc length of a certain portion of the curve; the integral which arises can be associated to an elliptic curve.)



This paper is referenced by
10.1140/epjst/e2019-900044-x
An overview of memristive cryptography
Alex Pappachen James (2019)
10.1007/978-3-030-23943-5_3
An Efficient Peer-to-Peer Bitcoin Protocol with Probabilistic Flooding
H. Vu (2019)
Research on Cloud Computing Data Security based on ECDH and ECC
Jia Cui (2016)
10.7763/IJIMT.2014.V5.556
Implementation of an Efficient Blind Signature Scheme
Aye Aye Thu (2014)
10.1109/ICUMT.2015.7382441
Efficiency evaluation of different types of cryptography curves on low-power devices
Radek Fujdiak (2015)
10.1007/978-3-030-32505-3_17
DABSTERS: A Privacy Preserving e-Voting Protocol for Permissioned Blockchain
Marwa Chaieb (2019)
10.1109/IC3.2019.8844912
ECDSA for Data Origin Authentication and Vehicle Security in VANET
R. Kushwah (2019)
10.1109/ICMCS.2012.6320288
Improving Pollard's Rho attack on elliptic curve cryptosystems
Siham Ezzouak (2012)
10.1109/ACCESS.2019.2906131
A Secure G-Cloud-Based Framework for Government Healthcare Services
Sanaa Sharaf (2019)
10.1109/PST.2015.7232967
Performance evaluation of ECC scalar multiplication using parallel modular algorithms on mobile devices
Tiago V. de Arruda (2015)
10.1007/s10586-019-03033-w
OFFM-ANFIS analysis for flood prediction using mobile IoS, fog and cloud computing
Nitin Khanna (2020)
10.1109/ICIT.2008.21
Secure and Efficient Authentication Scheme for Remote Systems
M. Das (2008)
10.1109/INDCON.2013.6725878
Secure and trusted cloud of things
T. Bhattasali (2013)
10.4310/PAMQ.2006.V2.N1.A8
Double character sums over elliptic curves and finite fields
W. Banks (2006)
Isogenies of Elliptic Curves: A Computational Approach
D. Shumow (2009)
10.1515/gcc-2015-0002
Key-escrow free multi-signature scheme using bilinear pairings
Manik Lal Das (2015)
Semantic Scholar Logo Some data provided by SemanticScholar