Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Elliptic-curve cryptography
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== References == {{refbegin}} * [[SECG|Standards for Efficient Cryptography Group (SECG)]], [http://www.secg.org/sec1-v2.pdf SEC 1: Elliptic Curve Cryptography], Version 1.0, September 20, 2000. ([https://web.archive.org/web/20141111191126/http://www.secg.org/sec1-v2.pdf archived] as of Nov 11, 2014) * D. Hankerson, A. Menezes, and S.A. Vanstone, ''Guide to Elliptic Curve Cryptography'', Springer-Verlag, 2004. * I. Blake, G. Seroussi, and N. Smart, ''Elliptic Curves in Cryptography'', London Mathematical Society 265, Cambridge University Press, 1999. * I. Blake, G. Seroussi, and N. Smart, editors, ''Advances in Elliptic Curve Cryptography'', London Mathematical Society 317, Cambridge University Press, 2005. * L. Washington, ''Elliptic Curves: Number Theory and Cryptography'', Chapman & Hall / CRC, 2003. * [https://web.archive.org/web/20090117023500/http://www.nsa.gov/business/programs/elliptic_curve.shtml The Case for Elliptic Curve Cryptography], National Security Agency (archived January 17, 2009) * [http://www.certicom.com/index.php/ecc-tutorial Online Elliptic Curve Cryptography Tutorial], Certicom Corp. (archived [https://web.archive.org/web/20160309033943/http://certicom.com/index.php/ecc-tutorial here] as of March 3, 2016) * K. Malhotra, S. Gardner, and R. Patz, Implementation of Elliptic-Curve Cryptography on Mobile Healthcare Devices, Networking, Sensing and Control, 2007 IEEE International Conference on, London, 15–17 April 2007 Page(s):239–244 * Saikat Basu, [http://ijns.jalaxy.com.tw/contents/ijns-v14-n2/ijns-2012-v14-n2-p101-108.pdf A New Parallel Window-Based Implementation of the Elliptic Curve Point Multiplication in Multi-Core Architectures], International Journal of Network Security, Vol. 13, No. 3, 2011, Page(s):234–241 (archived [https://web.archive.org/web/20160304121101/http://ijns.jalaxy.com.tw/contents/ijns-v14-n2/ijns-2012-v14-n2-p101-108.pdf here] as of March 4, 2016) * Christof Paar, Jan Pelzl, [https://archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php "Elliptic Curve Cryptosystems"], Chapter 9 of "Understanding Cryptography, A Textbook for Students and Practitioners". (companion web site contains online cryptography course that covers elliptic curve cryptography), Springer, 2009. (archived [https://archive.today/20121208212741/http://wiki.crypto.rub.de/Buch/movies.php here] as of April 20, 2016) * Luca De Feo, David Jao, Jerome Plut, [http://eprint.iacr.org/2011/506 Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies], Springer 2011. (archived [https://web.archive.org/web/20120507200407/http://eprint.iacr.org/2011/506 here] as of May 7, 2012) * Gustavo Banegas, Daniel J. Bernstein, Iggy Van Hoof, Tanja Lange, [https://eprint.iacr.org/2020/1296 Concrete quantum cryptanalysis of binary elliptic curves], Springer 2020. (archived [https://eprint.iacr.org/2020/1296 here] as of June 1, 2020) {{refend}} * [http://archive.numdam.org/ARCHIVE/MSMF/MSMF_1978__57_/MSMF_1978__57__1_0/MSMF_1978__57__1_0.pdf Jacques Vélu, ''Courbes elliptiques (...)'', Société Mathématique de France, '''57''', 1-152, Paris, 1978.]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)