Skip to main content
×
×
Home
Advances in Elliptic Curve Cryptography
  • Get access
    Check if you have access via personal or institutional login
  • Cited by 132
  • Cited by
    This book has been cited by the following publications. This list is generated based on data provided by CrossRef.

    Ezzouak, Siham and Azizi, Abdelmalek 2019. Information Systems and Technologies to Support Learning. Vol. 111, Issue. , p. 393.

    Yan, Song Y. 2019. Cybercryptography: Applicable Cryptography for Cyberspace Security. p. 343.

    Kota, Sujatha Padmanabhuni, Venkata Nageswara Rao Budda, Kishor and K, Sruthi 2018. Authentication and Encryption Using Modified Elliptic Curve Cryptography with Particle Swarm Optimization and Cuckoo Search Algorithm. Journal of The Institution of Engineers (India): Series B, Vol. 99, Issue. 4, p. 343.

    Dou, Yunqi Weng, Jiang Ma, Chuangui and Wei, Fushan 2018. Frontier Computing. Vol. 464, Issue. , p. 210.

    Chun, Shan Kangwen, Hu Jingfeng, Xue Changzhen, Hu and Rui, Ma 2018. Lecture Notes in Real-Time Intelligent Systems. Vol. 613, Issue. , p. 205.

    Miret, Josep M. Sadornil, Daniel and Tena, Juan G. 2018. Pairing-Based Cryptography on Elliptic Curves. Mathematics in Computer Science, Vol. 12, Issue. 3, p. 309.

    Uzunkol, Osmanbey and Kiraz, Mehmet Sabır 2018. Still wrong use of pairings in cryptography. Applied Mathematics and Computation, Vol. 333, Issue. , p. 467.

    Kalkar, Öznur Kiraz, Mehmet Sabir Sertkaya, İsa and Uzunkol, Osmanbey 2018. Information Security Theory and Practice. Vol. 10741, Issue. , p. 155.

    Hsieh, Wen-Bin and Leu, Jenq-Shiou 2018. Implementing a secure VoIP communication over SIP-based networks. Wireless Networks, Vol. 24, Issue. 8, p. 2915.

    Wang, Haijiang Dong, Xiaolei Cao, Zhenfu and Li, Dongmei 2018. Secure and Efficient Attribute-Based Encryption with Keyword Search. The Computer Journal, Vol. 61, Issue. 8, p. 1133.

    Muwel, Mukesh Mishra, Prakash Samvatsar, Makrand Singh, Upendra and Sharma, Roopesh 2017. Efficient ECGDH algorithm through protected multicast routing protocol in MANETs. p. 631.

    2017. Computational Number Theory and Modern Cryptography. p. 235.

    Guillevic, Aurore Morain, François and Thomé, Emmanuel 2017. Selected Areas in Cryptography – SAC 2016. Vol. 10532, Issue. , p. 559.

    Azees, Maria Vijayakumar, Pandi and Deboarh, Lazarus Jegatha 2017. EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks. IEEE Transactions on Intelligent Transportation Systems, Vol. 18, Issue. 9, p. 2467.

    Dou, Yunqi Weng, Jiang Ma, Chuangui and Wei, Fushan 2017. Secure and efficient ECC speeding up algorithms for wireless sensor networks. Soft Computing, Vol. 21, Issue. 19, p. 5665.

    Fouotsa, Emmanuel and Diao, Oumar 2017. A Theta Model for Elliptic Curves. Mediterranean Journal of Mathematics, Vol. 14, Issue. 2,

    Gonzales, Alex Capuñay 2016. Multibase scalar multiplications in cryptographic pairings. Applicable Algebra in Engineering, Communication and Computing, Vol. 27, Issue. 3, p. 219.

    Marzouqi, Hamad Al-Qutayri, Mahmoud Salah, Khaled Schinianakis, Dimitrios and Stouraitis, Thanos 2016. A High-Speed FPGA Implementation of an RSD-Based ECC Processor. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol. 24, Issue. 1, p. 151.

    Galbraith, Steven D. Petit, Christophe Shani, Barak and Ti, Yan Bo 2016. Advances in Cryptology – ASIACRYPT 2016. Vol. 10031, Issue. , p. 63.

    Trost, William R. and Xu, Guangwu 2016. On the Optimal Pre-Computation of Window NAF for Koblitz Curves. IEEE Transactions on Computers, Vol. 65, Issue. 9, p. 2918.

    ×

Book description

Since the appearance of the authors' first volume on elliptic curve cryptography in 1999 there has been tremendous progress in the field. In some topics, particularly point counting, the progress has been spectacular. Other topics such as the Weil and Tate pairings have been applied in new and important ways to cryptographic protocols that hold great promise. Notions such as provable security, side channel analysis and the Weil descent technique have also grown in importance. This second volume addresses these advances and brings the reader up to date. Prominent contributors to the research literature in these areas have provided articles that reflect the current state of these important topics. They are divided into the areas of protocols, implementation techniques, mathematical foundations and pairing based cryptography. Each of the topics is presented in an accessible, coherent and consistent manner for a wide audience that will include mathematicians, computer scientists and engineers.

Refine List
Actions for selected content:
Select all | Deselect all
  • View selected items
  • Export citations
  • Download PDF (zip)
  • Send to Kindle
  • Send to Dropbox
  • Send to Google Drive
  • Send content to

    To send content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about sending content to .

    To send content items to your Kindle, first ensure no-reply@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about sending to your Kindle.

    Note you can select to send to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be sent to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

    Find out more about the Kindle Personal Document Service.

    Please be advised that item(s) you selected are not available.
    You are about to send
    ×

Save Search

You can save your searches here and later view and run them again in "My saved searches".

Please provide a title, maximum of 40 characters.
×

Metrics

Full text views

Total number of HTML views: 0
Total number of PDF views: 0 *
Loading metrics...

Book summary page views

Total views: 0 *
Loading metrics...

* Views captured on Cambridge Core between #date#. This data will be updated every 24 hours.

Usage data cannot currently be displayed