X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (84) 84
Conference Proceeding (37) 37
Web Resource (4) 4
Book / eBook (2) 2
Book Chapter (2) 2
Dissertation (2) 2
Publication (2) 2
Paper (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
koblitz curves (70) 70
elliptic curve cryptography (50) 50
cryptography (47) 47
scalar multiplication (43) 43
engineering, electrical & electronic (30) 30
koblitz curve (30) 30
elliptic curves (28) 28
computer science, theory & methods (21) 21
multiplication (21) 21
algorithms (18) 18
computer science, hardware & architecture (18) 18
hardware (17) 17
point multiplication (17) 17
mathematics (16) 16
elliptic-curves (14) 14
gf (12) 12
algorithm (11) 11
frobenius endomorphism (11) 11
mathematics, applied (11) 11
computer architecture (10) 10
fpga (10) 10
field programmable gate arrays (9) 9
parallel processing (9) 9
cryptosystems (8) 8
elliptic curve (8) 8
gaussian normal basis (8) 8
hamming weight (8) 8
implementation (8) 8
parallelization (8) 8
scalars (8) 8
algorithm design and analysis (7) 7
analysis (7) 7
clocks (7) 7
computer science (7) 7
data encryption (7) 7
point halving (7) 7
representations (7) 7
research (7) 7
architecture (6) 6
computer science, information systems (6) 6
data structures, cryptology and information theory (6) 6
elliptic curve cryptosystem (6) 6
elliptic curve cryptosystems (6) 6
field programmable gate array (6) 6
gaussian processes (6) 6
kryptographie (6) 6
mathematicians (6) 6
mathematics - number theory (6) 6
usage (6) 6
world politics (6) 6
arithmetic (5) 5
computational efficiency (5) 5
curves (5) 5
digital integrated circuits (5) 5
ecdsa (5) 5
feldprogrammierbare gate-array-schaltung (5) 5
integers (5) 5
koblitz, neal, 1948 (5) 5
koblitz, neal, 1948- travel (5) 5
public key cryptography (5) 5
registers (5) 5
security (5) 5
tau-adic expansions (5) 5
very large scale integration (5) 5
acceleration (4) 4
algebra and number theory (4) 4
batch verification (4) 4
coding and information theory (4) 4
complexity theory (4) 4
curves, elliptic (4) 4
design and construction (4) 4
digit-level multiplier (4) 4
digital signatures (4) 4
ellipse (4) 4
equations (4) 4
field-programmable gate array (4) 4
field-programmable gate arrays (4) 4
finite fields (4) 4
integrated circuits (4) 4
mathematical analysis (4) 4
methods (4) 4
microprocessors (4) 4
multiplication & division (4) 4
naf (4) 4
non-adjacent form (4) 4
normal bases (4) 4
number theory (4) 4
pipeline processing (4) 4
processor (4) 4
redundant digit sets (4) 4
11a63 (3) 3
algorithm analysis and problem complexity (3) 3
application specific integrated circuit (3) 3
codes (3) 3
combinatorics (3) 3
computation (3) 3
computer science, software engineering (3) 3
converters (3) 3
discrete mathematics in computer science (3) 3
efficient (3) 3
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Mathematics of Computation of the American Mathematical Society, ISSN 0025-5718, 03/2018, Volume 87, Issue 310, pp. 821 - 854
This article deals with redundant digit expansions with an imaginary quadratic algebraic integer with trace \pm 1 as base and a minimal norm representatives... 
MATHEMATICS, APPLIED | continued fractions | tau-adic expansions | linear forms in logarithms | Baker-Davenport method | COMBINATION | Hamming weight | Koblitz curves | geometry of numbers | scalar multiplication | redundant digit sets | Frobenius endomorphism | WEIGHT | elliptic curve cryptography
Journal Article
IEEE Transactions on Circuits and Systems II: Express Briefs, ISSN 1549-7747, 11/2018, Volume 65, Issue 11, pp. 1723 - 1727
Journal Article
ANALOG INTEGRATED CIRCUITS AND SIGNAL PROCESSING, ISSN 0925-1030, 10/2015, Volume 85, Issue 1, pp. 129 - 138
Efficient computation of the finite field arithmetic is required for elliptic curve cryptography over . In order to achieve the above, this paper presents the... 
COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | Digit-level multiplier | FPGA IMPLEMENTATION | PARALLELIZATION | Koblitz curves | POINT MULTIPLICATION | Gaussian normal basis | Cryptography | Scalar point multiplication | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
IEEE Transactions on Circuits and Systems II: Express Briefs, ISSN 1549-7747, 01/2013, Volume 60, Issue 1, pp. 41 - 45
Journal Article
Microprocessors and Microsystems, ISSN 0141-9331, 06/2013, Volume 37, Issue 4-5, pp. 394 - 406
A scalable elliptic curve cryptography (ECC) processor is presented in this paper. The proposed ECC processor supports all five Koblitz curves recommended by... 
Scalable ECC processor | FPGA | Elliptic Curve Cryptography (ECC) | Finite field arithmetic | Koblitz curves | ECC processor | Scalable | Curve | Cryptography (ECC) | Elliptic | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | GF(2(M)) | MULTIPLICATION | COMPUTER SCIENCE, THEORY & METHODS | CRYPTOGRAPHY | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
IEEE Transactions on Parallel and Distributed Systems, ISSN 1045-9219, 06/2015, Volume 26, Issue 6, pp. 1668 - 1677
Journal Article
Microprocessors and Microsystems, ISSN 0141-9331, 08/2016, Volume 45, pp. 10 - 22
Journal Article
IEICE Electronics Express, ISSN 1349-2543, 05/2016, Volume 13, Issue 9, p. pp20160044
Journal Article
Analog Integrated Circuits and Signal Processing, ISSN 0925-1030, 10/2015, Volume 85, Issue 1, pp. 129 - 138
Journal Article
AIP Conference Proceedings, ISSN 0094-243X, 06/2018, Volume 1974, Issue 1
Let E be an elliptic curve defined over F2m and T denotes the Frobenius endomorphism from the set E(F2m) to itself. The Koblitz curves are a special type of... 
Frobenius endomorphism | Koblitz Curve | Scalar multiplication | Integers | Multiplication | Elliptic functions
Journal Article
Journal of Cryptographic Engineering, ISSN 2190-8508, 11/2018, Volume 8, Issue 4, pp. 285 - 300
Koblitz curves allow very efficient elliptic curve cryptography. The reason is that one can trade expensive point doublings to cheap Frobenius endomorphisms by... 
Elliptic curve cryptography | Lightweight cryptography | Koblitz curves | ECDSA | Integers | CMOS | Computer systems | Algorithms | Elliptic functions | Cryptography | Radio frequency identification | Arithmetic
Journal Article
Analog Integrated Circuits and Signal Processing, ISSN 0925-1030, 10/2015, Volume 85, Issue 1, pp. 129 - 138
Efficient computation of the finite field arithmetic is required for elliptic curve cryptography over $$G\!F\!(2^{m})$$ G F ( 2 m ) . In order to achieve the... 
Engineering | Digit-level multiplier | Signal, Image and Speech Processing | Koblitz curves | Circuits and Systems | Gaussian normal basis | Cryptography | Scalar point multiplication | Electrical Engineering
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.