Author:
Karati Sabyasachi,Sarkar Palash
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Reference51 articles.
1. J. Barwise, P. Eklof, Lefschetz’s principle. Journal of Algebra. 13(4), 554–570 (1969)
2. D. J. Bernstein, Curve25519: New Diffie-Hellman speed records. in Public Key Cryptography - PKC, volume 3958 of Lecture Notes in Computer Science, (Springer, 2006), pp. 207–228
3. D. J. Bernstein, Elliptic vs. hyperelliptic, part I. Talk at ECC. (2006)
4. D.J. Bernstein, C. Chuengsatiansup, T. Lange, P. Schwabe, Kummer strikes back: New DH speed records. in Advances in Cryptology - ASIACRYPT, volume 8873 of Lecture Notes in Computer Science, (Springer, 2014), pp. 317–337
5. D. J. Bernstein, T. Lange, Safecurves: choosing safe curves for elliptic-curve cryptography.
http://safecurves.cr.yp.to/index.html
, accessed on September 1, (2018)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Computing 2-isogenies between Kummer lines;IACR Communications in Cryptology;2024-04-09
2. Kummer and Hessian Meet in the Field of Characteristic 2;Lecture Notes in Computer Science;2024
3. Isogeny computation on Kummer lines and applications;Journal of Information Security and Applications;2023-08
4. Binary Kummer Line;Applied Cryptography and Network Security;2023
5. Kummer versus Montgomery Face-off over Prime Order Fields;ACM Transactions on Mathematical Software;2022-05-26