1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239
|
@article{addchainreview,
title = "A Review on Heuristics for Addition Chain Problem: Towards Efficient Public Key Cryptosystems",
author = "Adamu Muhammad Noma and Abdullah Muhammed and Mohamad Afendee Mohamed and Zuriati Ahmad Zulkarnain",
url = "https://thescipub.com/pdf/10.3844/jcssp.2017.275.289.pdf",
journal = "Journal of Computer Science",
number = 8,
pages = "275-289",
volume = 13,
year = 2017,
}
@misc{aranha,
title = "A note on high-security general-purpose elliptic curves",
author = "Diego F. Aranha and Paulo S. L. M. Barreto and Geovandro C. C. F. Pereira and Jefferson E. Ricardini",
url = "https://eprint.iacr.org/2013/647",
howpublished = "Cryptology ePrint Archive, Report 2013/647",
year = 2013,
}
@inproceedings{boscoster,
title = "Addition Chain Heuristics",
author = "Bos, Jurjen and Coster, Matthijs",
url = "https://link.springer.com/content/pdf/10.1007/0-387-34805-0_37.pdf",
abstract = "Much current research focuses on fast evaluation of RSA, which consists of computing powers modulo a large number n. While some try to increase the speed of multiplica- tions, here we consider reducing the number of multiplications. In particular, we present a precomputation method that reduces the number of multiplications for the computation of a given power.",
address = "New York, NY",
booktitle = "Advances in Cryptology --- CRYPTO' 89 Proceedings",
editor = "Brassard, Gilles",
isbn = "978-0-387-34805-6",
pages = "400--407",
publisher = "Springer New York",
year = 1990,
}
@phdthesis{braueraddsubchains,
title = "Brauer addition-subtraction chains",
author = "Martin Otto",
url = "http://www.martin-otto.de/publications/docs/2001_MartinOtto_Diplom_BrauerAddition-SubtractionChains.pdf",
school = "Universitat Paderborn",
year = 2001,
}
@article{contfrac,
title = "Addition chains using continued fractions",
author = "F Bergeron and J Berstel and S Brlek and C Duboc",
url = "http://www-igm.univ-mlv.fr/~berstel/Articles/1989AdditionChainDuboc.pdf",
issn = "0196-6774",
journal = "Journal of Algorithms",
number = 3,
pages = "403 - 412",
volume = 10,
year = 1989,
}
@misc{crandallprime,
title = "Method and apparatus for public key exchange in a cryptographic system",
author = "Richard E. Crandall",
url = "https://patents.google.com/patent/US5159632A",
howpublished = "US Patent 5,159,632",
year = 1992,
}
@inproceedings{curve25519,
title = "Curve25519: New Diffie-Hellman Speed Records",
author = "Bernstein, Daniel J.",
url = "https://cr.yp.to/ecdh/curve25519-20060209.pdf",
abstract = "This paper explains the design and implementation of a high-security elliptic-curve-Diffie-Hellman function achieving record-setting speeds: e.g., 832457 Pentium III cycles (with several side benefits: free key compression, free key validation, and state-of-the-art timing-attack protection), more than twice as fast as other authors' results at the same conjectured security level (with or without the side benefits).",
address = "Berlin, Heidelberg",
booktitle = "Public Key Cryptography - PKC 2006",
editor = "Yung, Moti and Dodis, Yevgeniy and Kiayias, Aggelos and Malkin, Tal",
isbn = "978-3-540-33852-9",
pages = "207--228",
publisher = "Springer Berlin Heidelberg",
year = 2006,
}
@misc{curvechains,
title = "The Most Efficient Known Addition Chains for Field Element and Scalar Inversion for the Most Popular and Most Unpopular Elliptic Curves",
author = "Brian Smith",
url = "https://briansmith.org/ecc-inversion-addition-chains-01",
urldate = "2019-06-30",
year = 2017,
}
@article{efficientcompaddchain,
title = "Efficient computation of addition chains",
author = "Bergeron, F. and Berstel, J. and Brlek, S.",
url = "http://www.numdam.org/item/JTNB_1994__6_1_21_0",
journal = "Journal de theorie des nombres de Bordeaux",
language = "en",
mrnumber = 1305286,
number = 1,
pages = "21-38",
publisher = "Universite Bordeaux I",
volume = 6,
year = 1994,
zbl = "0812.11072",
}
@misc{elligator,
title = "Elligator: Elliptic-curve points indistinguishable from uniform random strings",
author = "Daniel J. Bernstein and Mike Hamburg and Anna Krasnova and Tanja Lange",
url = "https://eprint.iacr.org/2013/325",
howpublished = "Cryptology ePrint Archive, Report 2013/325",
year = 2013,
}
@misc{fips186-2,
title = "Digital Signature Standard (DSS)",
author = "NIST",
url = "https://csrc.nist.gov/csrc/media/publications/fips/186/2/archive/2000-01-27/documents/fips186-2.pdf",
howpublished = "Federal Information Processing Standards Publication 186-2",
year = 2000,
}
@misc{gencontfrac,
title = "Efficient computation of addition-subtraction chains using generalized continued Fractions",
author = "Amadou Tall and Ali Yassin Sanghare",
url = "https://eprint.iacr.org/2013/466",
howpublished = "Cryptology ePrint Archive, Report 2013/466",
year = 2013,
}
@article{genshortchains,
title = "New Methods for Generating Short Addition Chains",
author = "Kunihiro, Noboru and Yamamoto, Hirosuke",
url = "https://pdfs.semanticscholar.org/b398/d10faca35af9ce5a6026458b251fd0a5640c.pdf",
journal = "IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences",
month = 01,
volume = "E83A",
year = 2000,
}
@misc{github:kwantam/addchain,
title = "kwantam/addchain",
author = "Riad S. Wahby",
url = "https://github.com/kwantam/addchain",
howpublished = "Github Repository",
license = "Apache License, Version 2.0",
year = 2018,
}
@misc{goldilocks,
title = "Ed448-Goldilocks, a new elliptic curve",
author = "Mike Hamburg",
url = "https://eprint.iacr.org/2015/625",
howpublished = "Cryptology ePrint Archive, Report 2015/625",
year = 2015,
}
@misc{hashbls12-381,
title = "Fast and simple constant-time hashing to the BLS12-381 elliptic curve",
author = "Riad S. Wahby and Dan Boneh",
url = "https://eprint.iacr.org/2019/403",
howpublished = "Cryptology ePrint Archive, Report 2019/403",
year = 2019,
}
@inbook{hehcc:exp,
title = "Exponentiation",
author = "Christophe Doche",
url = "http://koclab.cs.ucsb.edu/teaching/ecc/eccPapers/Doche-ch09.pdf",
booktitle = "Handbook of Elliptic and Hyperelliptic Curve Cryptography",
chapter = 9,
publisher = "Chapman and Hall",
year = 2006,
}
@inbook{knuth,
title = "Evaluation of Powers",
author = "Knuth, Donald E.",
url = "https://www-cs-faculty.stanford.edu/~knuth/taocp.html",
booktitle = "The Art of Computer Programming, Volume 2 (Third Edition): Seminumerical Algorithms",
chapter = "4.6.3",
publisher = "Addison-Wesley Longman Publishing Co., Inc.",
year = 1997,
}
@mastersthesis{modboscoster,
title = "Modifications of Bos and Coster’s Heuristics in search of a shorter addition chain for faster exponentiation",
author = "Ayan Nandy",
url = "http://library.isical.ac.in:8080/jspui/bitstream/10263/6441/1/DISS-285.pdf",
school = "Indian Statistical Institute Kolkata",
year = 2011,
}
@techreport{mpnt,
title = "MpNT: A Multi-Precision Number Theory Package, Number Theoretical Algorithms (I)",
author = "F. L. Ţiplea and S. Iftene and C. Hriţcu and I. Goriac and R. Gordân and E. Erbiceanu",
url = "https://profs.info.uaic.ro/~tr/tr03-02.pdf",
institution = {Faculty of Computer Science, "Alexandru Ioan Cuza" University, Iasi},
number = "TR03-02",
year = 2003,
}
@misc{nistdanger,
title = "Security dangers of the NIST curves",
author = "Daniel J. Bernstein and Tanja Lange",
url = "https://cr.yp.to/talks/2013.09.16/slides-djb-20130916-a4.pdf",
year = 2013,
}
@misc{pairingsfinalexp,
title = "On the final exponentiation for calculating pairings on ordinary elliptic curves",
author = "Michael Scott and Naomi Benger and Manuel Charlemagne and Luis J. Dominguez Perez and Ezekiel J. Kachisa",
url = "https://eprint.iacr.org/2008/490",
howpublished = "Cryptology ePrint Archive, Report 2008/490",
year = 2008,
}
@misc{safecurves,
title = "SafeCurves: choosing safe curves for elliptic-curve cryptography",
author = "Daniel J. Bernstein and Tanja Lange",
url = "https://safecurves.cr.yp.to",
}
@misc{sec2,
title = "SEC 2: Recommended Elliptic Curve Domain Parameters, Version 2.0",
author = "Certicom Research",
url = "https://safecurves.cr.yp.to/www.secg.org/sec2-v2.pdf",
howpublished = "Standards for Efficient Cryptography 2",
year = 2010,
}
@techreport{solinasprime,
title = "Generalized Mersenne Primes",
author = "Jerome A. Solinas",
url = "http://cacr.uwaterloo.ca/techreports/1999/corr99-39.pdf",
institution = "Centre for Applied Cryptographic Research (CACR) at the University of Waterloo",
number = "CORR 99-39",
year = 1999,
}
@phdthesis{speedsubgroup,
title = "Speeding up subgroup cryptosystems",
author = "Stam, Martijn",
url = "https://cr.yp.to/bib/2003/stam-thesis.pdf",
school = "Technische Universiteit Eindhoven",
year = 2003,
}
|