Here below is the list of Most Cited Publications about ‘Elliptic Curve Signature Algorithm’.
Elliptic curves are a mathematical concept that is fundamental to the operation of cryptocurrencies like Bitcoin taking the form y^2 = x^3 +ax +b. With them it is possible to create public and private keys used to receive, send, and sign transactions. They are mathematically challenging to compute but easy to verify; a kind of bidirectional difference in computation power that makes it possible to haver public and private keys. These are essentially random letters that relate to each other in such a way it can be proven that you have access to a secret key by showing your public key and a block of text to verify (such as a transaction ledger or sentence). Elliptic curve research dates back to the 1980’s.
Last updated November 24th, 2017.
Most Cited ‘Elliptic Curve Signature Algorithm’ Publications
- “Applied cryptography: protocols, algorithms, and source code in C“. B Schneier. 2007. john wiley & sons . 15008 cites.
- “Identity-based encryption from the Weil pairing“. D Boneh, M Franklin. 2001. Springer Advances in Cryptology—CRYPTO 2001. 7883 cites.
- “Elliptic curve cryptosystems“. N Koblitz. 1987. ams.org Mathematics of computation. 5598 cites.
- “Public-key cryptosystems based on composite degree residuosity classes“. P Paillier. 1999. Springer Eurocrypt. 4423 cites.
- “Guide to elliptic curve cryptography“. D Hankerson, AJ Menezes, S Vanstone. 2006. books.google.com . 2995 cites.
- “Short signatures from the Weil pairing“. D Boneh, B Lynn, H Shacham. 2001. Springer Advances in Cryptology—ASIACRYPT …. 2757 cites.
- “Efficient signature generation by smart cards“. CP Schnorr. 1991. Springer Journal of cryptology. 2644 cites.
- “Identity-based encryption from the Weil pairing“. D Boneh, M Franklin. 2003. SIAM SIAM journal on computing. 2462 cites.
- “The internet key exchange (IKE)“. D Harkins, D Carrel. 1998. rfc-editor.org . 2328 cites.
- “Certificateless public key cryptography“. SS Al-Riyami, KG Paterson. 2003. Springer Asiacrypt. 1927 cites.
- “Elliptic curves in cryptography“. I Blake, G Seroussi, N Smart. 1999. books.google.com . 1856 cites.
- “Short group signatures“. D Boneh, X Boyen, H Shacham. 2004. Springer Crypto. 1816 cites.
- “Aggregate and verifiably encrypted signatures from bilinear maps“. D Boneh, C Gentry, B Lynn, H Shacham. 2003. Springer Eurocrypt. 1601 cites.
- “Digital signcryption or how to achieve cost (signature & encryption)≪ cost (signature)+ cost (encryption)“. Y Zheng. 1997. Springer Advances in Cryptology—Crypto’97. 1377 cites.
- “Elliptic curve public key cryptosystems“. AJ Menezes. 2012. books.google.com . 1325 cites.
- “Efficient algorithms for pairing-based cryptosystems“. P Barreto, HY Kim, B Lynn, M Scott. 2002. Springer Crypto. 1323 cites.
- “Short signatures without random oracles“. D Boneh, X Boyen. 2004. Springer Eurocrypt. 1263 cites.
- “Efficient identity based signature schemes based on pairings“. F Hess. 2002. Springer International Workshop on Selected Areas in …. 1236 cites.
- “Handbook of elliptic and hyperelliptic curve cryptography“. H Cohen, G Frey, R Avanzi, C Doche, T Lange…. 2005. books.google.com . 1232 cites.
- “Comparing elliptic curve cryptography and RSA on 8-bit CPUs“. N Gura, A Patel, A Wander, H Eberle, SC Shantz. 2004. Springer CHES. 1201 cites.
- “Hierarchical ID-based cryptography“. C Gentry, A Silverberg. 2002. Springer Advances in cryptology—ASIACRYPT 2002. 1195 cites.
- “An identity-based signature from gap Diffie-Hellman groups“. JC Choon, JH Cheon. 2003. Springer International Workshop on Public Key …. 1148 cites.
- “Short signatures from the Weil pairing“. D Boneh, B Lynn, H Shacham. 2004. Springer Journal of cryptology. 1047 cites.
- “Resistance against differential power analysis for elliptic curve cryptosystems“. JS Coron. 1999. Springer Cryptographic Hardware and Embedded Systems. 1044 cites.
- “Elliptic curves: number theory and cryptography“. LC Washington. 2008. books.google.com . 985 cites.
- “The elliptic curve digital signature algorithm (ECDSA)“. D Johnson, A Menezes, S Vanstone. 2001. Springer International Journal of Information …. 979 cites.
- “The decision diffie-hellman problem“. D Boneh. 1998. Springer Algorithmic number theory. 961 cites.
- “TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks“. A Liu, P Ning. 2008. dl.acm.org Proceedings of the 7th international conference on …. 914 cites.
- “Energy analysis of public-key cryptography for wireless sensor networks“. AS Wander, N Gura, H Eberle, V Gupta…. 2005. ieeexplore.ieee.org … , 2005. PerCom 2005 …. 892 cites.
- “A survey of security issues in wireless sensor networks“. Y Wang, G Attebury, B Ramamurthy. 2006. digitalcommons.unl.edu . 839 cites.
- “Signature schemes and anonymous credentials from bilinear maps“. J Camenisch, A Lysyanskaya. 2004. Springer Annual International Cryptology …. 771 cites.
- “Pairing-friendly elliptic curves of prime order“. PSLM Barreto, M Naehrig. 2005. Springer International Workshop on Selected Areas in …. 728 cites.
- “A new public-key cryptosystem as secure as factoring“. T Okamoto, S Uchiyama. 1998. Springer Advances in Cryptology—EUROCRYPT’98. 693 cites.
- “The state of elliptic curve cryptography“. N Koblitz, A Menezes, S Vanstone. 2000. Springer Towards a quarter-century of public …. 688 cites.
- “Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes.“. T Okamoto. 1992. Springer Crypto. 682 cites.
- “Implementing the Tate pairing“. SD Galbraith, K Harrison, D Soldera. 2002. Springer ANTS. 678 cites.
- “Efficient elliptic curve exponentiation using mixed coordinates“. H Cohen, A Miyaji, T Ono. 1998. Springer Asiacrypt. 655 cites.
- “A survey of fast exponentiation methods“. DM Gordon. 1998. Elsevier Journal of algorithms. 642 cites.
- “Hyperelliptic cryptosystems“. N Koblitz. 1989. Springer Journal of cryptology. 637 cites.
- “The Secure Remote Password Protocol.“. TD Wu. 1998. isoc.org NDSS. 627 cites.
- “An efficient protocol for authenticated key agreement“. L Law, A Menezes, M Qu, J Solinas…. 2003. Springer Designs, Codes and …. 623 cites.
- “Fast multiplication on elliptic curves over GF (2 m) without precomputation“. J López, R Dahab. 1999. Springer Cryptographic Hardware and Embedded Systems. 601 cites.
- “ID-based blind signature and ring signature from pairings“. F Zhang, K Kim. 2002. Springer Advances in cryptology—ASIACRYPT 2002. 600 cites.
- “Pairings for cryptographers“. SD Galbraith, KG Paterson, NP Smart. 2008. Elsevier Discrete Applied Mathematics. 597 cites.
- “Software implementation of elliptic curve cryptography over binary fields“. D Hankerson, JL Hernandez, A Menezes. 2000. Springer International Workshop on …. 597 cites.
- “New explicit conditions of elliptic curve traces for FR-reduction“. A Miyaji, M Nakabayashi, S Takano. 2001. search.ieice.org IEICE transactions on …. 579 cites.
- “Identity-based authenticated key agreement protocol based on Weil pairing“. NP Smart. 2002. ieeexplore.ieee.org Electronics letters. 575 cites.
- “Advances in elliptic curve cryptography“. IF Blake, G Seroussi, NP Smart. 2005. books.google.com . 574 cites.
- “ID-based signatures from pairings on elliptic curves“. KG Paterson. 2002. ieeexplore.ieee.org Electronics Letters. 550 cites.
- “Squealing Euros: Privacy protection in RFID-enabled banknotes“. A Juels, R Pappu. 2003. Springer Computer Aided Verification. 547 cites.
- “Group signatures with verifier-local revocation“. D Boneh, H Shacham. 2004. dl.acm.org Proceedings of the 11th ACM conference on …. 543 cites.
- “An efficient signature scheme from bilinear pairings and its applications“. F Zhang, R Safavi-Naini, W Susilo. 2004. Springer Public Key Cryptography–PKC 2004. 509 cites.
- “Efficient and provably-secure identity-based signatures and signcryption from bilinear maps“. PSLM Barreto, B Libert, N McCullagh…. 2005. Springer … Conference on the …. 504 cites.
- “The gap-problems: A new class of problems for the security of cryptographic schemes“. T Okamoto, D Pointcheval. 2001. Springer International Workshop on Public Key …. 504 cites.
- “Efficient arithmetic on Koblitz curves“. JA Solinas. 2000. Springer Towards a Quarter-Century of Public Key Cryptography. 472 cites.
- “Multipurpose identity-based signcryption“. X Boyen. 2003. Springer Crypto. 460 cites.
- “The Montgomery powering ladder“. M Joye, SM Yen. 2002. Springer CHES. 437 cites.
- “The OAKLEY key determination protocol“. H Orman. 1998. tools.ietf.org . 426 cites.
- “Introduction to cryptography“. H Delfs, H Knebl, H Knebl. 2002. Springer . 420 cites.
- “Short signatures without random oracles and the SDH assumption in bilinear groups“. D Boneh, X Boyen. 2008. Springer Journal of Cryptology. 411 cites.
- “An efficient identity-based batch verification scheme for vehicular sensor networks“. C Zhang, R Lu, X Lin, PH Ho…. 2008. ieeexplore.ieee.org INFOCOM 2008. The 27th …. 406 cites.
- “Faster addition and doubling on elliptic curves“. DJ Bernstein, T Lange. 2007. Springer Asiacrypt. 406 cites.
- “The advantages of elliptic curve cryptography for wireless security“. K Lauter. 2004. ieeexplore.ieee.org IEEE Wireless communications. 397 cites.
- “A generalized birthday problem“. D Wagner. 2002. Springer Crypto. 393 cites.
- “Collision free hash functions and public key signature schemes“. IB Damgård. 1987. Springer Workshop on the Theory and Application of of …. 377 cites.
- “Exponentiation cryptographic apparatus and method“. ME Hellman, SC Pohlig. 1984. Google Patents US Patent 4,424,414. 368 cites.
- “Efficient identity-based signatures secure in the standard model“. KG Paterson, JCN Schuldt. 2006. Springer Australasian Conference on Information …. 365 cites.
- “A new identity based signcryption scheme from pairings“. B Libert, JJ Quisquater. 2003. ieeexplore.ieee.org Information Theory Workshop, 2003 …. 364 cites.
- “RFID-tags for anti-counterfeiting“. P Tuyls, L Batina. 2006. Springer Cryptographers’ Track at the RSA Conference. 359 cites.
- “A study of the energy consumption characteristics of cryptographic algorithms and security protocols“. NR Potlapally, S Ravi, A Raghunathan…. 2006. ieeexplore.ieee.org IEEE Transactions on …. 359 cites.
- “Fast key exchange with elliptic curve systems“. R Schroeppel, H Orman, S O’Malley…. 1995. Springer Advances in Cryptology …. 354 cites.
- “Weierstraß elliptic curves and side-channel attacks“. E Brier, M Joye. 2002. Springer International Workshop on Public Key Cryptography. 348 cites.
- “Efficient ID-based blind signature and proxy signature from bilinear pairings“. F Zhang, K Kim. 2003. Springer Australasian Conference on Information Security and …. 345 cites.
- “An implementation of elliptic curve cryptosystems over F/sub 2/155“. GB Agnew, RC Mullin…. 1993. ieeexplore.ieee.org IEEE Journal on Selected …. 343 cites.
- “Differential fault attacks on elliptic curve cryptosystems“. I Biehl, B Meyer, V Müller. 2000. Springer Advances in Cryptology—CRYPTO 2000. 342 cites.
- “Faster point multiplication on elliptic curves with efficient endomorphisms“. R Gallant, R Lambert, S Vanstone. 2001. Springer Advances in Cryptology—CRYPTO …. 338 cites.
- “Identity based authenticated key agreement protocols from pairings“. L Chen, C Kudla. 2003. ieeexplore.ieee.org Computer Security Foundations Workshop …. 329 cites.
- “1-out-of-n signatures from a variety of keys“. M Abe, M Ohkubo, K Suzuki. 2002. Springer Advances in Cryptology—Asiacrypt 2002. 329 cites.
- “Software implementation of the NIST elliptic curves over prime fields“. M Brown, D Hankerson, J López, A Menezes. 2001. Springer Topics in Cryptology—CT …. 325 cites.
- “Tate Pairing Implementation for Hyperelliptic Curves y^ 2= x^ p-x+ d“. I Duursma, HS Lee. 2003. Springer Asiacrypt. 318 cites.
- “Digital signature algorithm“. DW Kravitz. 1993. Google Patents US Patent 5,231,668. 318 cites.
- “A scalable dual-field elliptic curve cryptographic processor“. A Satoh, K Takano. 2003. ieeexplore.ieee.org IEEE Transactions on Computers. 317 cites.
- “Accumulators from Bilinear Pairings and Applications.“. L Nguyen. 2005. Springer CT-RSA. 310 cites.
- “Applications of multilinear forms to cryptography“. D Boneh, A Silverberg. 2003. books.google.com Contemporary Mathematics. 309 cites.
- “Pairing-based cryptography at high security levels“. N Koblitz, A Menezes. 2005. Springer Lecture notes in computer science. 307 cites.
- “Analyzing the energy consumption of security protocols“. NR Potlapally, S Ravi, A Raghunathan…. 2003. dl.acm.org Proceedings of the 2003 …. 301 cites.
- “Sequential Aggregate Signatures and Multisignatures Without Random Oracles.“. S Lu, R Ostrovsky, A Sahai, H Shacham, B Waters. 2006. Springer Eurocrypt. 289 cites.
- “Certificateless public-key signature: security model and efficient construction“. Z Zhang, DS Wong, J Xu, D Feng. 2006. Springer ACNS. 289 cites.
- “Supersingular curves in cryptography“. SD Galbraith. 2001. Springer Asiacrypt. 287 cites.
- “A group signature scheme with improved efficiency“. J Camenisch, M Michels. 1998. Springer Asiacrypt. 287 cites.
- “Optimal extension fields for fast arithmetic in public-key algorithms“. DV Bailey, C Paar. 1998. Springer Annual International Cryptology Conference. 284 cites.
- “Sizzle: A standards-based end-to-end security architecture for the embedded internet“. V Gupta, M Wurm, Y Zhu, M Millard, S Fung…. 2005. Elsevier Pervasive and Mobile …. 275 cites.
- “Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity“. B Chevallier-Mames, M Ciet…. 2004. ieeexplore.ieee.org IEEE Transactions on …. 275 cites.
- “Signing a Linear Subspace: Signature Schemes for Network Coding.“. D Boneh, DM Freeman, J Katz, B Waters. 2009. Springer Public Key Cryptography. 270 cites.
- “The two faces of lattices in cryptology“. PQ Nguyen, J Stern. 2001. Springer Cryptography and lattices. 265 cites.
- “An efficient scheme for authenticating public keys in sensor networks“. W Du, R Wang, P Ning. 2005. dl.acm.org Proceedings of the 6th ACM international …. 264 cites.
- “Signatures for network coding“. D Charles, K Jain, K Lauter. 2006. ieeexplore.ieee.org Information Sciences and …. 263 cites.
- “The Weil and Tate pairings as building blocks for public key cryptosystems“. A Joux. 2002. Springer ANTS. 260 cites.
- “State of the art in ultra-low power public key cryptography for wireless sensor networks“. G Gaubatz, JP Kaps, E Ozturk…. 2005. ieeexplore.ieee.org … , 2005. PerCom 2005 …. 258 cites.
- “A key distribution system equivalent to factoring“. KS McCurley. 1988. Springer Journal of cryptology. 258 cites.
- “An efficient signature-based scheme for securing network coding against pollution attacks“. Z Yu, Y Wei, B Ramkumar…. 2008. ieeexplore.ieee.org INFOCOM 2008. The 27th …. 256 cites.
- “A refined power-analysis attack on elliptic curve cryptosystems“. L Goubin. 2003. Springer Public Key Cryptography. 256 cites.
- “Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms“. U Maurer. 1994. Springer Advances in cryptology—CRYPTO’94. 254 cites.
- “Fast authenticated key establishment protocols for self-organizing sensor networks“. Q Huang, J Cukier, H Kobayashi, B Liu…. 2003. dl.acm.org Proceedings of the 2nd …. 253 cites.
- “Efficient algorithms for elliptic curve cryptosystems“. J Guajardo, C Paar. 1997. Springer Advances in Cryptology—CRYPTO’97. 253 cites.
- “ID based Cryptosystems with Pairing on Elliptic Curve.“. R Sakai, M Kasahara. 2003. signcryption.cs.uab.edu IACR Cryptology ePrint Archive. 251 cites.
- “Identity-based aggregate signatures“. C Gentry, Z Ramzan. 2006. Springer Public Key Cryptography. 243 cites.
- “Public-key cryptography for RFID-tags“. L Batina, J Guajardo, T Kerins…. 2007. ieeexplore.ieee.org … Workshops’ 07. Fifth …. 242 cites.
- “New public-key schemes based on elliptic curves over the ring Zn“. K Koyama, UM Maurer, T Okamoto…. 1991. Springer Annual International …. 239 cites.
- “On the energy cost of communication and cryptography in wireless sensor networks“. G De Meulenaer, F Gosset…. 2008. ieeexplore.ieee.org … , 2008. WIMOB’08 …. 234 cites.
- “Hessian elliptic curves and side-channel attacks“. M Joye, JJ Quisquater. 2001. Springer CHES. 232 cites.
- “Elliptic-curve-based security processor for RFID“. YK Lee, K Sakiyama, L Batina…. 2008. ieeexplore.ieee.org IEEE Transactions on …. 231 cites.
- “Preventing SPA/DPA in ECC systems using the Jacobi form“. PY Liardet, NP Smart. 2001. Springer International Workshop on Cryptographic Hardware …. 230 cites.
- “Elliptic curve cryptosystems and their implementation“. AJ Menezes, SA Vanstone. 1993. Springer Journal of cryptology. 230 cites.
- “Method for identifying subscribers and for generating and verifying electronic signatures in a data exchange system“. CP Schnorr. 1991. Google Patents US Patent 4,995,082. 229 cites.
- “Security Analysis of the Strong Diffie-Hellman Problem.“. JH Cheon. 2006. Springer Eurocrypt. 228 cites.
- “An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications“. Y Sun, R Lu, X Lin, X Shen, J Su. 2010. ieeexplore.ieee.org IEEE Transactions on …. 224 cites.
- “Cryptographic algorithms on reconfigurable hardware“. F Rodríguez-Henríquez, NA Saqib, AD Perez, CK Koc. 2007. books.google.com . 224 cites.
- “Performance analysis of elliptic curve cryptography for SSL“. V Gupta, S Gupta, S Chang, D Stebila. 2002. dl.acm.org … of the 1st ACM workshop on …. 224 cites.
- “On the selection of pairing-friendly groups“. PSLM Barreto, B Lynn, M Scott. 2003. Springer International Workshop on Selected Areas …. 223 cites.
- “Algorithms for black-box fields and their application to cryptography“. D Boneh, RJ Lipton. 1996. Springer Annual International Cryptology Conference. 223 cites.
- “Message recovery for signature schemes based on the discrete logarithm problem“. K Nyberg, RA Rueppel. 1996. Springer Designs, Codes and Cryptography. 222 cites.
- “Non-interactive public-key cryptography“. U Maurer, Y Yacobi. 1991. Springer Advances in Cryptology—EUROCRYPT’91. 221 cites.
- “Generic construction of certificateless signature“. DH Yum, PJ Lee. 2004. Springer Acisp. 218 cites.
- “How to construct efficient signcryption schemes on elliptic curves“. Y Zheng, H Imai. 1998. Elsevier Information Processing Letters. 217 cites.
- “Discrete logarithms: The past and the future“. A Odlyzko. 2000. Springer Designs, Codes and Cryptography. 215 cites.
- “A fast software implementation for arithmetic operations in GF (2n)“. E De Win, A Bosselaers, S Vandenberghe…. 1996. Springer … Conference on the …. 215 cites.
- “Elliptic curves and their applications to cryptography: an introduction“. A Enge. 2012. books.google.com . 210 cites.
- “A fast parallel elliptic curve multiplication resistant against side channel attacks“. T Izu, T Takagi. 2002. Springer Public Key Cryptography. 210 cites.
- “Signatures for content distribution with network coding“. F Zhao, T Kalker, M Médard…. 2007. ieeexplore.ieee.org Information Theory, 2007 …. 209 cites.
- “Practical Short Signature Batch Verification.“. AL Ferrara, M Green, S Hohenberger, MØ Pedersen. 2009. Springer CT-RSA. 207 cites.
- “Pairing-Based Cryptographic Protocols: A Survey.“. R Dutta, R Barua, P Sarkar. 2004. researchgate.net IACR Cryptology ePrint Archive. 207 cites.
- “A scalable and unified multiplier architecture for finite fields GF (p) and GF (2m)“. E Savaš, AF Tenca, CK Koç. 2000. Springer International Workshop on Cryptographic …. 205 cites.
- “Faster attacks on elliptic curve cryptosystems“. MJ Wiener, RJ Zuccherato. 1998. Springer Selected areas in Cryptography. 204 cites.
- “An elementary introduction to hyperelliptic curves“. A Menezes, YH Wu, R Zuccherato. 1996. static.cse.iitk.ac.in . 204 cites.
- “New algorithms for secure outsourcing of modular exponentiations“. X Chen, J Li, J Ma, Q Tang…. 2014. ieeexplore.ieee.org IEEE Transactions on …. 202 cites.
- “Computing the Tate pairing“. M Scott. 2005. Springer Topics in Cryptology–CT-RSA 2005. 202 cites.
- “Evidence that XTR is more secure than supersingular elliptic curve cryptosystems“. E Verheul. 2001. Springer Advances in Cryptology—EUROCRYPT 2001. 202 cites.
- “Efficient arithmetic in finite field extensions with application in elliptic curve cryptography“. DV Bailey, C Paar. 2001. Springer Journal of cryptology. 202 cites.
- “The doubling attack-why upwards is better than downwards“. PA Fouque, F Valette. 2003. Springer CHES. 201 cites.
- “Group signature schemes and payment systems based on the discrete logarithm problem“. JL Camenisch. 1998. e-collection.library.ethz.ch . 195 cites.
- “Multi-user broadcast authentication in wireless sensor networks“. K Ren, S Yu, W Lou, Y Zhang. 2009. ieeexplore.ieee.org IEEE Transactions on Vehicular …. 194 cites.
- “Elliptic curve cryptography-based access control in sensor networks“. H Wang, B Sheng, Q Li. 2006. inderscienceonline.com International Journal of Security …. 192 cites.
- “Chinese remaindering based cryptosystems in the presence of faults“. M Joye, AK Lenstra, JJ Quisquater. 1999. Springer Journal of cryptology. 191 cites.
- “Trading inversions for multiplications in elliptic curve cryptography“. M Ciet, M Joye, K Lauter, PL Montgomery. 2006. Springer Designs, codes and …. 190 cites.
- “An end-to-end systems approach to elliptic curve cryptography“. N Gura, SC Shantz, H Eberle, S Gupta, V Gupta…. 2002. Springer … and Embedded Systems. 190 cites.
- “Lattice attacks on digital signature schemes“. NA Howgrave-Graham, NP Smart. 2001. Springer Designs, Codes and Cryptography. 186 cites.
- “The Insecurity of the Digital Signature Algorithm with Partially Known Nonces.“. PQ Nguyen, IE Shparlinski. 2002. Springer Journal of Cryptology. 185 cites.
- “Certificateless signature and proxy signature schemes from bilinear pairings“. X Li, K Chen, L Sun. 2005. Springer Lithuanian Mathematical Journal. 182 cites.
- “Constructing elliptic curves with prescribed embedding degrees“. PSLM Barreto, B Lynn, M Scott. 2002. Springer International Conference on Security in …. 182 cites.
- “Algorithms for multi-exponentiation“. B Möller. 2001. Springer Selected Areas in Cryptography. 182 cites.
- “SecureDAV: A secure data aggregation and verification protocol for sensor networks“. A Mahimkar, TS Rappaport. 2004. ieeexplore.ieee.org … Conference, 2004. GLOBECOM’ …. 181 cites.
- “Elliptic curve cryptosystems in the presence of permanent and transient faults“. M Ciet, M Joye. 2005. Springer Designs, codes and cryptography. 179 cites.
- “Applications of multiple trust authorities in pairing based cryptosystems“. L Chen, K Harrison, D Soldera, NP Smart. 2002. Springer Infrastructure Security. 179 cites.
- “An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem“. JH Yang, CC Chang. 2009. Elsevier Computers & security. 178 cites.
- “A scalable GF (p) elliptic curve processor architecture for programmable hardware“. G Orlando, C Paar. 2001. Springer … on Cryptographic Hardware and Embedded Systems. 176 cites.
- “Elliptic curve cryptography (ECC) cipher suites for transport layer security (TLS)“. S Blake-Wilson, B Moeller, V Gupta, C Hawk, N Bolyard. 2006. buildbot.tools.ietf.org . 175 cites.
- “PGP in Constrained Wireless Devices.“. M Brown, D Cheung, D Hankerson…. 2000. static.usenix.org USENIX Security …. 175 cites.
- “Realizing robust user authentication in sensor networks“. Z Benenson, N Gedicke…. 2005. pdfs.semanticscholar.org Real-World Wireless …. 174 cites.
- “Unknown key-share attacks on the station-to-station (STS) protocol“. S Blake-Wilson, A Menezes. 1999. Springer International Workshop on Public Key …. 174 cites.
- “Fast RSA-type cryptosystem modulo pkq“. T Takagi. 1998. Springer Advances in Cryptology—CRYPTO’98. 174 cites.
- “Implementing cryptographic pairings on smartcards“. M Scott, N Costigan, W Abdulwahab. 2006. Springer CHES. 173 cites.
- “Exploiting the power of GPUs for asymmetric cryptography“. R Szerwinski, T Güneysu. 2008. Springer Cryptographic Hardware and Embedded …. 172 cites.
- “Self-blindable credential certificates from the Weil pairing“. ER Verheul. 2001. Springer Asiacrypt. 172 cites.
- “Imperfect forward secrecy: How Diffie-Hellman fails in practice“. D Adrian, K Bhargavan, Z Durumeric…. 2015. dl.acm.org Proceedings of the …. 171 cites.
- “Power analysis breaks elliptic curve cryptosystems even secure against the timing attack“. K Okeya, K Sakurai. 2000. Springer Indocrypt. 171 cites.
- “An efficient certificateless signature scheme“. MC Gorantla, A Saxena. 2005. Springer International Conference on Computational and …. 167 cites.
- “High-Speed Software Multiplication in F~ 2~^ m“. J López, R Dahab. 2000. Springer INDOCRYPT. 167 cites.
- “Discrete logarithms: the effectiveness of the index calculus method“. O Schirokauer, D Weber, T Denny. 1996. Springer Algorithmic number theory. 167 cites.
- “A certificate-based signature scheme“. BG Kang, JH Park, SG Hahn. 2004. Springer CT-RSA. 164 cites.
- “Speeding up elliptic cryptosystems by using a signed binary window method“. K Koyama, Y Tsuruoka. 1992. Springer Annual International Cryptology Conference. 164 cites.
- “Verifier-local revocation group signature schemes with backward unlinkability from bilinear maps“. T Nakanishi, N Funabiki. 2005. Springer Asiacrypt. 163 cites.
- “Efficient verifiably encrypted signature and partially blind signature from bilinear pairings“. F Zhang, R Safavi-Naini, W Susilo. 2003. Springer Indocrypt. 159 cites.
- “High-speed high-security signatures“. DJ Bernstein, N Duif, T Lange, P Schwabe…. 2012. Springer Journal of Cryptographic …. 158 cites.
- “Twisted Edwards Curves Revisited.“. H Hisil, KKH Wong, G Carter, E Dawson. 2008. Springer Asiacrypt. 157 cites.
- “Shor’s discrete logarithm quantum algorithm for elliptic curves“. J Proos, C Zalka. 2003. arxiv.org arXiv preprint quant-ph/0301141. 156 cites.
- “On broadcast authentication in wireless sensor networks“. K Ren, W Lou, K Zeng, PJ Moran. 2007. ieeexplore.ieee.org IEEE Transactions on …. 154 cites.
- “New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing.“. F Zhang, R Safavi-Naini, CY Lin. 2003. eprint.iacr.org IACR Cryptology EPrint Archive. 153 cites.
- “jPBC: Java pairing based cryptography“. A De Caro, V Iovino. 2011. ieeexplore.ieee.org Computers and communications (ISCC) …. 152 cites.
- “Sluice: Secure dissemination of code updates in sensor networks“. PE Lanigan, R Gandhi…. 2006. ieeexplore.ieee.org … Systems, 2006. ICDCS …. 152 cites.
- “Breaking ciphers with COPACOBANA–a cost-optimized parallel code breaker“. S Kumar, C Paar, J Pelzl, G Pfeiffer…. 2006. dl.acm.org Proceedings of the 8th …. 151 cites.
- “The Montgomery modular inverse-revisited“. E Savas, ÇK Koç. 2000. ieeexplore.ieee.org IEEE Transactions on Computers. 151 cites.
- “ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks“. JL Huang, LY Yeh, HY Chien. 2011. ieeexplore.ieee.org IEEE Transactions on Vehicular …. 150 cites.
- “A public-key cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms“. P Smith, C Skinner. 1994. Springer International Conference on the Theory and …. 150 cites.
- “Compressed pairings“. M Scott, PSLM Barreto. 2004. Springer Annual International Cryptology Conference. 149 cites.
- “Batch Verifications with ID-Based Signatures.“. HJ Yoon, JH Cheon, Y Kim. 2004. Springer ICISC. 147 cites.
- “Fast elliptic curve cryptography on FPGA“. WN Chelton, M Benaissa. 2008. ieeexplore.ieee.org … on very large scale integration (VLSI …. 142 cites.
- “Quartz, 128-bit long digital signatures“. J Patarin, N Courtois, L Goubin. 2001. Springer Cryptographers’ Track at the RSA …. 142 cites.
- “Are standards compliant elliptic curve cryptosystems feasible on RFID“. S Kumar, C Paar. 2006. emsec.rub.de Workshop on RFID security. 140 cites.
- “About cryptographic engineering“. ÇK Koç. 2009. Springer Cryptographic engineering. 138 cites.
- “Hardware architectures for public key cryptography“. L Batina, SB Örs, B Preneel, J Vandewalle. 2003. Elsevier Integration, the VLSI journal. 138 cites.
- “On concrete security treatment of signatures derived from identification“. K Ohta, T Okamoto. 1998. Springer Annual International Cryptology Conference. 138 cites.
- “Zero-value point attacks on elliptic curve cryptosystem“. T Akishita, T Takagi. 2003. Springer International Conference on Information Security. 137 cites.
- “The insecurity of the elliptic curve digital signature algorithm with partially known nonces“. PQ Nguyen, IE Shparlinski. 2003. Springer Designs, codes and cryptography. 136 cites.
- “Itoh-Tsujii inversion in standard basis and its application in cryptography and codes“. J Guajardo, C Paar. 2002. Springer Designs, Codes and Cryptography. 136 cites.
- “Flash, a fast multivariate signature algorithm“. J Patarin, N Courtois, L Goubin. 2001. Springer Topics in Cryptology—CT-RSA 2001. 136 cites.
- “A new elliptic curve based analogue of RSA“. N Demytko. 1993. Springer Workshop on the Theory and Application of of …. 135 cites.
- “Ron was wrong, Whit is right“. A Lenstra, JP Hughes, M Augier, JW Bos, T Kleinjung…. 2012. infoscience.epfl.ch . 134 cites.
- “Access control in wireless sensor networks“. Y Zhou, Y Zhang, Y Fang. 2007. Elsevier Ad Hoc Networks. 134 cites.
- “An identity-based signature scheme from the Weil pairing“. X Yi. 2003. ieeexplore.ieee.org IEEE communications letters. 134 cites.
- “Ultra high performance ECC over NIST primes on commercial FPGAs“. T Güneysu, C Paar. 2008. Springer … Hardware and Embedded Systems–CHES 2008. 132 cites.
- “A survey on fault attacks“. C Giraud, H Thiebeauld. 2004. Springer … Card Research and Advanced Applications VI. 132 cites.
- “On random walks for Pollard’s rho method“. E Teske. 2001. ams.org Mathematics of computation. 132 cites.
- “Elliptic curves and cryptography“. A Jurišic, A Menezes. 1997. lkrv.fri.uni-lj.si Dr. Dobb’s Journal. 132 cites.
- “Remote timing attacks are still practical“. B Brumley, N Tuveri. 2011. Springer Computer Security–ESORICS 2011. 131 cites.
- “Implementation of elliptic curve cryptographic coprocessor over GF (2m) on an FPGA“. S Okada, N Torii, K Itoh, M Takenaka. 2000. Springer International Workshop on …. 131 cites.
- “ID-based ring signature and proxy ring signature schemes from bilinear pairings“. AK Awasthi, S Lal. 2005. arxiv.org arXiv preprint cs/0504097. 130 cites.
- “DCS: an efficient distributed-certificate-service scheme for vehicular networks“. A Wasef, Y Jiang, X Shen. 2010. ieeexplore.ieee.org IEEE Transactions on Vehicular …. 128 cites.
- “Sign Change Fault Attacks on Elliptic Curve Cryptosystems.“. J Blömer, M Otto, JP Seifert. 2006. Springer FDTC. 128 cites.
- “Evidence that XTR is more secure than supersingular elliptic curve cryptosystems“. ER Verheul. 2004. Springer Journal of Cryptology. 128 cites.
- “Trapdoor one-way permutations and multivariate polynomials“. J Patarin, L Goubin. 1997. Springer International Conference on Information and …. 128 cites.
- “A signature scheme as secure as the Diffie-Hellman problem“. EJ Goh, S Jarecki. 2003. Springer International Conference on the Theory and …. 127 cites.
- “Multi-signature schemes secure against active insider attacks“. K Ohta, T Okamoto. 1999. search.ieice.org IEICE TRANSACTIONS on Fundamentals of …. 127 cites.
- “Efficient and provably-secure certificateless short signature scheme from bilinear pairings“. H Du, Q Wen. 2009. Elsevier Computer Standards & Interfaces. 126 cites.
- “Implementing cryptographic pairings“. M Scott. 2007. Springer Lecture Notes in Computer Science. 126 cites.
- “Elliptic curve discrete logarithms and the index calculus“. JH Silverman, J Suzuki. 1998. Springer Asiacrypt. 126 cites.
- “Identity-based threshold signature scheme from the bilinear pairings“. J Baek, Y Zheng. 2004. ieeexplore.ieee.org Information Technology: Coding and …. 125 cites.
- “Security proof of sakai-kasahara’s identity-based encryption scheme“. L Chen, Z Cheng. 2005. Springer Lecture notes in computer science. 123 cites.
- “Fast elliptic curve arithmetic and improved Weil pairing evaluation“. K Eisenträger, K Lauter, P Montgomery. 2003. Springer Topics in cryptology—CT-RSA …. 123 cites.
- “An elliptic curve processor suitable for RFID-tags“. L Batina, J Guajardo, T Kerins, N Mentens, P Tuyls…. 2006. repository.ubn.ru.nl . 122 cites.
- “Digital proxy blind signature schemes based on DLP and ECDLP“. Z Tan, Z Liu, C Tang. 2002. mmrc.iss.ac.cn MM Research Preprints. 121 cites.
- “Improved techniques for fast exponentiation“. B Möller. 2002. Springer ICISC. 121 cites.
- “An elliptic curve implementation of the finite field digital signature algorithm“. N Koblitz. 1998. Springer Advances in Cryptology—CRYPTO’98. 121 cites.
- “On the performance of signature schemes based on elliptic curves“. E De Win, S Mister, B Preneel, M Wiener. 1998. Springer International Algorithmic …. 121 cites.
- “Public-key cryptosystems with very small key lengths“. G Harper, A Menezes, S Vanstone. 1992. Springer … on the Theory and Application of of …. 120 cites.
- “Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems.“. T Güneysu, V Lyubashevsky, T Pöppelmann. 2012. Springer CHES. 118 cites.
- “Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings“. L Nguyen, R Safavi-Naini. 2004. Springer International Conference on the Theory and …. 118 cites.
- “Constructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic Field.“. EJ Kachisa, EF Schaefer, M Scott. 2008. Springer Pairing. 117 cites.
- “Aggregated path authentication for efficient BGP security“. M Zhao, SW Smith, DM Nicol. 2005. dl.acm.org Proceedings of the 12th ACM conference …. 116 cites.
- “Efficient elliptic curve exponentiation“. A Miyaji, T Ono, H Cohen. 1997. Springer International Conference on Information and …. 116 cites.
- “On the Key Exposure Problem in Chameleon Hashes.“. G Ateniese, B De Medeiros. 2004. Springer SCN. 115 cites.
- “The security impact of a new cryptographic library“. D Bernstein, T Lange, P Schwabe. 2012. Springer Progress in Cryptology–LATINCRYPT …. 114 cites.
- “A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes“. R Roman, C Alcaraz, J Lopez. 2007. dl.acm.org Mobile Networks and Applications. 114 cites.
- “ID-based proxy signature using bilinear pairings“. J Xu, Z Zhang, D Feng. 2005. Springer ISPA Workshops. 114 cites.
- “Building curves with arbitrary small MOV degree over finite prime fields“. R Dupont, A Enge, F Morain. 2005. Springer Journal of Cryptology. 111 cites.
- “Fast implementation of public-key cryptography on a DSP TMS320C6201“. K Itoh, M Takenaka, N Torii, S Temma…. 1999. Springer International Workshop on …. 111 cites.
- “Transitions: Recommendation for transitioning the use of cryptographic algorithms and key lengths“. E Barker, A Roginsky. 2011. gocs.eu NIST Special Publication. 110 cites.
- “Homomorphic encryption and signatures from vector decomposition“. T Okamoto, K Takashima. 2008. Springer Pairing-Based Cryptography–Pairing 2008. 110 cites.
- “The width-w NAF method provides small memory and fast elliptic scalar multiplications secure against side channel attacks“. K Okeya, T Takagi. 2003. Springer Cryptographers’ Track at the RSA Conference. 110 cites.
- “A high speed coprocessor for elliptic curve scalar multiplications over Fp“. N Guillermin. 2010. Springer Proc. Cryptographic Hardware and Embedded …. 109 cites.
- “Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks“. X Du, M Guizani, Y Xiao…. 2009. ieeexplore.ieee.org IEEE Transactions on …. 109 cites.
- “From Euclid’s GCD to Montgomery multiplication to the great divide“. SC Shantz. 2001. dl.acm.org . 109 cites.
- “Efficient algorithms and architectures for field multiplication using Gaussian normal bases“. A Reyhani-Masoleh. 2006. ieeexplore.ieee.org IEEE Transactions on Computers. 108 cites.
- “Discrete-log-based signatures may not be equivalent to discrete log“. P Paillier, D Vergnaud. 2005. Springer Asiacrypt. 108 cites.
- “An algorithm for modular exponentiation“. VS Dimitrov, GA Jullien, WC Miller. 1998. Elsevier Information Processing Letters. 108 cites.
- “Method for generating and verifying electronic signatures and privacy communication using elliptic curves“. A Miyaji, M Tatebayashi. 1995. Google Patents US Patent 5,442,707. 108 cites.
- “Public key cryptosystem with an elliptic curve“. A Miyaji, M Tatebayashi. 1993. Google Patents US Patent 5,272,755. 108 cites.
- “Flaws in applying proof methodologies to signature schemes“. J Stern, D Pointcheval, J Malone-Lee…. 2002. Springer Annual International …. 107 cites.
- “Parallel scalar multiplication on general elliptic curves over Fp hedged against Non-Differential Side-Channel Attacks.“. W Fischer, C Giraud, EW Knudsen…. 2002. eprint.iacr.org IACR Cryptology ePrint …. 106 cites.
- “High-speed hardware implementations of elliptic curve cryptography: A survey“. GM de Dormale, JJ Quisquater. 2007. Elsevier Journal of systems architecture. 105 cites.
- “Hardware implementation of finite fields of characteristic three“. D Page, NP Smart. 2002. Springer … on Cryptographic Hardware and Embedded Systems. 105 cites.
- “Elliptic curves with the Montgomery-form and their cryptographic applications“. K Okeya, H Kurumatani, K Sakurai. 2000. Springer Public Key Cryptography. 105 cites.
- “Counting the number of points on elliptic curves over finite fields: strategies and performances“. R Lercier, F Morain. 1995. Springer EUROCRYPT. 105 cites.
- “Universal authentication protocols for anonymous wireless communications“. G Yang, Q Huang, DS Wong…. 2010. ieeexplore.ieee.org IEEE Transactions on …. 104 cites.
- “A 2D barcode-based mobile payment system“. J Gao, V Kulkarni, H Ranavat…. 2009. ieeexplore.ieee.org … , 2009. MUE’09. Third …. 104 cites.
- “An efficient signcryption scheme with forward secrecy based on elliptic curve“. RJ Hwang, CH Lai, FF Su. 2005. Elsevier Applied Mathematics and computation. 104 cites.
- “Generating more MNT elliptic curves“. M Scott, PSLM Barreto. 2006. Springer Designs, Codes and Cryptography. 103 cites.
- “Logcrypt: forward security and public verification for secure audit logs“. JE Holt. 2006. dl.acm.org Proceedings of the 2006 Australasian workshops on …. 102 cites.
- “Power analysis by exploiting chosen message and internal collisions-vulnerability of checking mechanism for RSA-decryption“. SM Yen, WC Lien, SJ Moon, JC Ha. 2005. Springer Mycrypt. 102 cites.
- “Elliptic curve cryptography on smart cards without coprocessors“. AD Woodbury, DV Bailey, C Paar. 2000. Springer Smart Card Research and Advanced …. 102 cites.
- “Fast implementation of elliptic curve arithmetic in GF (pn)“. CH Lim, HS Hwang. 2000. Springer International Workshop on Public Key Cryptography. 102 cites.
- “Smart card crypto-coprocessors for public-key cryptography“. H Handschuh, P Paillier. 1998. Springer CARDIS. 102 cites.
- “Reconfigurable implementation of elliptic curve crypto algorithms“. M Bednara, M Daldrup, J von zur Gathen…. 2002. cosec.bit.uni-bonn.de ipdps. 101 cites.
- “High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor“. M Aydos, T Yanık, CK Koc. 2001. IET IEE Proceedings-Communications. 101 cites.
- “Elliptic curve encryption systems“. SA Vanstone, RC Mullin, GB Agnew. 2000. Google Patents US Patent 6,141,420. 101 cites.
- “Customizable elliptic curve cryptosystems“. RCC Cheung, NJ Telle, W Luk…. 2005. ieeexplore.ieee.org IEEE Transactions on …. 100 cites.
- “An improved unified scalable radix-2 Montgomery multiplier“. D Harris, R Krishnamurthy, M Anders…. 2005. ieeexplore.ieee.org … , 2005. ARITH-17 …. 100 cites.
- “Identity based undeniable signatures“. B Libert, JJ Quisquater. 2004. Springer CT-RSA. 100 cites.
- “PKI, elliptic curve cryptography, and digital signatures“. WJ Caelli, EP Dawson, SA Rea. 1999. Elsevier Computers & Security. 100 cites.
- “Security architecture of the Austrian citizen card concept“. H Leitold, A Hollosi, R Posch. 2002. ieeexplore.ieee.org Computer Security Applications …. 99 cites.
- “Elliptic curve cryptography in practice“. JW Bos, JA Halderman, N Heninger, J Moore…. 2014. Springer … Conference on Financial …. 98 cites.
- “Introduction to post-quantum cryptography“. DJ Bernstein. 2009. Springer Post-quantum cryptography. 98 cites.
- “Efficient online/offline identity-based signature for wireless sensor network“. JK Liu, J Baek, J Zhou, Y Yang, JW Wong. 2010. Springer International Journal of …. 97 cites.
- “High performance FPGA based elliptic curve cryptographic co-processor“. J Lutz, A Hasan. 2004. ieeexplore.ieee.org Information Technology: Coding and …. 97 cites.
- “Efficient GF (pm) arithmetic architectures for cryptographic applications“. G Bertoni, J Guajardo, S Kumar, G Orlando…. 2003. Springer Cryptographers’ Track at …. 97 cites.
- “A reconfigurable system on chip implementation for elliptic curve cryptography over GF (2^ n)“. M Ernst, M Jung, F Madlener, S Huss, R Blümel. 2002. Springer CHES. 97 cites.
- “SSMS-A secure SMS messaging protocol for the m-payment systems“. M Toorani, A Beheshti. 2008. ieeexplore.ieee.org … 2008. ISCC 2008. IEEE Symposium on. 96 cites.
- “Security of blind discrete log signatures against interactive attacks“. CP Schnorr. 2001. Springer ICICS. 96 cites.
- “Highly regular right-to-left algorithms for scalar multiplication“. M Joye. 2007. Springer … Workshop on Cryptographic Hardware and Embedded …. 95 cites.
- “A comparison of MNT curves and supersingular curves“. D Page, NP Smart, F Vercauteren. 2006. Springer Applicable Algebra in Engineering …. 95 cites.
- “IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks“. X Cao, W Kou, L Dang, B Zhao. 2008. Elsevier Computer communications. 94 cites.
- “Analysis of the Weil descent attack of Gaudry, Hess and Smart“. A Menezes, M Qu. 2001. Springer Topics in Cryptology—CT-RSA 2001. 94 cites.
- “An introduction to pairing-based cryptography“. A Menezes. 2009. books.google.com Recent trends in cryptography. 93 cites.
- “Scalable verification for outsourced dynamic databases“. HH Pang, J Zhang, K Mouratidis. 2009. dl.acm.org Proceedings of the VLDB Endowment. 93 cites.
- “An efficient and provably‐secure certificateless signature scheme without bilinear pairings“. D He, J Chen, R Zhang. 2012. Wiley Online Library International Journal of …. 92 cites.
- “Low-cost untraceable authentication protocols for RFID“. YK Lee, L Batina, D Singelée…. 2010. dl.acm.org Proceedings of the third …. 92 cites.
- “Speeding up Secure Web Transactions Using Elliptic Curve Cryptography.“. V Gupta, D Stebila, S Fung, SC Shantz, N Gura…. 2004. isoc.org NDSS. 92 cites.
- “Identity Based Threshold Ring Signature.“. SSM Chow, LCK Hui, SM Yiu. 2004. Springer ICISC. 92 cites.
- “Improved elliptic curve multiplication methods resistant against side channel attacks“. T Izu, B Möller, T Takagi. 2002. Springer Indocrypt. 92 cites.
- “An efficient scheme for secure message transmission using proxy-signcryption“. C Gamage, J Leiwo, Y Zheng. 1999. webpages.uncc.edu Proceedings of the 22nd …. 92 cites.
- “High-speed high-security signatures“. D Bernstein, N Duif, T Lange, P Schwabe…. 2011. Springer … and Embedded Systems …. 91 cites.
- “Analysis of public-key cryptography for wireless sensor networks security“. F Amin, AH Jahangir…. 2008. pdfs.semanticscholar.org World Academy of …. 91 cites.
- “Dual RSA and its security analysis“. HM Sun, ME Wu, WC Ting…. 2007. ieeexplore.ieee.org IEEE Transactions on …. 91 cites.
- “On small characteristic algebraic tori in pairing-based cryptography“. R Granger, D Page, M Stam. 2006. cambridge.org LMS Journal of Computation and …. 91 cites.
- “PACP: An efficient pseudonymous authentication-based conditional privacy protocol for VANETs“. D Huang, S Misra, M Verma…. 2011. ieeexplore.ieee.org IEEE Transactions on …. 90 cites.
- “Another look at HMQV“. A Menezes. 2007. degruyter.com Mathematical Cryptology JMC. 90 cites.
- “Two certificateless aggregate signatures from bilinear maps“. Z Gong, Y Long, X Hong, K Chen. 2007. ieeexplore.ieee.org … , Networking, and Parallel …. 90 cites.
- “Enabling full-size public-key algorithms on 8-bit sensor nodes“. L Uhsadel, A Poschmann, C Paar. 2007. Springer ESAS. 89 cites.
- “A cryptographic processor for arbitrary elliptic curves over GF (2 m)“. H Eberle, N Gura, SC Shantz, V Gupta. 2003. dl.acm.org . 89 cites.
- “Batch rsa“. A Fiat. 1997. Springer Journal of Cryptology. 89 cites.
- “Generic groups, collision resistance, and ECDSA“. DRL Brown. 2005. Springer Designs, Codes and Cryptography. 88 cites.
- “Software implementation of finite fields of characteristic three, for use in pairing-based cryptosystems“. K Harrison, D Page, NP Smart. 2002. cambridge.org LMS Journal of Computation and …. 88 cites.
- “Identity-based cryptography standard (IBCS)# 1: Supersingular curve implementations of the BF and BB1 cryptosystems“. X Boyen, L Martin. 2007. rfc-editor.org . 87 cites.
- “Towards Acceptable Public-Key Encryption in Sensor Networks.“. EO Blaß, M Zitterbart. 2005. researchgate.net IWUC. 87 cites.
- “Postal revenue collection in the digital age“. LA Pintsov, SA Vanstone. 2000. Springer Financial Cryptography. 87 cites.
- “Transaction verification protocol for Smart Cards“. SA Vanstone. 1999. Google Patents US Patent 5,955,717. 87 cites.
- ““Ooh Aah… Just a Little Bit”: A small amount of side channel can go a long way“. N Benger, J Van de Pol, NP Smart, Y Yarom. 2014. Springer International Workshop on …. 86 cites.
- “BAT: A robust signature scheme for vehicular networks using binary authentication tree“. Y Jiang, M Shi, X Shen, C Lin. 2009. ieeexplore.ieee.org IEEE Transactions on Wireless …. 86 cites.
- “Elliptic curve cryptography“. V Kapoor, VS Abraham, R Singh. 2008. dl.acm.org Ubiquity. 86 cites.
- “CRT RSA algorithm protected against fault attacks“. A Boscher, R Naciri, E Prouff. 2007. Springer … Security Theory and Practices. Smart Cards …. 86 cites.
- “Self-authentication of value documents using digital signatures“. BK Giest, TD Hayosh. 2006. Google Patents US Patent 7,051,206. 86 cites.
- “Elliptic curve cryptography engineering“. A Cilardo, L Coppolino, N Mazzocca…. 2006. ieeexplore.ieee.org Proceedings of the …. 85 cites.
- “Hyperelliptic curve cryptosystems: Closing the performance gap to elliptic curves“. J Pelzl, T Wollinger, J Guajardo, C Paar. 2003. Springer CHES. 85 cites.
- “Next generation security for wireless: elliptic curve cryptography“. SA Vanstone. 2003. Elsevier Computers & Security. 85 cites.
- “Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recovery of the y-coordinate on a Montgomery-form elliptic curve“. K Okeya, K Sakurai. 2001. Springer … on Cryptographic Hardware and Embedded Systems. 85 cites.
- “TinyPairing: A fast and lightweight pairing-based cryptographic library for wireless sensor networks“. X Xiong, DS Wong, X Deng. 2010. ieeexplore.ieee.org Wireless Communications and …. 84 cites.
- “Fault attack on elliptic curve Montgomery ladder implementation“. PA Fouque, R Lercier, D Réal…. 2008. ieeexplore.ieee.org Fault Diagnosis and …. 84 cites.
- “A survey of two signature aggregation techniques“. D Boneh, C Gentry, B Lynn…. 2003. ai2-s2-pdfs.s3.amazonaws.com RSA …. 84 cites.
- “E cient convertible undeniable signature schemes“. M Michels, M Stadler, UBS Ubilab. 1997. ubilab.org Proc. 4th Annual Workshop on …. 84 cites.
- “Efficient elliptic curve point multiplication using digit-serial binary field operations“. GD Sutter, JP Deschamps…. 2013. ieeexplore.ieee.org IEEE Transactions on …. 83 cites.
- “Cache-timing template attacks.“. BB Brumley, RM Hakala. 2009. Springer Asiacrypt. 83 cites.
- “Key lengths“. AK Lenstra. 2006. infoscience.epfl.ch . 83 cites.
- “A New ID-based Signature with Batch Verification.“. JH Cheon, Y Kim, HJ Yoon. 2004. icms.kaist.ac.kr IACR Cryptology EPrint Archive. 83 cites.
- “How to do a 𝑝-descent on an elliptic curve“. E Schaefer, M Stoll. 2004. ams.org Transactions of the American Mathematical Society. 82 cites.
- “Public keys“. A Lenstra, J Hughes, M Augier, J Bos…. 2012. Springer Advances in Cryptology …. 81 cites.
- “Efficient Indifferentiable Hashing into Ordinary Elliptic Curves.“. E Brier, JS Coron, T Icart, D Madore, H Randriam…. 2010. Springer CRYPTO. 81 cites.
- “Summation polynomials and the discrete logarithm problem on elliptic curves.“. IA Semaev. 2004. isg.rhul.ac.uk IACR Cryptology ePrint Archive. 81 cites.
- “A threshold signature scheme for group communications without a shared distribution center“. TY Chang, CC Yang, MS Hwang. 2004. Elsevier Future Generation Computer Systems. 80 cites.
- “Algorithms and Identifiers for the Internet X. 509 Public Key Infrastructure Certificate and CRL Profile“. L Bassham, R Housley. 2002. tools.ietf.org Algorithms. 80 cites.
- “Securing IPv6 neighbor and router discovery“. J Arkko, T Aura, J Kempf, VM Mäntylä…. 2002. dl.acm.org Proceedings of the 1st …. 80 cites.
- “A length-invariant hybrid mix“. M Ohkubo, M Abe. 2000. Springer International Conference on the Theory and …. 80 cites.
- “Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves.“. SD Galbraith, X Lin, M Scott. 2009. Springer Eurocrypt. 79 cites.
- “An RNS Implementation of an Elliptic Curve Point Multiplier“. DM Schinianakis, AP Fournaris…. 2009. ieeexplore.ieee.org … on Circuits and …. 79 cites.
- “A Biometric Identity Based Signature Scheme.“. A Burnett, F Byrne, T Dowling, A Duffy. 2007. ijns.jalaxy.com.tw IJ Network Security. 79 cites.
- “Efficient quintuple formulas for elliptic curves and efficient scalar multiplication using multibase number representation“. PK Mishra, V Dimitrov. 2007. Springer International Conference on Information Security. 79 cites.
- “Security-mediated certificateless cryptography“. SSM Chow, C Boyd, JMG Nieto. 2006. Springer Public key cryptography. 79 cites.
- “Fast elliptic curve algorithm combining Frobenius map and table reference to adapt to higher characteristic“. T Kobayashi, H Morita, K Kobayashi…. 1999. Springer … Conference on the Theory …. 79 cites.
- “Elliptic curve cryptosystem—the answer to strong, fast public-key cryptography for securing constrained environments“. SA Vanstone. 1997. Elsevier Information Security Technical Report. 79 cites.
- “An Efficient Group Signature Scheme from Bilinear Maps.“. J Furukawa, H Imai. 2005. Springer ACISP. 78 cites.
- “Low-power elliptic curve cryptography using scaled modular arithmetic“. E Öztürk, B Sunar, E Savas. 2004. Springer Lecture notes in computer science. 78 cites.
- “A parallel architecture for fast computation of elliptic curve scalar multiplication over GF (2/sup m/)“. NA Saqib, F Rodriguez-Henriquez…. 2004. ieeexplore.ieee.org Parallel and …. 78 cites.
- “Instruction set extensions for fast arithmetic in finite fields GF (p) and GF (2m)“. J Großschädl, E Savaş. 2004. Springer International Workshop on Cryptographic …. 78 cites.
- “FPGA designs of parallel high performance GF (2233) multipliers.“. C Grabbe, M Bednara, J Teich, J von zur Gathen…. 2003. cosec.bit.uni-bonn.de ISCAS (2 …. 78 cites.
- “On the performance of hyperelliptic cryptosystems“. NP Smart. 1999. Springer Eurocrypt. 78 cites.
- “On parallelization of high-speed processors for elliptic curve cryptography“. K Jarvinen, J Skytta. 2008. ieeexplore.ieee.org IEEE Transactions on Very Large Scale …. 77 cites.
- “Efficient generic on-line/off-line signatures without key exposure“. X Chen, F Zhang, W Susilo, Y Mu. 2007. Springer Applied cryptography and network …. 77 cites.
- “Deterministic identity-based signatures for partial aggregation“. J Herranz. 2005. academic.oup.com The Computer Journal. 77 cites.
- “Validation of elliptic curve public keys“. A Antipa, D Brown, A Menezes, R Struik…. 2003. Springer … Workshop on Public Key …. 77 cites.
- “A secure signature scheme from bilinear maps“. D Boneh, I Mironov, V Shoup. 2003. Springer CT-RSA. 77 cites.
- “Power analysis attacks and algorithmic approaches to their countermeasures for Koblitz curve cryptosystems“. MA Hasan. 2001. ieeexplore.ieee.org IEEE Transactions on Computers. 77 cites.
- “An analysis of rfid authentication schemes for internet of things in healthcare environment using elliptic curve cryptography“. D He, S Zeadally. 2015. ieeexplore.ieee.org IEEE internet of things journal. 76 cites.
- “Data security in cloud computing with elliptic curve cryptography“. V Gampala, S Inuganti, S Muppidi. 2012. researchgate.net International Journal of Soft …. 76 cites.
- “Elliptic curves over Fp suitable for cryptosystems“. A Miyaji. 1992. Springer International Workshop on the Theory and Application …. 76 cites.
- “Elliptic curve point ambiguity resolution apparatus and method“. R Schroeppel. 2007. Google Patents US Patent 7,200,225. 75 cites.
- “Authenticated Encryption Schemes: Current Status and Key Issues.“. MS Hwang, CY Liu. 2005. isrc.asia.edu.tw IJ Network Security. 75 cites.
- “Policy-based cryptography and applications“. W Bagga, R Molva. 2005. Springer Financial Cryptography. 75 cites.
- “Rapid prototyping for hardware accelerated elliptic curve public-key cryptosystems“. M Ernst, S Klupsch, O Hauck…. 2001. ieeexplore.ieee.org … System Prototyping, 12th …. 75 cites.
- “Method of implementing elliptic curve cryptosystems in digital signatures or verification and privacy communication“. A Miyaji. 1996. Google Patents US Patent 5,497,423. 75 cites.
- “The double-base number system and its application to elliptic curve cryptography“. V Dimitrov, L Imbert, P Mishra. 2008. ams.org Mathematics of Computation. 74 cites.
- “Weak fields for ECC“. A Menezes, E Teske, A Weng. 2004. Springer Cryptographers’ Track at the RSA …. 74 cites.
- “Dual-Field Arithmetic Unit for GF (p) and GF (2^ m)“. J Wolkerstorfer. 2002. Springer CHES. 74 cites.
- “Fault analysis in cryptography“. M Joye, M Tunstall. 2012. Springer . 73 cites.
- “An ID-based proxy signature schemes without bilinear pairings“. H Debiao, C Jianhua, H Jin. 2011. Springer Annals of telecommunications-annales des …. 73 cites.
- “Endomorphisms for faster elliptic curve cryptography on a large class of curves“. SD Galbraith, X Lin, M Scott. 2011. Springer Journal of cryptology. 73 cites.
- “Multicore curve-based cryptoprocessor with reconfigurable modular arithmetic logic units over GF (2^ n)“. K Sakiyama, L Batina, B Preneel…. 2007. ieeexplore.ieee.org IEEE Transactions on …. 73 cites.
- “An algorithm for the nt pairing calculation in characteristic three and its hardware implementation“. JL Beuchat, M Shirase, T Takagi…. 2007. ieeexplore.ieee.org … Arithmetic, 2007. ARITH …. 73 cites.
- “Elliptic curve based password authenticated key exchange protocols“. C Boyd, P Montague, K Nguyen. 2001. Springer Information Security and Privacy. 73 cites.
- “Elliptic curve cryptosystems“. MJB Robshaw, YL Yin. 1997. networkdls.com An RSA Laboratories Technical Note. 73 cites.
- “Practical cryptographic civil GPS signal authentication“. K Wesson, M Rothlisberger, T Humphreys. 2012. Wiley Online Library Navigation. 72 cites.
- “Implementation of elliptic curve digital signature algorithm“. A Khalique, K Singh, S Sood. 2010. academia.edu International journal of computer …. 72 cites.
- “Security of signature schemes in a multi-user setting“. A Menezes, N Smart. 2004. Springer Designs, Codes and Cryptography. 72 cites.
- “Elliptic curve cryptosystems on reconfigurable hardware.“. MC Rossner. 1998. emsec.rub.de . 72 cites.
- “Digital signature method and key agreement method“. RA Rueppel, K Nyberg. 1997. Google Patents US Patent 5,600,725. 72 cites.
- “ECC processor with low die size for RFID applications“. F Furbass, J Wolkerstorfer. 2007. ieeexplore.ieee.org Circuits and Systems, 2007. ISCAS …. 71 cites.
- “Public key cryptography based on semigroup actions“. G Maze, C Monico, J Rosenthal. 2005. arxiv.org arXiv preprint cs/0501017. 71 cites.
- “Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland …“. C Cachin. 2004. books.google.com . 71 cites.
- “Efficient identity-based signatures and blind signatures“. Z Huang, K Chen, Y Wang. 2005. Springer International Conference on Cryptology and …. 70 cites.
- “Efficient Tate Pairing Computation for Elliptic Curves over Binary Fields.“. S Kwon. 2005. Springer ACISP. 70 cites.
- “A public-key cryptographic processor for RSA and ECC“. H Eberle, N Gura, SC Shantz, V Gupta…. 2004. ieeexplore.ieee.org Application-Specific …. 70 cites.
- “Implementation of elliptic Curve cryptosystems“. A Menezes. 1993. Springer Elliptic Curve Public Key Cryptosystems. 70 cites.
- “On the efficient implementation of pairing-based protocols“. M Scott. 2011. Springer Cryptography and Coding. 69 cites.
- “Quantum resistant public key cryptography: a survey“. RA Perlner, DA Cooper. 2009. dl.acm.org Proceedings of the 8th Symposium on Identity …. 69 cites.
- “Choosing parameter sets for NTRUEncrypt with NAEP and SVES-3“. N Howgrave-Graham, JH Silverman…. 2005. Springer Cryptographers’ Track at …. 69 cites.
- “Secure hierarchical identity based signature and its application“. SSM Chow, LCK Hui, SM Yiu, KP Chow. 2004. Springer ICICS. 69 cites.
- “Certification of public keys within an identity based system“. L Chen, K Harrison, A Moss, D Soldera…. 2002. Springer … Conference on Information …. 69 cites.
- “Trapdooring discrete logarithms on elliptic curves over rings“. P Paillier. 2000. Springer Asiacrypt. 69 cites.
- “Instruction set extension for fast elliptic curve cryptography over binary finite fields GF (2/sup m/)“. J Groszschaedl, GA Kamendje. 2003. ieeexplore.ieee.org Application-Specific Systems …. 68 cites.
- “Signcryption scheme for Identity-based Cryptosystems.“. D Nalla, KC Reddy. 2003. researchgate.net IACR Cryptology ePrint Archive. 68 cites.
- “Elliptic curve cryptography: The serpentine course of a paradigm shift“. AH Koblitz, N Koblitz, A Menezes. 2011. Elsevier Journal of Number theory. 67 cites.
- “An extensible framework for efficient secure SMS“. A De Santis, A Castiglione, G Cattaneo…. 2010. ieeexplore.ieee.org Complex, Intelligent …. 67 cites.
- “An ID-based aggregate signature scheme with constant pairing computations“. KA Shim. 2010. Elsevier Journal of Systems and Software. 67 cites.
- “Refinements of Miller’s algorithm for computing the Weil/Tate pairing“. IF Blake, VK Murty, G Xu. 2006. Elsevier Journal of Algorithms. 67 cites.
- “Another look at “provable security”. II“. N Koblitz, A Menezes. 2006. Springer International Conference on Cryptology in India. 67 cites.
- “Incomplete reduction in modular arithmetic“. T Yanık, E Savaş, ÇK Koç. 2002. IET IEE Proceedings-Computers and Digital Techniques. 67 cites.
- “Computational and energy costs of cryptographic algorithms on handheld devices“. H Rifa-Pous, J Herrera-Joancomartí. 2011. mdpi.com Future internet. 66 cites.
- “How secure are elliptic curves over composite extension fields?“. NP Smart. 2001. Springer International Conference on the Theory and …. 66 cites.
- “ID-based aggregate signatures from bilinear pairings“. J Xu, Z Zhang, D Feng. 2005. Springer CANS. 65 cites.
- “Exceptional procedure attack on elliptic curve cryptosystems“. T Izu, T Takagi. 2003. Springer International Workshop on Public Key Cryptography. 65 cites.
- “Elliptic curve scalar multiplier design using FPGAs“. L Gao, S Shrivastava, GE Sobelman. 1999. Springer International Workshop on …. 65 cites.
- “A routing-driven key management scheme for heterogeneous sensor networks“. X Du, Y Xiao, S Ci, M Guizani…. 2007. ieeexplore.ieee.org … , 2007. ICC’07. IEEE …. 64 cites.
- “ID-Based Chameleon Hashes from Bilinear Pairings.“. F Zhang, R Safavi-Naini, W Susilo. 2003. researchgate.net IACR Cryptology ePrint …. 64 cites.
- “Enhancing simple power-analysis attacks on elliptic curve cryptosystems“. E Oswald. 2002. Springer CHES. 64 cites.
- “Key management for SCADA“. C Beaver, D Gallup, W Neumann…. 2002. pdfs.semanticscholar.org … Sys. Security Dept …. 64 cites.
- “A fast signature scheme based on congruential polynomial operations“. T Okamoto. 1990. ieeexplore.ieee.org IEEE Transactions on Information Theory. 64 cites.
- “Fundamental elliptic curve cryptography algorithms“. K Igoe, D McGrew, M Salter. 2011. . 63 cites.
- “A Schnorr-Like Lightweight Identity-Based Signature Scheme.“. D Galindo, FD Garcia. 2009. Springer AFRICACRYPT. 63 cites.
- “A practical implementation of elliptic curve cryptosystems over GF (p) on a 16-bit microcomputer“. T Hasegawa, J Nakajima, M Matsui. 1998. Springer Public Key Cryptography. 63 cites.
- “An identity-based ring signature scheme from bilinear pairings“. CY Lin, TC Wu. 2004. ieeexplore.ieee.org … Networking and Applications, 2004. AINA 2004 …. 62 cites.
- “(Virtually) free randomization techniques for elliptic curve cryptography“. M Ciet, M Joye. 2003. Springer International Conference on Information and …. 62 cites.
- “Algorithms and identifiers for the Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile“. W Polk, R Housley, L Bassham. 2002. ipa.go.jp Algorithms. 62 cites.
- “Signing on a postcard“. D Naccache, J Stern. 2000. Springer International Conference on Financial Cryptography. 62 cites.
- “On the design and implementation of an efficient DAA scheme“. L Chen, D Page, NP Smart. 2010. Springer … Conference on Smart Card Research and …. 61 cites.
- “How can we overcome both side channel analysis and fault attacks on RSA-CRT?“. CH Kim, JJ Quisquater. 2007. ieeexplore.ieee.org Fault Diagnosis and Tolerance in …. 61 cites.
- “A fast parallel implementation of elliptic curve point multiplication over GF (2 m)“. F Rodrıguez-Henrıquez, NA Saqib…. 2004. Elsevier Microprocessors and …. 61 cites.
- “New ID-based threshold signature scheme from bilinear pairings“. X Chen, F Zhang, DM Konidala, K Kim. 2004. Springer International Conference on …. 61 cites.
- “Recovering OpenSSL ECDSA Nonces Using the FLUSH+ RELOAD Cache Side-channel Attack.“. Y Yarom, N Benger. 2014. eprint.iacr.org IACR Cryptology ePrint Archive. 60 cites.
- “Secure hierarchical data aggregation in wireless sensor networks“. J Albath, S Madria. 2009. ieeexplore.ieee.org Wireless Communications and Networking …. 60 cites.
- “A location privacy preserving authentication scheme in vehicular networks“. C Zhang, R Lu, PH Ho, A Chen. 2008. ieeexplore.ieee.org … and Networking Conference …. 60 cites.
- “Parallelizable elliptic curve point multiplication method with resistance against side-channel attacks“. B Möller. 2002. Springer Information Security. 60 cites.
- “Verification protocol“. SA Vanstone, DB Johnson. 2002. Google Patents US Patent 6,446,207. 60 cites.
- “On the unpredictability of bits of the elliptic curve Diffie-Hellman scheme“. D Boneh, IE Shparlinski. 2001. Springer Annual International Cryptology Conference. 60 cites.
- “Steganographic methods“. J Lenti. 2000. pdfs.semanticscholar.org Periodica Polytechnica Electrical Engineering. 60 cites.
- “Efficient implementation of elliptic curve cryptosystems on the TI MSP430x33x family of microcontrollers“. J Guajardo, R Blümel, U Krieger, C Paar. 2001. Springer International Workshop on …. 59 cites.
- “Data card verification system“. SA Vanstone. 2001. Google Patents US Patent 6,178,507. 59 cites.
- “Report on post-quantum cryptography“. L Chen, L Chen, S Jordan, YK Liu, D Moody, R Peralta…. 2016. nvlpubs.nist.gov . 58 cites.
- “JSON web algorithms (jwa)“. M Jones. 2015. tools.ietf.org . 58 cites.
- “U-prove cryptographic specification v1. 1“. C Paquin, G Zaverucha. 2011. microsoft.com Technical Report, Microsoft Corporation. 58 cites.
- “Faster factoring of integers of a special form“. R Peralta, E Okamoto. 1996. search.ieice.org IEICE Transactions on Fundamentals of …. 58 cites.
- “Template Attacks on ECDSA.“. M Medwed, E Oswald. 2008. Springer WISA. 57 cites.
- “LPKI-a lightweight public key infrastructure for the mobile environments“. M Toorani, A Beheshti. 2008. ieeexplore.ieee.org … Systems, 2008. ICCS 2008. 11th IEEE …. 57 cites.
- “Power analysis for secret recovering and reverse engineering of public key algorithms“. F Amiel, B Feix, K Villegas. 2007. Springer Selected Areas in Cryptography. 57 cites.
- “An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices“. RW Zhu, G Yang, DS Wong. 2007. Elsevier Theoretical Computer Science. 57 cites.
- “Generic construction of (identity-based) perfect concurrent signatures“. SSM Chow, W Susilo. 2005. Springer International Conference on Information and …. 57 cites.
- “Cryptography in embedded systems: An overview“. T Wollinger, J Guajardo, C Paar. 2003. emsec.rub.de proceedings of the Embedded …. 57 cites.
- “Method for operating a digitally printing postage meter to generate and check a security imprint“. D Pauschinger. 2000. Google Patents US Patent 6,041,704. 57 cites.
- “Elliptic curve cryptosystems using curves of smooth order over the ring Z/sub n“. SA Vanstone, RJ Zuccherato. 1997. ieeexplore.ieee.org IEEE Transactions on …. 57 cites.
- “Elixir: High-throughput cost-effective dual-field processors and the design framework for elliptic curve cryptography“. JY Lai, CT Huang. 2008. ieeexplore.ieee.org IEEE transactions on very large scale …. 56 cites.
- “Time-Area Optimized Public-Key Engines:\mathcal {MQ}-Cryptosystems as Replacement for Elliptic Curves?“. A Bogdanov, T Eisenbarth, A Rupp, C Wolf. 2008. Springer International Workshop on …. 56 cites.
- “Elliptic curve cryptosystem and its applications“. GVS Raju, R Akbani. 2003. ieeexplore.ieee.org Systems, Man and Cybernetics, 2003 …. 56 cites.
- “FPGA implementation of high performance elliptic curve cryptographic processor over GF (2163)“. CH Kim, S Kwon, CP Hong. 2008. Elsevier Journal of Systems Architecture. 55 cites.
- “How to Break DES for BC 8,980“. S Kumar, C Paar, J Pelzl, G Pfeiffer…. 2006. pdfs.semanticscholar.org SHARCS ’06 …. 55 cites.
- “Cryptographic schemes based on elliptic curve pairings“. S Al-Riyami. 2004. repository.royalholloway.ac.uk . 55 cites.
- “Efficient Tate pairing computation for supersingular elliptic curves over binary fields.“. S Kwon. 2004. pdfs.semanticscholar.org IACR Cryptology ePrint Archive. 55 cites.
- “Discrete logarithms and smooth polynomials“. AM Odlyzko. 1994. books.google.com Contemporary Mathematics. 55 cites.
- “Point multiplication on ordinary elliptic curves over fields of characteristic three“. NP Smart, EJ Westwood. 2003. Springer Applicable Algebra in Engineering …. 54 cites.
- “Domain-Based Administration of Identity-Based Cryptosystems for Secure Email and IPSEC.“. DK Smetters, G Durfee. 2003. static.usenix.org USENIX Security Symposium. 54 cites.
- “A high-speed ECC-based wireless authentication on an ARM microprocessor“. M Aydos, T Yantk, ÇK Koç. 2000. ieeexplore.ieee.org Computer Security Applications …. 54 cites.
- “The prevalence of kleptographic attacks on discrete-log based cryptosystems“. A Young, M Yung. 1997. Springer Annual International Cryptology Conference. 54 cites.
- “Fast cryptography in genus 2“. JW Bos, C Costello, H Hisil, K Lauter. 2013. Springer … on the Theory and Applications of …. 53 cites.
- “An efficient CDH-based signature scheme with a tight security reduction“. B Chevallier-Mames. 2005. Springer Annual International Cryptology Conference. 53 cites.
- “Efficient FPGA implementations of point multiplication on binary Edwards and generalized Hessian curves using Gaussian normal basis“. R Azarderakhsh…. 2012. ieeexplore.ieee.org IEEE Transactions on Very …. 52 cites.
- “ID-based digital signature scheme on the elliptic curve cryptosystem“. YF Chung, KH Huang, F Lai, TS Chen. 2007. Elsevier Computer Standards & Interfaces. 52 cites.
- “Cryptography on a Speck of Dust“. JP Kaps, G Gaubatz, B Sunar. 2007. ieeexplore.ieee.org Computer. 52 cites.
- “An efficient group signature scheme from bilinear maps“. J Furukawa, H Imai. 2006. search.ieice.org IEICE Transactions on Fundamentals of …. 52 cites.
- “Accelerated verification of ECDSA signatures“. A Antipa, D Brown, R Gallant, R Lambert…. 2005. Springer Selected Areas in …. 52 cites.
- “Low latency elliptic curve cryptography accelerators for NIST curves over binary fields“. C Shu, K Gaj, T El-Ghazawi. 2005. ieeexplore.ieee.org Field-Programmable Technology …. 52 cites.
- “NaCl on 8-Bit AVR Microcontrollers.“. M Hutter, P Schwabe. 2013. books.google.com AFRICACRYPT. 51 cites.
- “Elliptic curve cryptography (ECC) brainpool standard curves and curve generation“. M Lochter, J Merkle. 2010. rfc-editor.org . 51 cites.
- “Using elliptic curves on RFID tags“. M Braun, E Hess, B Meyer. 2008. paper.ijcsns.org International Journal of Computer …. 51 cites.
- “Efficient generic on-line/off-line (threshold) signatures without key exposure“. X Chen, F Zhang, H Tian, B Wei, W Susilo, Y Mu…. 2008. Elsevier Information …. 51 cites.
- “An ID-based verifiable encrypted signature scheme based on Hess’s scheme“. C Gu, Y Zhu. 2005. Springer CISC. 51 cites.
- “Elliptic and hyperelliptic curves on embedded μP“. T Wollinger, J Pelzl, V Wittelsberger, C Paar…. 2004. dl.acm.org ACM Transactions on …. 51 cites.
- “Fast point multiplication on elliptic curves through isogenies“. E Brier, M Joye. 2003. Springer AAECC. 51 cites.
- “A low-power design for an elliptic curve digital signature chip“. R Schroeppel, C Beaver, R Gonzales, R Miller…. 2002. Springer CHES. 51 cites.
- “Workload characterization of elliptic curve cryptography and other network security algorithms for constrained environments“. M Fiskiran. 2002. ieeexplore.ieee.org Workload Characterization, 2002. WWC-5. 2002 …. 51 cites.
- “Elliptic curve cryptography on a Palm OS device“. A Weimerskirch, C Paar, SC Shantz. 2001. Springer ACISP. 51 cites.
- “Provably secure implicit certificate schemes“. DRL Brown, R Gallant, SA Vanstone. 2001. Springer International Conference on …. 51 cites.
- “Efficient scalar multiplications on elliptic curves with direct computations of several doublings“. Y Sakai, K Sakurai. 2001. search.ieice.org IEICE TRANSACTIONS on Fundamentals of …. 51 cites.
- “Towards high performance cryptographic software“. E Nahum, S O’Malley, H Orman, R Schroeppel. 1995. hacktic.nl . 51 cites.
- “Fast elliptic curve cryptography in OpenSSL“. E Käsper. 2011. Springer … Conference on Financial Cryptography and Data …. 50 cites.
- “An elliptic curve-based signcryption scheme with forward secrecy“. M Toorani, AA Beheshti. 2010. arxiv.org arXiv preprint arXiv:1005.1856. 50 cites.
- “A primer on cryptography in communications“. SV Kartalopoulos. 2006. ieeexplore.ieee.org IEEE Communications Magazine. 50 cites.
- “An identity-based signature and its threshold version“. X Cheng, J Liu, X Wang. 2005. ieeexplore.ieee.org Advanced Information Networking …. 50 cites.
- “Implementation of elliptic curve cryptography with built-in counter measures against side channel attacks“. E Trichina, A Bellezza. 2002. Springer CHES. 50 cites.
- “Characterization of elliptic curve traces under FR-reduction“. A Miyaji, M Nakabayashi, S Takano. 2000. Springer International Conference on …. 50 cites.
- “Elliptic curve DSA (ECDSA): an enhanced DSA“. DB Johnson, AJ Menezes. 1998. usenix.org Proceedings of the 7th conference on …. 50 cites.
- “Method of privacy communication using elliptic curves“. A Miyaji, M Tatebayashi. 1994. Google Patents US Patent 5,351,297. 50 cites.
- “Fast and compact elliptic-curve cryptography.“. M Hamburg. 2012. shiftleft.org IACR Cryptology ePrint Archive. 49 cites.
- “Analysis of ecdsa authentication processing in vanets“. J Petit. 2009. ieeexplore.ieee.org New Technologies, Mobility and Security (NTMS), 2009 …. 49 cites.
- “SSL-based lightweight security of IP-based wireless sensor networks“. W Jung, S Hong, M Ha, YJ Kim…. 2009. ieeexplore.ieee.org … Workshops, 2009. WAINA …. 49 cites.
- “Improved algorithms for efficient arithmetic on elliptic curves using fast endomorphisms“. M Ciet, T Lange, F Sica, JJ Quisquater. 2003. Springer EUROCRYPT. 49 cites.
- “Security frameworks for wireless sensor networks-review“. G Sharma, S Bala, AK Verma. 2012. Elsevier Procedia Technology. 48 cites.
- “A cross-protocol attack on the TLS protocol“. N Mavrogiannopoulos, F Vercauteren…. 2012. dl.acm.org Proceedings of the …. 48 cites.
- “Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks“. O Ugus, D Westhoff, R Laue, A Shoufan…. 2009. arxiv.org arXiv preprint arXiv …. 48 cites.
- “Concurrent error detection and correction in Gaussian normal basis multiplier over GF (2^ m)“. CW Chiou, CC Chang, CY Lee…. 2009. ieeexplore.ieee.org IEEE Transactions on …. 48 cites.
- “Performance comparison of elliptic curve and rsa digital signatures“. N Jansma, B Arrendondo. 2004. nicj.net nicj. net/files. 48 cites.
- “A decentralized approach for security and privacy challenges in the internet of things“. AF Skarmeta, JL Hernandez-Ramos…. 2014. ieeexplore.ieee.org Internet of Things (WF …. 47 cites.
- “A cross-layer approach to privacy-preserving authentication in wave-enabled vanets“. S Biswas, J Mišić. 2013. ieeexplore.ieee.org IEEE Transactions on Vehicular Technology. 47 cites.
- “Shorter IBE and Signatures via Asymmetric Pairings.“. J Chen, HW Lim, S Ling, H Wang, H Wee. 2012. Springer Pairing. 47 cites.
- “Elliptic Curve Cryptography and its applications“. M Amara, A Siad. 2011. ieeexplore.ieee.org … and their Applications (WOSSPA), 2011 7th …. 47 cites.
- “An ECDSA Processor for RFID Authentication.“. M Hutter, M Feldhofer, T Plos. 2010. Springer RFIDSec. 47 cites.
- “Elliptic curve cryptography subject public key information“. S Turner, R Housley, T Polk, DRL Brown, K Yiu. 2009. tools.ietf.org . 47 cites.
- “TinyECCK: Efficient elliptic curve cryptography implementation over GF (2 m) on 8-bit Micaz mote“. SC Seo, DG Han, HC Kim, S Hong. 2008. search.ieice.org IEICE transactions on …. 47 cites.
- “Fast Bit Parallel-Shifted Polynomial Basis Multipliers in“. H Fan, MA Hasan. 2006. ieeexplore.ieee.org IEEE Transactions on Circuits and Systems I …. 47 cites.
- “Shorter verifier-local revocation group signatures from bilinear maps“. S Zhou, D Lin. 2006. Springer International Conference on Cryptology and Network …. 47 cites.
- “Secure billing for mobile information services in UMTS“. KM Martin, B Preneel, CJ Mitchell, HJ Hitz…. 1998. Springer … on Intelligence in …. 47 cites.
- “Efficient computation of full Lucas sequences“. M Joye, JJ Quisquater. 1996. ieeexplore.ieee.org Electronics Letters. 47 cites.
- “Accelerating signature-based broadcast authentication for wireless sensor networks“. X Fan, G Gong. 2012. Elsevier Ad Hoc Networks. 46 cites.
- “PKC based broadcast authentication using signature amortization for WSNs“. Y Liu, J Li, M Guizani. 2012. ieeexplore.ieee.org IEEE Transactions on Wireless …. 46 cites.
- “Generic implementations of elliptic curve cryptography using partial reduction“. N Gura, H Eberle, E Goupy. 2011. Google Patents US Patent 7,930,335. 46 cites.
- “Efficient implementation of elliptic curve cryptography in wireless sensors.“. DF Aranha, R Dahab, J López…. 2010. homepages.dcc.ufmg.br Adv. in Math. of …. 46 cites.
- “Hash functions using chaotic iterations“. JM Bahi, C Guyeux. 2010. journals.sagepub.com Journal of Algorithms & Computational …. 46 cites.
- “An electronic voting protocol with deniable authentication for mobile ad hoc networks“. CT Li, MS Hwang, CY Liu. 2008. Elsevier Computer Communications. 46 cites.
- “Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems“. E De Mulder, SB Örs, B Preneel…. 2007. Elsevier Computers & Electrical …. 46 cites.
- “Power consumption evaluation of efficient digital signature schemes for low power devices“. S Seys, B Preneel. 2005. ieeexplore.ieee.org Wireless And Mobile Computing …. 46 cites.
- “Architectural extensions for elliptic curve cryptography over gf (2/sup m/) on 8-bit microprocessors“. H Eberle, A Wander, N Gura…. 2005. ieeexplore.ieee.org … , 2005. ASAP 2005 …. 46 cites.
- “Projective coordinates leak“. D Naccache, NP Smart, J Stern. 2004. Springer EUROCRYPT. 46 cites.
- “Simple power analysis of unified code for ECC double and add“. CD Walter. 2004. Springer Lecture notes in computer science. 46 cites.
- “Speeding up the arithmetic on Koblitz curves of genus two“. C Gunther, T Lange, A Stein. 2000. Springer Selected Areas in Cryptography. 46 cites.
- “ERAP: ECC based RFID authentication protocol“. SI Ahamed, F Rahman, E Hoque. 2008. ieeexplore.ieee.org Future Trends of Distributed …. 45 cites.
- “Perspectives for cryptographic long-term security“. J Buchmann, A May, U Vollmer. 2006. dl.acm.org Communications of the ACM. 45 cites.
- “Implementation options for finite field arithmetic for elliptic curve cryptosystems“. C Paar. 1999. … -a-1802744773732722657-s-sites … … at the 3rd Workshop on Elliptic Curve …. 45 cites.
- “Overview of elliptic curve cryptography“. K Araki, T Satoh, S Miura. 1998. Springer International Workshop on Public Key …. 45 cites.
- “Flexible hardware processor for elliptic curve cryptography over NIST prime fields“. K Ananyi, H Alrimeih…. 2009. ieeexplore.ieee.org IEEE transactions on very …. 44 cites.
- “Hardware accelerator for elliptic curve cryptography“. H Eberle, N Gura, D Finchelstein…. 2009. Google Patents US Patent …. 44 cites.
- “A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications“. PE Abi-Char, A Mhamed…. 2007. ieeexplore.ieee.org Next Generation Mobile …. 44 cites.
- “An efficient identity-based signature scheme with batch verifications“. S Cui, P Duan, CW Chan. 2006. dl.acm.org … of the 1st international conference on …. 44 cites.
- “A comparison of different finite fields for elliptic curve cryptosystems“. NP Smart. 2001. Elsevier Computers & Mathematics with Applications. 44 cites.
- “Selecting elliptic curves for cryptography: an efficiency and security analysis“. JW Bos, C Costello, P Longa, M Naehrig. 2016. Springer Journal of Cryptographic …. 43 cites.
- “A survey of the elliptic curve integrated encryption scheme“. VG Martínez, LH Encinas, CS Ávila. 2010. sites.google.com ratio. 43 cites.
- “Cryptanalysis of an elliptic curve-based signcryption scheme“. M Toorani, AA Beheshti. 2010. arxiv.org arXiv preprint arXiv:1004.3521. 43 cites.
- “A ring signature scheme using bilinear pairings“. J Xu, Z Zhang, D Feng. 2004. Springer International Workshop on Information Security …. 43 cites.
- “ID-based proxy blind signature“. Z Dong, H Zheng, K Chen, W Kou. 2004. ieeexplore.ieee.org … Information Networking and …. 43 cites.
- “Elliptic curve encryption systems“. SA Vanstone, RC Mullin, GB Agnew. 2003. Google Patents US Patent 6,618,483. 43 cites.
- “On multi-exponentiation in cryptography.“. RM Avanzi. 2002. eprint.iacr.org IACR Cryptology EPrint Archive. 43 cites.
- “Horizontal collision correlation attack on elliptic curves“. A Bauer, E Jaulmes, E Prouff, JR Reinhard…. 2015. Springer Cryptography and …. 42 cites.
- “Hybrid binary-ternary number system for elliptic curve cryptosystems“. J Adikari, VS Dimitrov, L Imbert. 2011. ieeexplore.ieee.org IEEE transactions on …. 42 cites.
- “Secure aircraft communications addressing and reporting system (ACARS)“. A Roy. 2004. Google Patents US Patent 6,677,888. 42 cites.
- “An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem“. Z Zhao. 2014. Springer Journal of medical systems. 41 cites.
- “Comparison of innovative signature algorithms for WSNs“. B Driessen, A Poschmann, C Paar. 2008. dl.acm.org … of the first ACM conference on …. 41 cites.
- “High Speed Compact Elliptic Curve Cryptoprocessor for FPGA Platforms.“. C Rebeiro, D Mukhopadhyay. 2008. Springer Indocrypt. 41 cites.
- “A proposal of short proxy signature using pairing“. T Okamoto, A Inomata…. 2005. ieeexplore.ieee.org … Technology: Coding and …. 41 cites.
- “Fast Elliptic Curve Point Multiplication using Double-Base Chains.“. VS Dimitrov, L Imbert, PK Mishra. 2005. eprint.iacr.org IACR Cryptology ePrint Archive. 41 cites.
- “Elliptic Curve Arithmetic“. D Hankerson, S Vanstone, A Menezes. 2004. Springer Guide to Elliptic Curve …. 41 cites.
- “Power signature attack resistant cryptography“. SA Vanstone, RP Gallant. 2004. Google Patents US Patent 6,738,478. 41 cites.
- “On a framework for energy-efficient security protocols in wireless networks“. P Prasithsangaree, P Krishnamurthy. 2004. Elsevier Computer Communications. 41 cites.
- “Architectures for unified field inversion with applications in elliptic curve cryptography“. E Savas, CK Koc. 2002. ieeexplore.ieee.org Electronics, Circuits and Systems, 2002. 9th …. 41 cites.
- “Compact encoding of non-adjacent forms with applications to elliptic curve cryptography“. M Joye, C Tymen. 2001. Springer Public Key Cryptography. 41 cites.
- “Lightweight IKEv2: a key management solution for both the compressed IPsec and the IEEE 802.15. 4 security“. S Raza, T Voigt, V Jutvik. 2012. lix.polytechnique.fr Proceedings of the IETF workshop on …. 40 cites.
- “Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings.“. L Batina, JH Hoepman, B Jacobs, W Mostowski…. 2010. Springer CARDIS. 40 cites.
- “Software Implementations of Elliptic Curve Cryptography.“. ZJ Shi, H Yun. 2008. ijns.femto.com.tw IJ Network Security. 40 cites.
- “TLS Elliptic Curve Cipher Suites with SHA-256/384 and AES Galois Counter Mode (GCM)“. E Rescorla. 2008. tools.ietf.org . 40 cites.
- “Elliptic curve scalar multiplication algorithm using complementary recoding“. P Balasubramaniam, E Karthikeyan. 2007. Elsevier Applied mathematics and …. 40 cites.
- “WM-ECC: an elliptic curve cryptography suite on sensor motes“. H Wang, B Sheng, CC Tan, Q Li. 2007. cis.csuohio.edu … , VA, Tech. Rep. WM-CS-2007-11. 40 cites.
- “Concurrent blind signatures without random oracles“. A Kiayias, HS Zhou. 2006. Springer SCN. 40 cites.
- “Efficient multiplication in GF (p/sup k/) for elliptic curve cryptography“. JC Bajard, L Imbert, C Negre…. 2003. ieeexplore.ieee.org … , 2003. Proceedings. 16th …. 40 cites.
- “Fast hashing onto elliptic curves over fields of characteristic 3.“. PSLM Barreto, HY Kim. 2001. eprint.iacr.org IACR Cryptology ePrint Archive. 40 cites.
- “Method of elliptic curve cryptographic digital signature generation and verification using reduced base tau expansion in non-adjacent form“. RW Reiter, JA Solinas. 2001. Google Patents US Patent 6,243,467. 40 cites.
- “The fault attack jungle-a classification model to guide you“. I Verbauwhede, D Karaklajic…. 2011. ieeexplore.ieee.org Fault Diagnosis and …. 39 cites.
- “Secure-TWS: Authenticating node to multi-user communication in shared sensor networks“. LB Oliveira, A Kansal, CPL Gouvêa…. 2011. academic.oup.com The Computer …. 39 cites.
- “Optimized FPGA-based elliptic curve cryptography processor for high-speed applications“. K Järvinen. 2011. Elsevier INTEGRATION, the VLSI journal. 39 cites.
- “Fast Elliptic-Curve Cryptography on the Cell Broadband Engine.“. N Costigan, P Schwabe. 2009. Springer Africacrypt. 39 cites.
- “Software Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 Microcontroller.“. CPL Gouvêa, J López. 2009. Springer Indocrypt. 39 cites.
- “An efficient mobile voting system security scheme based on elliptic curve cryptography“. T Ahmad, J Hu, S Han. 2009. ieeexplore.ieee.org … and System Security, 2009. NSS’09 …. 39 cites.
- “Boneh-Boyen signatures and the strong Diffie-Hellman problem“. D Jao, K Yoshida. 2009. Springer Pairing-Based Cryptography–Pairing 2009. 39 cites.
- “Implementation of elliptic-curve cryptography on mobile healthcare devices“. K Malhotra, S Gardner, R Patz. 2007. ieeexplore.ieee.org Networking, Sensing and …. 39 cites.
- “An efficient certificateless signature from pairings“. C Wang, H Huang. 2007. ieeexplore.ieee.org Data, Privacy, and E-Commerce, 2007 …. 39 cites.
- “Signal authentication and integrity schemes for next generation global navigation satellite systems“. C Wullems, O Pozzobon, K Kubik. 2005. eprints.qut.edu.au Proceedings of the European …. 39 cites.
- “Reconfigurable instruction set extension for enabling ECC on an 8-bit processor“. S Kumar, C Paar. 2004. Springer International Conference on Field Programmable Logic …. 39 cites.
- “Efficient countermeasures against power analysis for elliptic curve cryptosystems“. K Itoh, T Izu, M Takenaka. 2004. Springer … Card Research and Advanced Applications VI. 39 cites.
- “Generic implementations of elliptic curve cryptography using partial reduction“. N Gura, H Eberle, SC Shantz. 2002. dl.acm.org Proceedings of the 9th ACM conference …. 39 cites.
- “Cryptographic elliptic curve apparatus and method“. R Schroeppel. 2002. Google Patents US Patent 6,490,352. 39 cites.
- “A Study on the Proposed Korean Digital Signature Algorithm.“. CH Lim, PJ Lee. 1998. Springer Asiacrypt. 39 cites.
- “Deterministic usage of the digital signature algorithm (DSA) and elliptic curve digital signature algorithm (ECDSA)“. T Pornin. 2013. tools.ietf.org . 38 cites.
- “An efficient identity-based blind signature scheme without bilinear pairings“. D He, J Chen, R Zhang. 2011. Elsevier Computers & Electrical Engineering. 38 cites.
- “Fast and Regular Algorithms for Scalar Multiplication over Elliptic Curves.“. M Rivain. 2011. eprint.iacr.org IACR Cryptology ePrint Archive. 38 cites.
- “Atomicity improvement for elliptic curve scalar multiplication“. C Giraud, V Verneuil. 2010. Springer International Conference on Smart Card Research …. 38 cites.
- “Faster interleaved modular multiplication based on Barrett and Montgomery reduction methods“. M Knezevic, F Vercauteren…. 2010. ieeexplore.ieee.org IEEE Transactions on …. 38 cites.
- “Finite field arithmetic for cryptography“. E Savas, ÇK Koç. 2010. ieeexplore.ieee.org IEEE Circuits and Systems Magazine. 38 cites.
- “A highly efficient cipher processor for dual-field elliptic curve cryptography“. JY Lai, CT Huang. 2009. ieeexplore.ieee.org IEEE Transactions on Circuits and Systems …. 38 cites.
- “Applicability of public key infrastructures in wireless sensor networks“. R Roman, C Alcaraz. 2007. Springer EuroPKI. 38 cites.
- “A new signature scheme without random oracles from bilinear pairings“. F Zhang, X Chen, W Susilo, Y Mu. 2006. Springer Progress in Cryptology-VIETCRYPT …. 38 cites.
- “Tripartite concurrent signatures“. W Susilo, Y Mu. 2005. Springer Security and Privacy in the Age of Ubiquitous …. 38 cites.
- “Linear recursive sequences over elliptic curves“. G Gong, CCY Lam. 2002. Springer Sequences and their Applications. 38 cites.
- “Fast VLSI arithmetic algorithms for high-security elliptic curve cryptographic applications“. S Moon, J Park, Y Lee. 2001. ieeexplore.ieee.org IEEE Transactions on Consumer …. 38 cites.
- “Elliptic curve arithmetic using SIMD“. K Aoki, F Hoshino, T Kobayashi, H Oguro. 2001. Springer Information Security. 38 cites.
- “Elliptic curve cryptography support in entrust“. R Zuccherato. 2000. ww.spi1.nisu.org Entrust ltd. in Canada, Dated. 38 cites.
- “Elliptic curve cryptosystems [J]“. XUQ Liang, LI Da Xing. 1999. en.cnki.com.cn Journal of Computer Research and …. 38 cites.
- “A message recovery signature scheme equivalent to DSA over elliptic curves“. A Miyaji. 1996. Springer Advances in Cryptology—ASIACRYPT’96. 38 cites.
- “Ecc over rsa for asymmetric encryption: A review“. K Gupta, S Silakari. 2011. pdfs.semanticscholar.org IJCSI International Journal of …. 37 cites.
- “A fault attack on ECDSA“. JM Schmidt, M Medwed. 2009. ieeexplore.ieee.org Fault Diagnosis and Tolerance in …. 37 cites.
- “Fast hash-based signatures on constrained devices“. S Rohde, T Eisenbarth, E Dahmen, J Buchmann…. 2008. Springer CARDIS. 37 cites.
- “Another look at generic groups“. N Koblitz, A Menezes. 2007. eprint.iacr.org Advances in Mathematics of Communications. 37 cites.
- “Power aware design of an elliptic curve coprocessor for 8 bit platforms“. G Bertoni, L Breveglieri…. 2006. ieeexplore.ieee.org Pervasive Computing and …. 37 cites.
- “A secure m-payment protocol for mobile devices“. MR Hashemi, E Soroush. 2006. ieeexplore.ieee.org Electrical and Computer …. 37 cites.
- “A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography“. SA Chaudhry, MS Farash, H Naqvi, M Sher. 2016. Springer Electronic Commerce …. 36 cites.
- “Suite B profile for transport layer security (TLS)“. M Salter, R Housley. 2012. rfc-editor.org . 36 cites.
- “On the joint security of encryption and signature in EMV“. JP Degabriele, A Lehmann, KG Paterson…. 2012. Springer Cryptographers’ Track at …. 36 cites.
- “Efficient software implementation of public-key cryptography on sensor networks using the MSP430X microcontroller“. CPL Gouvêa, LB Oliveira, J López. 2012. Springer Journal of Cryptographic Engineering. 36 cites.
- “A compact FPGA-based architecture for elliptic curve cryptography over prime fields“. J Vliegen, N Mentens, J Genoe…. 2010. ieeexplore.ieee.org … (ASAP), 2010 21st …. 36 cites.
- “A milestone towards RFID products offering asymmetric authentication based on elliptic curve cryptography“. H Bock, M Braun, M Dichtl, E Hess…. 2008. pdfs.semanticscholar.org Invited talk at …. 36 cites.
- “Elliptic curve cryptography based wireless authentication protocol“. L Yongliang, W Gao, H Yao, X Yu. 2007. academia.edu International Journal of Network …. 36 cites.
- “High performance elliptic curve cryptographic co-processor“. J Lutz, MA Hasan. 2007. Springer Wireless Network Security. 36 cites.
- “Fast batch verification of multiple signatures“. J Cheon, J Yi. 2007. Springer Public Key Cryptography–PKC 2007. 36 cites.
- “Fast elliptic scalar multiplication using new double-base chain and point halving“. KW Wong, ECW Lee, LM Cheng, X Liao. 2006. Elsevier Applied Mathematics and …. 36 cites.
- “Using group signatures for identity management and its implementation“. T Isshiki, K Mori, K Sako, I Teranishi…. 2006. dl.acm.org Proceedings of the …. 36 cites.
- “Electronic signatures for long-lasting storage purposes in electronic archives“. P Pharow, B Blobel. 2005. Elsevier International Journal of Medical Informatics. 36 cites.
- “Digital signature and blind signature based on elliptic curve“. F Zhang, C Wang, Y Wang. 2001. en.cnki.com.cn JOURNAL-CHINA INSTITUTE OF …. 36 cites.
- “Elliptic curve cryptosystems“. M Saeki. 1997. ai2-s2-pdfs.s3.amazonaws.com . 36 cites.
- “Energy-adaptive dual-field processor for high-performance elliptic curve cryptographic applications“. JY Lai, CT Huang. 2011. ieeexplore.ieee.org IEEE Transactions on very large scale …. 35 cites.
- “A new digital signature scheme based on factoring and discrete logarithms“. ES Ismail, NMF Tahat…. 2008. pdfs.semanticscholar.org Journal of mathematics …. 35 cites.
- “Self-certified signature scheme from pairings“. Z Shao. 2007. Elsevier Journal of Systems and Software. 35 cites.
- “A survey of public-key cryptography on J2ME-enabled mobile devices“. S Tillich, J Großschädl. 2004. Springer Computer and Information Sciences-ISCIS 2004. 35 cites.
- “Using primitive subgroups to do more with fewer bits“. K Rubin, A Silverberg. 2004. Springer ANTS. 35 cites.
- “On Montgomery-like representations for elliptic curves over GF (2k)“. M Stam. 2003. Springer International Workshop on Public Key Cryptography. 35 cites.
- “The Security of DSA and ECDSA“. S Vaudenay. 2003. Springer International Workshop on Public Key Cryptography. 35 cites.
- “Genus two hyperelliptic curve coprocessor“. N Boston, T Clancy, Y Liow, J Webster. 2002. Springer CHES. 35 cites.
- “Fast simultaneous scalar multiplication on elliptic curve with Montgomery form“. T Akishita. 2001. Springer Selected Areas in Cryptography. 35 cites.
- “Masked digital signatures“. DB Johnson, SA Vanstone, M Qu. 2001. Google Patents US Patent 6,279,110. 35 cites.
- “Elliptic curve cryptography on smart cards“. H Pietiläinen. 2000. laurikari.net M. Sc., Helsinki Univ. of Technology. 35 cites.
- “Encryption of data using elliptic curve over finite fields“. DS Kumar, CH Suneetha, A Chandrasekhar. 2012. arxiv.org arXiv preprint arXiv …. 34 cites.
- “Dynamic group signature with forward security and its application“. X Zhou, X Yang, P Wei, Y Hu. 2007. ieeexplore.ieee.org Grid and Cooperative Computing …. 34 cites.
- “Elliptic curve cryptography for constrained devices“. SS Kumar. 2006. emsec.rub.de . 34 cites.
- “Design of flexible GF (2/sup m/) elliptic curve cryptography processors“. M Benaissa, WM Lim. 2006. ieeexplore.ieee.org IEEE Transactions on Very Large Scale …. 34 cites.
- “A low-cost ECC coprocessor for smartcards“. H Aigner, H Bock, M Hütter, J Wolkerstorfer. 2004. Springer International Workshop on …. 34 cites.
- “Elliptic curve public-key cryptosystems—an introduction“. E De Win, B Preneel. 1998. Springer State of the Art in Applied Cryptography. 34 cites.
- “Hash function requirements for Schnorr signatures“. G Neven, NP Smart, B Warinschi. 2009. degruyter.com Journal of Mathematical …. 33 cites.
- “On a class of pseudorandom sequences from elliptic curves over finite fields“. H Hu, L Hu, D Feng. 2007. ieeexplore.ieee.org IEEE Transactions on Information Theory. 33 cites.
- “C4W: an energy efficient public key cryptosystem for large-scale wireless sensor networks“. Q Jing, J Hu, Z Chen. 2006. ieeexplore.ieee.org Mobile Adhoc and Sensor Systems …. 33 cites.
- “Packet level authentication in military networks“. C Candolin, J Lundberg, H Kari. 2005. users.ics.aalto.fi Proceedings of the 6th Australian …. 33 cites.
- “Performance evaluation of public-key cryptosystem operations in WTLS protocol“. A Levi, E Savas. 2003. ieeexplore.ieee.org … 2003.(ISCC 2003). Proceedings. Eighth IEEE …. 33 cites.
- “An efficient ID-based group signature scheme“. C Popescu. 2002. pdfs.semanticscholar.org Studia Univ. Babes-Bolyai, Informatica. 33 cites.
- “Fast algorithms for elliptic curve cryptosystems over binary finite field“. Y Han, PC Leong, PC Tan, J Zhang. 1999. Springer ASIACRYPT. 33 cites.
- “Sp 800-90a. recommendation for random number generation using deterministic random bit generators“. EB Barker, JM Kelsey. 2012. dl.acm.org . 32 cites.
- “Fundamental elliptic curve cryptography algorithms“. DA McGrew. 2011. tools.ietf.org . 32 cites.
- “A survey on elliptic curve cryptography for pervasive computing environment“. V Katiyar, K Dutta, S Gupta. 2010. pdfs.semanticscholar.org International Journal of …. 32 cites.
- “Efficient mapping methods for elliptic curve cryptosystems“. OS Rao, SP Setty. 2010. International Journal of Engineering Science and …. 32 cites.
- “Efficient utilization of elliptic curve cryptosystem for hierarchical access control“. M Nikooghadam, A Zakerolhosseini…. 2010. Elsevier Journal of Systems and …. 32 cites.
- “A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks.“. D Galindo, R Roman, J Lopez. 2008. Springer CANS. 32 cites.
- “An efficient ID-based proxy signature scheme from pairings“. C Gu, Y Zhu. 2007. Springer International Conference on Information Security and …. 32 cites.
- “Computing method for elliptic curve cryptography“. E Knudsen. 2006. Google Patents US Patent 7,079,650. 32 cites.
- “Mobile IP and WLAN with AAA authentication protocol using identity-based cryptography“. BG Lee, DH Choi, HG Kim, SW Sohn…. 2003. ieeexplore.ieee.org … , 2003. ICT 2003. 10th …. 32 cites.
- “Efficient elliptic curve processor architectures for field programmable logic“. G Orlando. 2002. emsec.ruhr-uni-bochum.de . 32 cites.
- “Method and system for point multiplication in elliptic curve cryptosystem“. C Paar, J Guajardo. 2001. Google Patents US Patent 6,252,959. 32 cites.
- “Two topics in hyperelliptic cryptography“. F Hess, G Seroussi, NP Smart. 2001. Springer International Workshop on Selected Areas …. 32 cites.
- “A comparison of practical public-key cryptosystems based on integer factorization and discrete logarithms“. PC van Oorschot. 1990. Springer Conference on the Theory and Application of …. 32 cites.
- “Efficient Elliptic-Curve Cryptography Using Curve25519 on Reconfigurable Devices.“. P Sasdrich, T Güneysu. 2014. Springer ARC. 31 cites.
- “Low-latency digit-serial and digit-parallel systolic multipliers for large binary extension fields“. JS Pan, CY Lee, PK Meher. 2013. ieeexplore.ieee.org … on Circuits and Systems I: Regular …. 31 cites.
- “End-to-end security for sleepy smart object networks“. M Sethi, J Arkko, A Keränen. 2012. ieeexplore.ieee.org Local Computer Networks …. 31 cites.
- “Expander graphs based on GRH with an application to elliptic curve cryptography“. D Jao, SD Miller, R Venkatesan. 2009. Elsevier Journal of Number Theory. 31 cites.
- “Cryptanalysis of an efficient signcryption scheme with forward secrecy based on elliptic curve“. M Toorani, A Beheshti. 2008. ieeexplore.ieee.org Computer and Electrical Engineering …. 31 cites.
- “Implementation of ECC/ECDSA cryptography algorithms based on Java card“. JH Han, YJ Kim, SI Jun, KI Chung…. 2002. ieeexplore.ieee.org Distributed Computing …. 31 cites.
- “An efficient implementation of the digital signature algorithm“. P Kitsos, N Sklavos…. 2002. ieeexplore.ieee.org Electronics, Circuits and …. 31 cites.
- “Implementing network security protocols based on elliptic curve cryptography“. M Aydos, E Savas, CK Koc. 1999. academia.edu Proceedings of the fourth symposium on …. 31 cites.
- “Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography.“. N Tirthani, R Ganesan. 2014. academia.edu IACR Cryptology ePrint Archive. 30 cites.
- “Enhanced security architecture for cloud data security“. DC Kant, Y Sharma. 2013. pdfs.semanticscholar.org International Journal of advanced …. 30 cites.
- “Fast mapping method based on matrix approach for elliptic curve cryptography“. F Amounas, EH El Kinani. 2012. search.proquest.com International Journal of Information …. 30 cites.
- “Message authentication in vehicular ad hoc networks: Ecdsa based approach“. SS Manvi, MS Kakkasageri…. 2009. ieeexplore.ieee.org Future Computer and …. 30 cites.
- “Fast Arithmetic on ATmega128 for Elliptic Curve Cryptography.“. A Kargl, S Pyka, H Seuschek. 2008. pdfs.semanticscholar.org IACR Cryptology ePrint …. 30 cites.
- “IKE and IKEv2 authentication using the elliptic curve digital signature algorithm (ECDSA)“. DE Fu, JA Solinas. 2007. tools.ietf.org . 30 cites.
- “Cryptographic protocols on real hyperelliptic curves“. MJ Jacobson Jr, R Scheidler, A Stein. 2007. Citeseer Advances in Mathematics of …. 30 cites.
- “On the elliptic curve digital signature algorithm“. HZ Liao, YY Shen. 2006. pdfs.semanticscholar.org Tunghai Science. 30 cites.
- “ECGSC: elliptic curve based generalized signcryption“. Y Han, X Yang, P Wei, Y Wang, Y Hu. 2006. Springer International Conference on …. 30 cites.
- “Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves“. MA Strangio. 2005. dl.acm.org Proceedings of the 2005 ACM symposium on Applied …. 30 cites.
- “A public key cryptosystem based on elliptic curves over ℤ/n ℤ equivalent to factoring“. B Meyer, V Müller. 1996. Springer Advances in Cryptology—EUROCRYPT’96. 30 cites.
- “Fast prime field elliptic-curve cryptography with 256-bit primes“. S Gueron, V Krasnov. 2015. Springer Journal of Cryptographic Engineering. 29 cites.
- “Just a Little Bit More.“. J Van de Pol, NP Smart, Y Yarom. 2015. ai2-s2-pdfs.s3.amazonaws.com CT-RSA. 29 cites.
- “FPGA implementations of elliptic curve cryptography and Tate pairing over a binary field“. H Li, J Huang, P Sweany, D Huang. 2008. Elsevier Journal of Systems Architecture. 29 cites.
- “Fast multivariate signature generation in hardware: The case of rainbow“. S Balasubramanian, HW Carter…. 2008. ieeexplore.ieee.org … , 2008. ASAP 2008 …. 29 cites.
- “Additional Diffie-Hellman groups for use with IETF standards“. M Lepinski, S Kent. 2008. buildbot.tools.ietf.org . 29 cites.
- “Studying software implementations of elliptic curve cryptography“. H Yan, ZJ Shi. 2006. ieeexplore.ieee.org … : New Generations, 2006. ITNG 2006. Third …. 29 cites.
- “Soft input decryption“. C Ruland, N Zivic. 2006. ieeexplore.ieee.org … Topics; 6th International ITG-Conference on …. 29 cites.
- “A secure digital signature algorithm based on elliptic curve and chaotic mappings“. P Fei, Q Shui-Sheng, L Min. 2005. Springer Circuits, systems, and signal processing. 29 cites.
- “Authenticated Diffie–Hellman key agreement protocol using a single cryptographic assumption“. L Harn, WJ Hsin, M Mehta. 2005. IET IEE Proceedings-Communications. 29 cites.
- “Identity-based confirmer signatures from pairings over elliptic curves“. S Han, WKY Yeung, J Wang. 2003. dl.acm.org Proceedings of the 4th ACM conference …. 29 cites.
- “Elliptic curve cryptography and its applications to mobile devices“. W Chou, DL Washington. 2003. academia.edu University of Maryland, College Park, USA. 29 cites.
- “Implementation of elliptic curve cryptosystems on a reconfigurable computer“. N Nguyen, K Gaj, D Caliga…. 2003. ieeexplore.ieee.org … Technology (FPT), 2003 …. 29 cites.
- “Smooth orders and cryptographic applications“. C Pomerance, IE Shparlinski. 2002. Springer Lecture notes in computer science. 29 cites.
- “Efficient algorithm and architecture for elliptic curve cryptography for extremely constrained secure applications“. R Azarderakhsh, KU Jarvinen…. 2014. ieeexplore.ieee.org IEEE Transactions on …. 28 cites.
- “Cryptanalysis of a certificateless signature scheme without pairings“. M Tian, L Huang. 2013. Wiley Online Library International Journal of Communication …. 28 cites.
- “Faster implementation of scalar multiplication on Koblitz curves“. D Aranha, A Faz-Hernández, J López…. 2012. Springer Progress in Cryptology …. 28 cites.
- “based Document Authentication using Digital Signature and QR Code“. M Warasart, P Kuacharoen. 2012. pdfs.semanticscholar.org . 28 cites.
- “Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware Implementations.“. E Wenger, M Hutter. 2011. Springer NordSec. 28 cites.
- “High Performance Elliptic Curve Cryptographic Processor Over GF (2^ 163)“. HM Choi, CP Hong, CH Kim. 2008. ieeexplore.ieee.org Electronic Design, Test and …. 28 cites.
- “Signcryption based on elliptic curve and its multi-party schemes“. Y Han, X Yang, Y Hu. 2004. dl.acm.org Proceedings of the 3rd international conference …. 28 cites.
- “Implementing an efficient elliptic curve cryptosystem over on a smart card“. Y Hitchcock, E Dawson, A Clark…. 2003. journal.austms.org.au ANZIAM Journal. 28 cites.
- “Fast elliptic curve multiplications with SIMD operations“. T Izu, T Takagi. 2002. Springer ICICS. 28 cites.
- “Fast generation of pairs (k,[k] P) for Koblitz elliptic curves“. JS Coron, D M’Raïhi, C Tymen. 2001. Springer Selected Areas in Cryptography. 28 cites.
- “Fast normal basis multiplication using general purpose processors“. A Reyhani-Masoleh, MA Hasan. 2001. Springer International Workshop on Selected …. 28 cites.
- “A comparative survey of symmetric and asymmetric key cryptography“. S Chandra, S Paira, SS Alam…. 2014. ieeexplore.ieee.org Electronics …. 27 cites.
- “Providing hop-by-hop authentication and source privacy in wireless sensor networks“. Y Li, J Li, J Ren, J Wu. 2012. ieeexplore.ieee.org INFOCOM, 2012 Proceedings IEEE. 27 cites.
- “Sanitizable signatures in XML signature—performance, mixing properties, and revisiting the property of transparency“. H Pöhls, K Samelin, J Posegga. 2011. Springer Applied Cryptography and Network …. 27 cites.
- “A pairing-based publicly verifiable secret sharing scheme“. TY Wu, YM Tseng. 2011. Springer Journal of systems science and complexity. 27 cites.
- “Java implementation for pairing-based cryptosystems“. SY Tan, SH Heng, BM Goi. 2010. Springer … Science and Its Applications–ICCSA 2010. 27 cites.
- “A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems.“. S Moon. 2006. ijns.femto.com.tw IJ Network Security. 27 cites.
- “The equivalence between the DHP and DLP for elliptic curves used in practical applications“. A Muzereau, NP Smart, F Vercauteren. 2004. cambridge.org LMS Journal of Computation …. 27 cites.
- “A Provably Secure Nyberg-Rueppel Signature Variant with Applications.“. G Ateniese, B de Medeiros. 2004. pdfs.semanticscholar.org IACR Cryptology ePrint …. 27 cites.
- “A workload characterization of elliptic curve cryptography methods in embedded environments“. I Branovic, R Giorgi, E Martinelli. 2003. dl.acm.org ACM SIGARCH Computer Architecture …. 27 cites.
- “Introduction to elliptic curve cryptography“. E Oswald. 2002. cgi.di.uoa.gr Institute for Applied Information Processing and …. 27 cites.
- “Fast multi-scalar multiplication methods on elliptic curves with precomputation strategy using Montgomery trick“. K Okeya, K Sakurai. 2002. Springer CHES. 27 cites.
- “The elliptic curve digital signature algorithm“. D Johson, A Menezes. 1999. Certicom Research, Canada. http://www. certicom. com …. 27 cites.
- “Ed448-Goldilocks, a new elliptic curve.“. M Hamburg. 2015. eprint.iacr.org IACR Cryptology ePrint Archive. 26 cites.
- “Engineering a secure mobile messaging framework“. A Castiglione, G Cattaneo, M Cembalo, A De Santis…. 2012. Elsevier Computers & …. 26 cites.
- “Efficient implementation of elliptic curve cryptography using low-power digital signal processor“. MY Malik. 2010. ieeexplore.ieee.org … Communication Technology (ICACT), 2010 The 12th …. 26 cites.
- “Exploring signature schemes with subliminal channel“. F Zhang, B Lee, K Kim. 2003. caislab.kaist.ac.kr Symposium on Cryptography and …. 26 cites.
- “A software library for elliptic curve cryptography“. E Konstantinou, Y Stamatiou, C Zaroliagis. 2002. Springer Algorithms—ESA 2002. 26 cites.
- “An identification scheme based on the elliptic curve discrete logarithm problem“. C Popescu. 2000. ieeexplore.ieee.org High Performance Computing in the Asia-Pacific …. 26 cites.
- “Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings“. SH Islam, GP Biswas. 2013. Elsevier Journal of King Saud University-Computer and …. 25 cites.
- “A review on elliptic curve cryptography for embedded systems“. R Afreen, SC Mehrotra. 2011. arxiv.org arXiv preprint arXiv:1107.3631. 25 cites.
- “ECC-based biometric signature: A new approach in electronic banking security“. S Mohammadi, S Abedi. 2008. ieeexplore.ieee.org Electronic Commerce and Security …. 25 cites.
- “An efficient identity-based short signature scheme from bilinear pairings“. H Du, Q Wen. 2007. ieeexplore.ieee.org … and Security, 2007 International Conference on. 25 cites.
- “Algorithms and approaches of proxy signature: A survey“. ML Das, A Saxena, DB Phatak. 2006. arxiv.org arXiv preprint cs/0612098. 25 cites.
- “Fast elliptic curve multiplications resistant against side channel attacks“. T Izu, T Takagi. 2005. search.ieice.org IEICE Transactions on Fundamentals of …. 25 cites.
- “On the hardware design of an elliptic curve cryptosystem“. M Morales-Sandoval…. 2004. ieeexplore.ieee.org Computer Science, 2004 …. 25 cites.
- “A performance evaluation of ARM ISA extension for elliptic curve cryptography over binary finite fields“. S Bartolini, I Branovic, R Giorgi…. 2004. ieeexplore.ieee.org … Architecture and High …. 25 cites.
- “Research on the authenticated key agreement protocol based on elliptic curve cryptography“. A SUI, Y YANG, X NIU, S LUO. 2004. en.cnki.com.cn … of Beijing University of Posts and …. 25 cites.
- “An FPGA elliptic curve cryptographic accelerator over GF (p)“. C McIvor, M McLoone, JV McCanny. 2004. IET . 25 cites.
- “Elliptic curve generating method and device, elliptic encryption system and recording medium“. K Okeya. 2004. Google Patents US Patent 6,816,594. 25 cites.
- “Efficient implementation of NIST-compliant elliptic curve cryptography for 8-bit AVR-based sensor nodes“. Z Liu, H Seo, J Großschädl…. 2016. ieeexplore.ieee.org IEEE Transactions on …. 24 cites.
- “Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography“. SKH Islam, GP Biswas. 2013. Taylor & Francis International Journal of Computer …. 24 cites.
- “A Survey on digital signatures and its applications“. A Roy, S Karforma. 2012. researchgate.net Journal of Computer and Information …. 24 cites.
- “Secure hierarchical data aggregation in wireless sensor networks: Performance evaluation and analysis“. V Kumar, SK Madria. 2012. ieeexplore.ieee.org Mobile Data Management (MDM), 2012 …. 24 cites.
- “MicroECC: A lightweight reconfigurable elliptic curve crypto-processor“. M Varchola, T Guneysu…. 2011. ieeexplore.ieee.org … Computing and FPGAs …. 24 cites.
- “Enhancing security system of short message service for m-commerce in gsm“. N Saxena, A Payal. 2011. academia.edu International Journal of Computer Science & …. 24 cites.
- “Securing RDS broadcast messages for smart grid applications“. M Kgwadi, T Kunz. 2011. inderscienceonline.com International Journal of Autonomous …. 24 cites.
- “Improving e-payment security using Elliptic Curve Cryptosystem“. OR Vincent, O Folorunso, AD Akinde. 2010. Springer Electronic Commerce Research. 24 cites.
- “Using SHA2 Algorithms with Cryptographic Message Syntax“. S Turner. 2010. tools.ietf.org . 24 cites.
- “Elliptic-Curve Algorithm Integration in the Secure Shell Transport Layer“. D Stebila, J Green. 2009. tools.ietf.org . 24 cites.
- “Mapping an Arbritrary Message to an Elliptic Curve When Defined over GF (2^ n).“. B King. 2009. ijns.femto.com.tw IJ Network Security. 24 cites.
- “Issues in elliptic curve cryptography implementation“. MW Paryasto, SS Kuspriyanto…. 2009. internetworkingindonesia.org Internetworking …. 24 cites.
- “An FPGA implementation of the NTRUEncrypt cryptosystem“. AA Kamal, AM Youssef. 2009. ieeexplore.ieee.org Microelectronics (ICM), 2009 …. 24 cites.
- “High-speed elliptic curve cryptography accelerator for Koblitz curves“. KU Järvinen, JO Skyttä. 2008. ieeexplore.ieee.org Field-Programmable Custom …. 24 cites.
- “A secure authenticated key agreement protocol based on elliptic curve cryptography“. PE Abi-Char, A Mhamed…. 2007. ieeexplore.ieee.org … Assurance and Security …. 24 cites.
- “Use of sparse and/or complex exponents in batch verification of exponentiations“. JH Cheon, DH Lee. 2006. ieeexplore.ieee.org IEEE Transactions on Computers. 24 cites.
- “Efficient implementation of elliptic curve cryptography for wireless sensor networks“. EO Blaß, M Zitterbart. 2005. doc.tm.uka.de Institute of Telematics, University of Karlsruhe …. 24 cites.
- “Algorithms for internet key exchange version 1 (ikev1)“. P Hoffman. 2005. tools.ietf.org . 24 cites.
- “A robust threshold elliptic curve digital signature providing a new verifiable secret sharing scheme“. MH Ibrahim, IA Ali, II Ibrahim…. 2003. ieeexplore.ieee.org Circuits and Systems …. 24 cites.
- “Elliptic curve cryptosystems on smart cards“. E Mohammed, AE Emarah…. 2001. ieeexplore.ieee.org … Technology, 2001 IEEE …. 24 cites.
- “Elliptic curve calculation apparatus capable of calculating multiples at high speed“. A Miyaji, T Ono. 2001. Google Patents US Patent 6,263,081. 24 cites.
- “Secure key management scheme based on ECC algorithm for patient’s medical information in healthcare system“. YS Lee, E Alasaarela, HJ Lee. 2014. ieeexplore.ieee.org Information Networking (ICOIN) …. 23 cites.
- “Performance based comparison study of RSA and elliptic curve cryptography“. R Sinha, HK Srivastava, S Gupta. 2013. ijser.org International Journal of Scientific & …. 23 cites.
- “Elliptic curve digital signature algorithm (dsa) for dnssec“. P Hoffman. 2012. tools.ietf.org . 23 cites.
- “An efficient elliptic curves scalar multiplication for wireless network“. B Wang, H Zhang, Y Wang. 2007. ieeexplore.ieee.org Network and Parallel Computing …. 23 cites.
- “Efficient algorithms for Tate pairing“. T Kobayashi, K Aoki, H Imai. 2006. search.ieice.org IEICE Transactions on Fundamentals …. 23 cites.
- “Cryptography Algorithm-Survey and Trends [J]“. QIN Zhi-guang. 2004. en.cnki.com.cn Computer Applications. 23 cites.
- “Design and implementation of an efficient fair off-line e-cash system based on elliptic curve discrete logarithm problem“. M Lee, G Ahn, J Kim, J Park, B Lee…. 2002. ieeexplore.ieee.org Journal of …. 23 cites.
- “Finding secure curves with the Satoh-FGH algorithm and an early-abort strategy“. M Fouquet, P Gaudry, R Harley. 2001. Springer Advances in Cryptology—EUROCRYPT …. 23 cites.
- “62: Public key cryptography for the financial services industry: The elliptic curve digital signature algorithm (ecdsa)“. X ANSI. 1999. Am. Nat’l Standards Inst. 23 cites.
- “A small and fast software implementation of elliptic curve cryptosystems over GF (p) on a 16-bit microcomputer“. T Hasegawa, J Nakajima, M Matsui. 1999. search.ieice.org IEICE Transactions on …. 23 cites.
- “Conic analog of RSA cryptosystem and someimproved RSA cryptosystems [J]“. CAO Zhen-fu. 1999. en.cnki.com.cn Journal of Natural Science of Heilongjiang University. 23 cites.
- “File encryption and decryption using secure RSA“. RS Jamgekar, GS Joshi. 2013. pdfs.semanticscholar.org International Journal of …. 22 cites.
- “A reconfigurable GF (2 M) elliptic curve cryptographic coprocessor“. M Morales-Sandoval, C Feregrino-Uribe…. 2011. ieeexplore.ieee.org … Logic (SPL), 2011 …. 22 cites.
- “JSON Web Key (JWK)“. M Jones. 2011. . 22 cites.
- “Low-cost digital signature architecture suitable for radio frequency identification tags“. M O’Neill, MJB Robshaw. 2010. IET IET Computers & Digital Techniques. 22 cites.
- “Short Hash-Based Signatures for Wireless Sensor Networks.“. E Dahmen, C Krauß. 2009. Springer CANS. 22 cites.
- “Efficient algorithms for speeding up the computations of elliptic curve cryptosystems“. WJ Tsaur, CH Chou. 2005. Elsevier Applied Mathematics and Computation. 22 cites.
- “Research on elliptic curve cryptography“. Q Qiu, Q Xiong. 2004. ieeexplore.ieee.org … Supported Cooperative Work in Design, 2004 …. 22 cites.
- “An efficient identity-based group signature scheme over elliptic curves“. S Han, J Wang, W Liu. 2004. Springer Universal Multiservice Networks. 22 cites.
- “Security in ad-hoc networks: Protocols and elliptic curve cryptography on an embedded platform“. I Riedel, IC Paar. 2003. emsec.rub.de Master’s thesis, Ruhr-Universitaet Bochum. 22 cites.
- “Securing passive objects in mobile ad-hoc peer-to-peer networks“. R Mayrhofer, F Ortner, A Ferscha…. 2003. Elsevier Electronic notes in …. 22 cites.
- “Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS)“. S Blake-Wilson, D Brown, P Lambert. 2002. rfc-editor.org . 22 cites.
- “Speeding up elliptic cryptosystems using a new signed binary representation for integers“. R Katti. 2002. ieeexplore.ieee.org Digital System Design, 2002. Proceedings. Euromicro …. 22 cites.
- “Anonymous authentication protocol based on elliptic curve Diffie–Hellman for wireless access networks“. WB Hsieh, JS Leu. 2014. Wiley Online Library Wireless Communications and Mobile …. 21 cites.
- “Online template attacks“. L Batina, Ł Chmielewski, L Papachristodoulou…. 2014. Springer … in Cryptology in India. 21 cites.
- “Evaluating 16-bit processors for elliptic curve cryptography“. E Wenger, M Werner. 2011. Springer International Conference on Smart Card Research …. 21 cites.
- “Elliptic curve groups modulo a prime (ECP Groups) for IKE and IKEv2“. D Fu, J Solinas. 2010. buildbot.tools.ietf.org . 21 cites.
- “Enforcing patient privacy in healthcare WSNs using ECC implemented on 802.15. 4 beacon enabled clusters“. J Mišic. 2008. ieeexplore.ieee.org … Computing and Communications, 2008. PerCom 2008 …. 21 cites.
- “Parallelized Scalar Multiplication on Elliptic Curves Defined over Optimal Extension Field.“. J Lee, H Kim, Y Lee, SM Hong…. 2007. ai2-s2-pdfs.s3.amazonaws.com IJ Network …. 21 cites.
- “Efficient three-term simultaneous elliptic scalar multiplication with applications“. BB Brumley. 2006. ai2-s2-pdfs.s3.amazonaws.com … of the 11th Nordic Workshop on …. 21 cites.
- “Algorithmic number theory“. JP Buhler, P Stevenhagen. 2006. Cambridge University Press/MSRI … . 21 cites.
- “Efficient algorithms for Koblitz curves over fields of characteristic three“. IF Blake, VK Murty, G Xu. 2005. Elsevier Journal of Discrete Algorithms. 21 cites.
- “A self-pairing map and its applications to cryptography“. HS Lee. 2004. Elsevier Applied Mathematics and Computation. 21 cites.
- “Efficient proxy signature schemes using self-certified public keys“. CL Hsu, TS Wu. 2004. Elsevier Applied mathematics and computation. 21 cites.
- “Advances in Cryptology—ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast …“. C Boyd. 2003. books.google.com . 21 cites.
- “Playing “Hide-and-Seek” in finite fields: Hidden number problem and its applications“. IE Shparlinski. 2002. comp.mq.edu.au Proc. 7th Spanish meeting on cryptology and …. 21 cites.
- “Information leakage attacks against smart card implementations of the elliptic curve digital signature algorithm“. T Römer, JP Seifert. 2001. Springer Smart Card Programming and Security. 21 cites.
- “Elliptic curve cryptosystem“. VTV Yokoyama, T VKazuhiro. 2000. docview1.tlvnimg.com Fujitsu Sci. Tech. J. 21 cites.
- “RSA-Signature Algorithm for Microcontroller Implementation“. G Qiao, KY Lam. 1998. Springer CARDIS. 21 cites.
- “Performance analysis of identity management in the Session Initiation Protocol (SIP)“. Y Rebahi, JJ Pallares, NT Minh, S Ehlert…. 2008. ieeexplore.ieee.org … 2008. AICCSA 2008 …. 20 cites.
- “Affine precomputation with sole inversion in elliptic curve cryptography“. E Dahmen, K Okeya, D Schepers. 2007. Springer Australasian Conference on …. 20 cites.
- “A nonlinear elliptic curve cryptosystem based on matrices“. JJ Climent, F Ferrández, JF Vicent, A Zamora. 2006. Elsevier Applied mathematics and …. 20 cites.
- “Algebraic curves and cryptography“. S Galbraith, A Menezes. 2005. Elsevier Finite fields and their applications. 20 cites.
- “New identity-based society oriented signature schemes from pairings on elliptic curves“. CY Lin, TC Wu, F Zhang, JJ Hwang. 2005. Elsevier Applied Mathematics and computation. 20 cites.
- “Theory and implementation of elliptic curve cryptography“. K Rabah. 2005. docsdrive.com Journal of Applied Sciences(Pakistan). 20 cites.
- “An FPGA arithmetic logic unit for computing scalar multiplication using the half-and-add method“. SMH Rodriguez…. 2005. ieeexplore.ieee.org … Computing and FPGAs …. 20 cites.
- “A Simple Architectural Enhancement for Fast and Flexible Elliptic Curve Cryptography over Binary Finite Fields GF (2^ m)“. S Tillich, J Großschädl. 2004. Springer Lecture notes in computer science. 20 cites.
- “Cryptanalysis of Aydos et al.’s ECC-based wireless authentication protocol“. HM Sun, BT Hsieh, SM Tseng. 2004. ieeexplore.ieee.org … and e-Service, 2004. EEE’04 …. 20 cites.
- “Elliptic curve signature verification method and apparatus and a storage medium for implementing the same“. K Okeya. 2002. Google Patents US Patent App. 10/197,448. 20 cites.
- “Efficient implementation of elliptic curve cryptosystems on an ARM7 with hardware accelerator“. SB Xu, L Batina. 2001. Springer International Conference on Information Security. 20 cites.
- “Efficient algorithms for elliptic curve cryptosystems on embedded systems.“. AD Woodbury. 2001. emsec.rub.de . 20 cites.
- “GLV/GLS decomposition, power analysis, and attacks on ECDSA signatures with single-bit nonce bias“. DF Aranha, PA Fouque, B Gérard…. 2014. Springer … Conference on the …. 19 cites.
- “A hardware processor supporting elliptic curve cryptography for less than 9 kGEs“. E Wenger, M Hutter. 2011. Springer International Conference on Smart Card Research …. 19 cites.
- “High speed hardware implementation of an elliptic curve cryptography (ECC) co-processor“. B MuthuKumar, S Jeevananthan. 2010. ieeexplore.ieee.org Trendz in Information …. 19 cites.
- “Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems-performance analysis by simulations“. G Gódor, N Giczi, S Imre. 2010. ieeexplore.ieee.org … Communications, Networking and …. 19 cites.
- “An efficient blind signature scheme based on the elliptic curve discrete logarithm problem“. M Nikooghadam…. 2009. isecure-journal.com The ISC International …. 19 cites.
- “Analyzing energy and time overhead of security mechanisms in wireless sensor networks“. P Trakadas, T Zahariadis, HC Leligou…. 2008. ieeexplore.ieee.org … , Signals and Image …. 19 cites.
- “A novel untraceable blind signature based on elliptic curve discrete logarithm problem“. D Jena, SK Jena, B Majhi. 2007. dspace.nitrkl.ac.in . 19 cites.
- “An efficient online/offline signcryption scheme for MANET“. Z Xu, G Dai, D Yang. 2007. ieeexplore.ieee.org Advanced Information Networking and …. 19 cites.
- “A New Digital Signature Scheme Based on Mandelbrot and Julia Fractal Sets.“. MA Alia, A Samsudin. 2007. eprints.usm.my American Journal of Applied Sciences. 19 cites.
- “Efficient implementation of elliptic curve cryptography on FPGAs“. J Shokrollahi. 2006. cosec.bit.uni-bonn.de . 19 cites.
- “High-speed ECC based Kerberos authentication protocol for wireless applications“. OM Erdem. 2003. ieeexplore.ieee.org Global Telecommunications Conference, 2003 …. 19 cites.
- “Efficient algorithms for the Jacobian variety of hyperelliptic curves y2= xp− x+ 1 over a finite field of odd characteristic p“. I Duursma, K Sakurai. 2000. Springer Proceedings of the International Conference on …. 19 cites.
- “An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography“. SA Ch, M Sher, A Ghani, H Naqvi, A Irshad. 2015. Springer Multimedia Tools and …. 18 cites.
- “Implementation of RSA algorithm using Elliptic curve algorithm for security and performance enhancement“. PS Yadav, P Sharma, KP Yadav. 2012. ijstr.org International Journal of Scientific & …. 18 cites.
- “Secure encryption with digital signature approach for Short Message Service“. N Saxena, NS Chaudhari. 2012. ieeexplore.ieee.org Information and Communication …. 18 cites.
- “Digital signature“. R Kaur, A Kaur. 2012. ieeexplore.ieee.org Computing Sciences (ICCS), 2012 …. 18 cites.
- “Prime field ECDSA signature processing for reconfigurable embedded systems“. B Glas, O Sander, V Stuckert…. 2011. dl.acm.org International Journal of …. 18 cites.
- “Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices.“. E Wenger, M Feldhofer, N Felber. 2010. Springer WISA. 18 cites.
- “Low-resource ECDSA implementation for passive RFID tags“. T Kern, M Feldhofer. 2010. ieeexplore.ieee.org … , and Systems (ICECS), 2010 17th IEEE …. 18 cites.
- “Efficient on-line/off-line signature schemes based on multiple-collision trapdoor hash families“. L Harn, WJ Hsin, C Lin. 2010. academic.oup.com The Computer Journal. 18 cites.
- “Fast Parallel Molecular Algorithms for DNA-Based Computation: Solving the Elliptic Curve Discrete Logarithm Problem over 𝐺 𝐹 (2 𝑛)“. K Li, S Zou, J Xv. 2008. downloads.hindawi.com BioMed Research International. 18 cites.
- “An elliptic threshold signature framework for k-security in wireless sensor networks“. M Sliti, M Hamdi, N Boudriga. 2008. ieeexplore.ieee.org Electronics, Circuits and Systems …. 18 cites.
- “Elliptic curve cryptography over binary finite field GF (2m)“. K Rabah. 2006. docsdrive.com Information Technology Journal. 18 cites.
- “Cryptanalysis of a proxy-protected proxy signature scheme based on elliptic curve cryptosystem“. S Wang, G Wang, F Bao, J Wang. 2004. ieeexplore.ieee.org … , 2004. VTC2004-Fall. 2004 …. 18 cites.
- “Efficient multi-exponentiation and application to batch verification of digital signatures“. CH Lim. 2000. dasan.sejong.ac.kr Unpublished manuscript, August. 18 cites.
- “Pitfalls in public key watermarking“. PSLM Barreto, HY Kim. 1999. ieeexplore.ieee.org Computer Graphics and Image …. 18 cites.
- “An efficient digital signature scheme based on an elliptic curve over the ring Zn“. T Okamoto, A Fujioka, E Fujisaki. 1992. Springer Annual International Cryptology …. 18 cites.
- “An elliptic curve-based mutual authentication scheme for RFID implant systems“. SR Moosavi, E Nigussie, S Virtanen, J Isoaho. 2014. Elsevier Procedia Computer Science. 17 cites.
- “An elliptic curve distributed key management for mobile ad hoc networks“. H Dahshan, J Irvine. 2010. ieeexplore.ieee.org … (VTC 2010-Spring), 2010 IEEE 71st. 17 cites.
- “An ECC-Based Blind Signature Scheme.“. FG Jeng, TL Chen, TS Chen. 2010. pdfs.semanticscholar.org JNW. 17 cites.
- “Mobile sms banking security using elliptic curve cryptosystem“. R Soram. 2009. Citeseer International Journal of Computer Science and …. 17 cites.
- “Low-cost elliptic curve digital signature coprocessor for smart cards“. GM De Dormale, R Ambroise, D Bol…. 2006. ieeexplore.ieee.org … , 2006. ASAP’06 …. 17 cites.
- “ECGSC: Elliptic Curve based Generalized Signcryption Scheme.“. Y Han, X Yang. 2006. eprint.iacr.org IACR Cryptology ePrint Archive. 17 cites.
- “A hardware architecture for elliptic curve cryptography and lossless data compression“. MM Sandoval, C Feregrino-Uribe. 2005. ieeexplore.ieee.org … and Computers, 2005 …. 17 cites.
- “Telosb implementation of elliptic curve cryptography over primary field“. H Wang, B Sheng, Q Li. 2005. ai2-s2-pdfs.s3.amazonaws.com … of William and …. 17 cites.
- “A secure protocol for bluetooth piconets using elliptic curve cryptography“. MS Hwang, CC Lee, JZ Lee, CC Yang. 2005. Springer Telecommunication Systems. 17 cites.
- “FPGA based hardware acceleration for elliptic curve public key cryptosystems“. M Ernst, B Henhapl, S Klupsch, S Huss. 2004. Elsevier Journal of Systems and Software. 17 cites.
- “Memory performance of public-key cryptography methods in mobile environments“. I Branovic, R Giorgi, E Martinelli. 2003. dii.unisi.it ACM SIGARCH Workshop on MEmory …. 17 cites.
- “Analysis of Security and Efficiency on Elliptic Curves Cryptosystems [J]“. ZXQZL Jinde, Z Xianfeng, Q Zhiguang. 2001. en.cnki.com.cn Journal of University of …. 17 cites.
- “Optical identity authentication scheme based on elliptic curve digital signature algorithm and phase retrieval algorithm“. D Fan, X Meng, Y Wang, X Yang, X Peng, W He…. 2013. osapublishing.org Applied …. 16 cites.
- “Prospective utilization of elliptic curve cryptography for security enhancement“. S Nimbhorkar, DLG Malik. 2013. ijaiem.org … Journal of Application or Innovation in …. 16 cites.
- “Enhancing security of cloud computing using elliptic curve cryptography“. A Tripathi, P Yadav. 2012. search.proquest.com International Journal of Computer …. 16 cites.
- “Comparison of ECC and RSA algorithm in multipurpose smart card application“. M Savari, M Montazerolzohour…. 2012. ieeexplore.ieee.org Cyber Security, Cyber …. 16 cites.
- “The improved elliptic curve digital signature algorithm“. H Junru. 2011. ieeexplore.ieee.org Electronic and Mechanical Engineering and …. 16 cites.
- “An agent-based English auction protocol using Elliptic Curve Cryptosystem for mobile commerce“. YF Chung, YT Chen, TL Chen, TS Chen. 2011. Elsevier Expert Systems with Applications. 16 cites.
- “Use of elliptic curve cryptography (ECC) algorithms in cryptographic message syntax (CMS)“. S Turner, D Brown. 2010. rfc-editor.org . 16 cites.
- “Internet X. 509 public key infrastructure: additional algorithms and identifiers for DSA and ECDSA“. Q Dang, T Polk, DRL Brown. 2010. tools.ietf.org . 16 cites.
- “On fault-based attacks and countermeasures for elliptic curve cryptosystems“. A Dominguez Oviedo. 2008. uwspace.uwaterloo.ca . 16 cites.
- “Elliptic curve elgamal encryption and signature schemes“. K Rabah. 2005. docsdrive.com Information technology journal. 16 cites.
- “Parallel scalar multiplication for elliptic curve cryptosystems“. B Ansari, H Wu. 2005. ieeexplore.ieee.org Communications, Circuits and Systems, 2005 …. 16 cites.
- “Distributed CA-based PKI for mobile ad hoc networks using elliptic curve cryptography“. C Zouridaki, BL Mark, K Gaj, RK Thomas. 2004. Springer European Public Key …. 16 cites.
- “Verifiable threshold cryptosystems based on elliptic curve“. Y Han, X Yang, J Sun, D Li. 2003. ieeexplore.ieee.org Computer Networks and Mobile …. 16 cites.
- “Reconfigurable computing applied to problems in communications security“. DA Buell, JP Davis, G Quan. 2002. researchgate.net Proceedings MAPLD. 16 cites.
- “Elgamal Type Digital Multisignature Schemes And Its Security [J]“. LUJ Zhu, CH Yan, LIN Fei. 2000. en.cnki.com.cn Journal Of Computer Research And …. 16 cites.
- “Scalable elliptic curve cryptosystem FPGA processor for NIST prime curves“. KCC Loi, SB Ko. 2015. ieeexplore.ieee.org IEEE Transactions on Very Large Scale …. 15 cites.
- “An elliptic-curve-based hierarchical cluster key management in wireless sensor network“. SK Sahoo, MN Sahoo. 2014. Springer Intelligent Computing, Networking, and Informatics. 15 cites.
- “Elliptic curve digital signature algorithm using boolean permutation based ECC“. F Amounas. 2012. search.proquest.com … Journal of Information and Network Security. 15 cites.
- “Low-latency elliptic curve scalar multiplication“. JW Bos. 2012. Springer International Journal of Parallel Programming. 15 cites.
- “Efficient signcryption schemes based on hyperelliptic curve cryptosystem“. SA Ch, W Nasar, Q Javaid. 2011. ieeexplore.ieee.org Emerging Technologies (ICET) …. 15 cites.
- “Non-delegatable strong designated verifier signature on elliptic curves“. H Tian, X Chen, Z Jiang, Y Du. 2011. Springer International Conference on Information …. 15 cites.
- “Analysis and comparison of security protocols in wireless sensor networks“. V Casola, A De Benedictis, A Drago…. 2011. ieeexplore.ieee.org … (SRDSW), 2011 30th …. 15 cites.
- “FPGA design of self-certified signature verification on Koblitz curves“. KU Järvinen, J Forsten, J Skyttä. 2007. Springer Lecture Notes in Computer Science. 15 cites.
- “Efficient Comb Elliptic Curve Multiplication Methods Resistant to Power Analysis.“. M Feng, BB Zhu, M Xu, S Li. 2005. ai2-s2-pdfs.s3.amazonaws.com IACR Cryptology …. 15 cites.
- “Countermeasure method in an electronic component using a public key cryptographic algorithm on an elliptic curve“. M Joye. 2002. Google Patents US Patent App. 10/475,174. 15 cites.
- “Cryptographic encryption method using efficient elliptic curve“. J Solinas. 2001. Google Patents US Patent App. 09/928,703. 15 cites.
- “Fast software implementation of binary elliptic curve cryptography“. M Bluhm, S Gueron. 2015. Springer Journal of Cryptographic Engineering. 14 cites.
- “Efficient implementation of NIST-compliant elliptic curve cryptography for sensor nodes“. Z Liu, H Seo, J Großschädl, H Kim. 2013. Springer International Conference on …. 14 cites.
- “Enhanced public auditability & secure data storage in cloud computing“. TK Chakraborty, A Dhami, P Bansal…. 2013. ieeexplore.ieee.org … (IACC), 2013 IEEE 3rd …. 14 cites.
- “Effective generalized equations of secure hyperelliptic curve digital signature algorithms“. YOU Lin, YX Sang. 2010. Elsevier The Journal of China Universities of Posts and …. 14 cites.
- “Efficient implementation of elliptic curve cryptography on DSP for underwater sensor networks“. H Yan, ZJ Shi, Y Fei. 2009. pdfs.semanticscholar.org 7th Workshop on Optimizations for …. 14 cites.
- “On the implementation and evaluation of an elliptic curve based cryptosystem for Java enabled Wireless Sensor Networks“. DE Boyle, T Newe. 2009. Elsevier Sensors and Actuators A: Physical. 14 cites.
- “Cryptographic identification and digital signature method using efficient elliptic curve“. JA Solinas. 2005. Google Patents US Patent 6,898,284. 14 cites.
- “Design and implementation of secure e-mail system using elliptic curve cryptosystem“. W Lee, J Lee. 2004. Elsevier Future Generation Computer Systems. 14 cites.
- “Implementing elliptic curve cryptography on PC and smart card“. IZ Berta, ZA Mann. 2003. pp.bme.hu Periodica Polytechnica Electrical Engineering. 14 cites.
- “Efficient and secure elliptic curve cryptography for 8-bit AVR microcontrollers“. E Nascimento, J López, R Dahab. 2015. Springer International Conference on Security …. 13 cites.
- “High performance FPGA implementation of elliptic curve cryptography over binary fields“. S Liu, L Ju, X Cai, Z Jia, Z Zhang. 2014. ieeexplore.ieee.org Trust, Security and Privacy in …. 13 cites.
- “Elliptic curve diffie-hellman key exchange algorithm for securing hypertext information on wide area network“. RR Ahirwal, M Ahke. 2013. pdfs.semanticscholar.org International Journal of Computer …. 13 cites.
- “Efficient arithmetic on elliptic curves over fields of characteristic three“. RR Farashahi, H Wu, CA Zhao. 2012. Springer International Conference on Selected …. 13 cites.
- “Energy efficient key management scheme based on elliptic curve signcryption for wireless sensor networks“. EAAA Hagras, D El-Saied…. 2011. ieeexplore.ieee.org Radio Science Conference …. 13 cites.
- “Secure access of smart cards using elliptic curve cryptosystems“. K Chatterjee, D Gupta. 2009. ieeexplore.ieee.org Wireless Communications, Networking …. 13 cites.
- “Ring signature scheme for ECC-based anonymous signcryption“. YF Chung, ZY Wu, TS Chen. 2009. Elsevier Computer Standards & Interfaces. 13 cites.
- “ECOH: the elliptic curve only hash“. DRL Brown, A Antipa, M Campagna…. 2008. ehash.iaik.tugraz.at Submission to …. 13 cites.
- “A dual-field elliptic curve cryptographic processor based on a systolic arithmetic unit“. G Chen, G Bai, H Chen. 2008. ieeexplore.ieee.org … and Systems, 2008. ISCAS 2008. IEEE …. 13 cites.
- “Method and apparatus for elliptic curve scalar multiplication“. RJ Lambert, A Vadekar, A Antipa. 2007. Google Patents US Patent 7,215,780. 13 cites.
- “A distributed electronic authentication scheme based on elliptic curve“. ZG Chen, XX Song. 2007. ieeexplore.ieee.org Machine Learning and Cybernetics, 2007 …. 13 cites.
- “Implementation of ecc-based trusted platform module“. X Zhang, M Zhou, JX Zhuang…. 2007. ieeexplore.ieee.org Machine Learning and …. 13 cites.
- “ECP Groups for IKE and IKEv2“. DE Fu, JA Solinas. 2007. tools.ietf.org . 13 cites.
- “A new satellite multicast security protocol based on elliptic curve signatures“. AA Yavuz, F Alagoz, E Anarim. 2006. ieeexplore.ieee.org … Technologies, 2006. ICTTA’06 …. 13 cites.
- “Method of elliptic curve digital signature using coefficient splitting“. JA Solinas. 2006. Google Patents US Patent 7,062,043. 13 cites.
- “A microcoded elliptic curve processor for GF (2m) using FPGA technology“. Q Pu, J Huang. 2006. ieeexplore.ieee.org Communications, Circuits and Systems …. 13 cites.
- “An efficient elliptic curve cryptography based authenticated key agreement protocol for wireless LAN security“. MA Azim, A Jamalipour. 2005. ieeexplore.ieee.org High Performance Switching and …. 13 cites.
- “A reconfigurable processor for high speed point multiplication in elliptic curves“. NA Saqib, F Rodríguez-Henriquez…. 2005. inderscienceonline.com International Journal …. 13 cites.
- “Digital signature schemes with domain parameters“. S Vaudenay. 2004. Springer LECTURE NOTES IN COMPUTER SCIENCE.. 13 cites.
- “Multiple trusted authorities in identifier based cryptography from pairings on elliptic curves“. L Chen, K Harrison. 2003. shiftleft.com Trusted Systems Laboratory, HP. 13 cites.
- “An efficient elliptic curve cryptography protocol based on matrices“. F Amounas, EH El Kinani. 2012. ijeijournal.com International Journal of Engineering …. 12 cites.
- “A scan-based attack on elliptic curve cryptosystems in presence of industrial design-for-testability structures“. J Da Rolt, A Das, G Di Natale, ML Flottes…. 2012. ieeexplore.ieee.org Defect and Fault …. 12 cites.
- “Usage of asymmetric encryption algorithms to enhance the security of sensitive data in secure communication“. P Fanfara, E Danková, M Dufala. 2012. ieeexplore.ieee.org Applied Machine Intelligence …. 12 cites.
- “Elliptic curve cryptography in constrained environments: A review“. RK Pateriya, S Vasudevan. 2011. ieeexplore.ieee.org Communication Systems and …. 12 cites.
- “Suite B profile for internet protocol security (IPsec)“. K Burgin, M Peck. 2011. tools.ietf.org . 12 cites.
- “Digital Signature Scheme with Message Recovery Using Knapsack-based ECC.“. RR Ramasamy, MA Prabakar. 2011. pdfs.semanticscholar.org IJ Network Security. 12 cites.
- “Elliptical Curve Cryptography Based Security Engine for Multiagent Systems Operating in Semantic Cyberspace“. A Singh, D Juneja, AK Sharma. 2011. researchgate.net International Journal of Research …. 12 cites.
- “Design of new security algorithm: Using hybrid Cryptography architecture“. MJ Dubai, TR Mahesh, PA Ghosh. 2011. ieeexplore.ieee.org … Technology (ICECT), 2011 …. 12 cites.
- “A security mechanism for clustered wireless sensor networks based on elliptic curve cryptography“. CL Yang, W Tarng, KR Hsieh, M Chen. 2010. ieeesmc.org IEEE international conference …. 12 cites.
- “Suite B Certificate and Certificate Revocation List (CRL) Profile“. J Solinas. 2010. buildbot.tools.ietf.org . 12 cites.
- “Elliptic curve digital signature algorithm over GF (p) on a residue number system enabled microprocessor“. Z Lim, BJ Phillips, M Liebelt. 2009. ieeexplore.ieee.org TENCON 2009-2009 IEEE …. 12 cites.
- “Design of hyper elliptic curve digital signature“. D Jian-zhi, C Xiao-hui, G Qiong. 2009. ieeexplore.ieee.org Information Technology and …. 12 cites.
- “Mobicash: A new anonymous mobile payment system implemented by elliptic curve cryptography“. S Bakhtiari, A Baraani…. 2009. ieeexplore.ieee.org Computer Science and …. 12 cites.
- “A high-speed, high-radix, processor array architecture for real-time elliptic curve cryptography over GF (2 m)“. MA Fayed, MW El-Kharashi…. 2007. ieeexplore.ieee.org Signal Processing and …. 12 cites.
- “ID-based digital signature algorithms“. JA Solinas. 2003. pdfs.semanticscholar.org … presented at 7th Workshop on Elliptic Curve …. 12 cites.
- “Representation of Elliptic Curve Digital Signature Algorithm (ECDSA) Keys and Signatures in Internet X. 509 Public Key Infrastructure Certificates“. L Bassham, D Johnson, T Polk. 1999. draft-ietf-pkix-ipki-ecdsa-02. txt. October. 12 cites.
- “Elliptic curve systems“. A Menezes, FA Menezes, M Qu, S Vanstone…. 1995. Citeseer … , Part 4: Elliptic Curve …. 12 cites.
- “An efficient elliptic curve digital signature algorithm (ecdsa)“. S Lamba, M Sharma. 2013. ieeexplore.ieee.org Machine Intelligence and Research …. 11 cites.
- “Elliptic curve cryptography (ECC) brainpool curves for transport layer security (TLS)“. J Merkle, M Lochter. 2013. buildbot.tools.ietf.org . 11 cites.
- “A Novel Encryption Scheme of Amazigh Alphabet Based Elliptic Curve using Pauli Spin? Matrices“. F Amounas. 2013. search.proquest.com … Journal of Information and Network Security. 11 cites.
- “Provable secure proxy signature scheme without bilinear pairings“. N Tiwari, S Padhye. 2013. Wiley Online Library International Journal of Communication …. 11 cites.
- “Enhancement of GSM Security using elliptic curve cryptography algorithm“. S Goswami, S Laha, S Chakraborty…. 2012. ieeexplore.ieee.org … systems, modelling and …. 11 cites.
- “The Improvement of digital signature algorithm based on elliptic curve cryptography“. Q Zhang, Z Li, C Song. 2011. ieeexplore.ieee.org Artificial Intelligence, Management …. 11 cites.
- “Elliptic curve certificates and signatures for nfc signature records“. T Rosati, G Zaverucha. 2011. nfc-forum.org Research in Motion, Certicom Research. 11 cites.
- “Elliptic curve cryptography: survey and its security applications“. S Kalra, SK Sood. 2011. dl.acm.org Proceedings of the International Conference on …. 11 cites.
- “High-speed elliptic curve and pairing-based cryptography“. P Longa. 2011. uwspace.uwaterloo.ca . 11 cites.
- “Authentication system executing an elliptic curve digital signature cryptographic process“. A Sarangarajan, TV Rao, R Murugesh…. 2010. Google Patents US Patent …. 11 cites.
- “An identity based digital signature from ecdsa“. H Jin, H Debiao, C Jianhua. 2010. ieeexplore.ieee.org Education Technology and …. 11 cites.
- “An improved proxy signature scheme based on elliptic curve cryptography“. X Sun, M Xia. 2009. ieeexplore.ieee.org … and Communications Security, 2009. ICCCS’09 …. 11 cites.
- “New primitives for digital signature algorithms“. NA Moldovyan, PA Moldovyanu. 2009. researchgate.net Quasigroups Related Systems. 11 cites.
- “Optimization algorithm for scalar multiplication in the elliptic curve cryptography over prime field“. Y Hao, S Ma, G Chen, X Zhang, H Chen…. 2008. Springer … Computing Theories and …. 11 cites.
- “Elliptic curve cryptography: Java implementation issues“. VG Martinez, CS Avila, JE Garcia…. 2005. ieeexplore.ieee.org … , 2005. CCST’05. 39th …. 11 cites.
- “The application of elliptic curves cryptography in embedded systems“. W Qingxian. 2005. ieeexplore.ieee.org Embedded Software and Systems, 2005. Second …. 11 cites.
- “Elliptic curve cryptography: Java implementation“. KD Edoh. 2004. dl.acm.org Proceedings of the 1st Annual Conference on …. 11 cites.
- “Methods and apparatuses for providing blind digital signatures using curve-based cryptography“. R Venkatesan, D Boneh. 2003. Google Patents US Patent App. 10/609,261. 11 cites.
- “A java implementation of an elliptic curve cryptosystem“. A Burnett, K Winters, T Dowling. 2002. dl.acm.org … of the inaugural conference on the …. 11 cites.
- “An efficient procedure to double and add points on an elliptic curve“. K Eisentraeger, K Lauter…. 2002. pdfs.semanticscholar.org … ePrint Archive, Report …. 11 cites.
- “Evaluation of security level of cryptography: the Elliptic Curve Discrete Logarithm Problem (ECDLP)“. A Menezes. 2001. ipa.go.jp University of Waterloo. 11 cites.
- “Implementation of elliptic curve digital signature algorithm (ECDSA)“. A Abidi, B Bouallegue, F Kahri. 2014. ieeexplore.ieee.org Computer & Information …. 10 cites.
- “Hardware implementation of elliptic curve digital signature algorithm (ECDSA) on Koblitz curves“. G Nabil, K Naziha, F Lamia…. 2012. ieeexplore.ieee.org … Systems, Networks & …. 10 cites.
- “A Stamped Blind Signature Scheme based on Elliptic Curve Discrete Logarithm Problem.“. K Chakraborty, J Mehta. 2012. pdfs.semanticscholar.org IJ Network Security. 10 cites.
- “Public verifiable signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem“. SA Ch, M Sher. 2012. Springer … Conference on Information Systems, Technology and …. 10 cites.
- “Simple power analysis attack against elliptic curve cryptography processor on FPGA implementation“. SA Kadir, A Sasongko, M Zulkifli. 2011. ieeexplore.ieee.org Electrical Engineering and …. 10 cites.
- “A design of certificate authority based on elliptic curve cryptography“. Y Yangtao, L Quan, L Fen. 2010. ieeexplore.ieee.org Distributed Computing and …. 10 cites.
- “Elliptic curve cryptography. Java platform implementations“. VG Martinez, LH Encinas…. 2009. pdfs.semanticscholar.org Proceedings of the …. 10 cites.
- “Design and Implementation of a Secure Instant Messaging Service based on Elliptic-Curve Cryptography“. CH Yang, TY Kuo, T Ahn, CP Lee. 2008. crypto.nknu.edu.tw Journal of Computers. 10 cites.
- “An efficient ECDSA-based signature scheme for wireless networks“. X Zhong, D Guanzhong, Y Deming. 2006. Springer Wuhan University Journal of Natural …. 10 cites.
- “Fast 160-Bits GF (P) Elliptic Curve Crypto Hardware of High-Radix Scalable Multipliers.“. AAA Gutub. 2006. iajit.org Int. Arab J. Inf. Technol.. 10 cites.
- “Soft-timeout distributed key generation for digital signature based on elliptic curve d-log for low-power devices“. C Tang, AT Chronopoulos…. 2005. ieeexplore.ieee.org Security and Privacy for …. 10 cites.
- “A threshold signature scheme based on the elliptic curve cryptosystem“. TS Chen. 2005. Elsevier Applied Mathematics and Computation. 10 cites.
- “Using a PKI based upon elliptic curve cryptography“. R Zuccherato. 2003. Entrust white paper. 10 cites.
- “Schnorr blind signature based on elliptic curves“. MH Chang, IT Chen, IC Wu…. 2003. itchen.class.kmu.edu.tw Asian Journal of …. 10 cites.
- “A scalar multiplication algorithm with recovery of the y-coordinate on the Montgomery form and analysis of efficiency for elliptic curve cryptosystems“. K Okeya, K SAKURAI. 2002. search.ieice.org IEICE transactions on fundamentals of …. 10 cites.
- “A PCI-card for accelerating elliptic curve cryptography“. J Wolkerstorfer, W Bauer. 2002. pdfs.semanticscholar.org . 10 cites.
- “Security Enhanced Elliptic Curve Cryptosystem Approach [J]“. Z Longjun, S Junyi, Z Lin. 2001. en.cnki.com.cn Journal of Xi’an Jiaotong University. 10 cites.
- “BSD-based elliptic curve cryptography for the open Internet of Things“. OP Pinol, S Raza, J Eriksson…. 2015. ieeexplore.ieee.org … , Mobility and Security …. 9 cites.
- “An Efficient Signcryption Scheme based on the Elliptic Curve Discrete Logarithm Problem“. F Amounas, EH Kinani. 2013. search.proquest.com International Journal of Information …. 9 cites.
- “A Cryptographic Suite for Embedded Systems (SuiteE)“. M Campagna. 2012. . 9 cites.
- “Java Card implementation of the Elliptic Curve Integrated Encryption Scheme using prime and binary finite fields“. V Gayoso Martínez, L Hernández Encinas…. 2011. Springer … Intelligence in Security …. 9 cites.
- “The implementation of Elliptic Curve binary finite field (F 2m) for the global smart card“. T Abdurahmonov, ET Yeoh…. 2010. ieeexplore.ieee.org … (SCOReD), 2010 IEEE …. 9 cites.
- “Blind signature schemes based on the elliptic curve discrete logarithm problem“. C Popescu. 2010. sic.ici.ro Studies in Informatics and Control. 9 cites.
- “Accelerating elliptic curve point multiplication through batched inversions“. N Gura, SC Fung, D Stebila, H Eberle. 2010. Google Patents US Patent 7,702,105. 9 cites.
- “Use of GOST signature algorithms in DNSKEY and RRSIG Resource Records for DNSSEC“. V Dolmatov. 2010. buildbot.tools.ietf.org . 9 cites.
- “Securing MMS with high performance elliptic curve cryptography“. BN Jagdale, RK Bedi, S Desai. 2010. pdfs.semanticscholar.org International Journal of …. 9 cites.
- “Elliptic Curve Cryptography (ECC) Support for Public Key Cryptography for Initial Authentication in Kerberos (PKINIT)“. L Zhu, K Lauter, K Jaganathan. 2008. tools.ietf.org . 9 cites.
- “Hybrid binary-ternary joint sparse form and its application in elliptic curve cryptography“. J Adikari, V Dimitrov, L Imbert. 2008. Citeseer . 9 cites.
- “Efficient FPGA elliptic curve cryptographic processor over GF (2 m)“. S Antao, R Chaves, L Sousa. 2008. ieeexplore.ieee.org ICECE Technology, 2008. FPT …. 9 cites.
- “Cryptoprocessor for Elliptic Curve Digital Signature Algorithm (ECDSA)“. K Jarvinen, J Skytta. 2007. Helsinki University of Technology, Finland August. 9 cites.
- “Supporting symmetric 128-bit AES in networked embedded systems: An elliptic curve key establishment protocol-on-chip“. R Duraisamy, Z Salcic, MA Strangio…. 2007. dl.acm.org EURASIP Journal on …. 9 cites.
- “A new security protocol based on elliptic curve cryptosystems for securing wireless sensor networks“. SC Seo, HC Kim, RS Ramakrishna. 2006. Springer EUC Workshops. 9 cites.
- “Simple power analysis on fast modular reduction with generalized mersenne prime for elliptic curve cryptosystems“. Y Sakai, K Sakurai. 2006. search.ieice.org IEICE Transactions on Fundamentals of …. 9 cites.
- “Implementation of Elliptic Curve Diffie-HeUman and EC Encryption Schemes“. K Rabah. 2005. docsdrive.com Information technology journal. 9 cites.
- “Elliptic curve scalar point multiplication using radix-4 Booth’s algorithm [cryptosystems]“. S Moon. 2004. ieeexplore.ieee.org … and Information Technology, 2004. ISCIT 2004. IEEE …. 9 cites.
- “the selection of secure elliptic curves and their base points over GF (P)[J]“. ZFWCW Yumin. 2002. en.cnki.com.cn Journal of Electronics and Information Technology. 9 cites.
- “Fail-stop threshold signature schemes based on elliptic curves“. W Susilo, R Safavi-Naini, J Pieprzyk. 1999. Springer Lecture notes in computer science. 9 cites.
- “Speeding up the computations of elliptic curves cryptoschemes“. CS Laih, WC Kuo. 1997. Elsevier Computers & Mathematics with Applications. 9 cites.
- “X9. 62 The elliptic curve digital signature algorithm (ECDSA)“. A ANSI. 0. . 9 cites.
- “Elliptic Curve-Based Certificateless Signatures for Identity-Based Encryption (ECCSI)“. M Groves. 2012. tools.ietf.org . 8 cites.
- “Make a Secure Connection Using Elliptic Curve Digital Signature“. H Modares, MT Shahgoli…. 2012. pdfs.semanticscholar.org … of Scientific & …. 8 cites.
- “Digital Signature and Encrypt Algorithm Based on Elliptic Curve [J]“. DW Xu, W Chen. 2011. en.cnki.com.cn Computer Engineering. 8 cites.
- “Fast algorithm for scalar multiplication in elliptic curves cryptography [J]“. L LIU, Y SHEN. 2009. en.cnki.com.cn Application Research of Computers. 8 cites.
- “A comparative and overview analysis of Elliptic Curve Cryptography over finite fields“. M Prabu, R Shanmugalakshmi. 2009. ieeexplore.ieee.org Information and Multimedia …. 8 cites.
- “A protocol for digital signature based on the elliptic curve discrete logarithm problem“. M Nikooghadam, MR Bonyadi, E Malekian…. 2008. researchgate.net Journal of Applied …. 8 cites.
- “A new secure e-mail scheme based on Elliptic Curve Cryptography Combined Public Key“. Y Zhang, T Cui, H Tang. 2008. ieeexplore.ieee.org Network and Parallel Computing …. 8 cites.
- “Cryptography method on elliptic curves“. JS Coron, C Tymen. 2007. Google Patents US Patent 7,218,735. 8 cites.
- “A fast elliptic curve based key agreement protocol-on-chip (PoC) for securing networked embedded systems“. R Duraisamy, Z Salcic…. 2006. ieeexplore.ieee.org Embedded and Real …. 8 cites.
- “Deployments of Elliptic Curve Cryptography“. S Vanstone. 2005. cr.yp.to the 9th Workshop on Elliptic Curve Cryptography (ECC …. 8 cites.
- “A security scheme of electronic commerce for mobile agents uses undetachable digital signatures“. Y Shi, L Cao, X Wang. 2004. dl.acm.org Proceedings of the 3rd international conference …. 8 cites.
- “Blind signature and off-line e-cash system based on elliptic curve“. T Guo, Z Li, J Peng, S Wu. 2003. en.cnki.com.cn JOURNAL-CHINA INSTITUTE OF …. 8 cites.
- “New algorithms and architectures for arithmetic in gf (2 (m)) suitable for elliptic curve cryptography“. FJ Rodriguez-Henriquez. 2000. dl.acm.org . 8 cites.
- “Elliptic Curve Algorithms for Cryptographic Message Syntax (CMS) Asymmetric Key Package Content Type“. S Turner. 2011. tools.ietf.org . 7 cites.
- “Elliptic Curve Cryptography Enabled Security for Wireless Communication“. C Sajeev, GJA Jose. 2010. enggjournals.com International Journal Of Computer Science …. 7 cites.
- “A zero-knowledge proof of digital signature scheme based on the elliptic curve cryptosystem“. C Qi. 2009. ieeexplore.ieee.org … Information Technology Application, 2009. IITA 2009 …. 7 cites.
- “Elliptic curve cryptography on pocketpcs“. K Edoh. 2009. researchgate.net International Journal of Security and Its Applications. 7 cites.
- “Improved authentication and key agreement protocol using elliptic curve cryptography“. A Chandrasekar, VR Rajasekar…. 2009. researchgate.net International Journal of …. 7 cites.
- “An elliptic curve backdoor algorithm for RSASSA“. A Young, M Yung. 2006. Springer Information Hiding. 7 cites.
- “Method of elliptic curve digital signature using expansion in joint sparse form“. JA Solinas. 2006. Google Patents US Patent 7,024,559. 7 cites.
- “Using the elliptic curve signature algorithm (ECDSA) for XML digital signatures“. S Blake-Wilson, G Karlinger, T Kobayashi, Y Wang. 2005. rfc-editor.org . 7 cites.
- “A Discussion of Elliptic Curve Cryptography and Configurable ECC System Design with Application to Distributed Simulation“. PH Roberts, RN Zobel. 2004. ijssst.info International Journal of Simulation. 7 cites.
- “VLSI implementation of parameters selectable high-speed elliptic curve cryptosystems“. X ZENG, X ZHOU, B SHEN, W LI, C CHEN…. 2003. en.cnki.com.cn Journal of China …. 7 cites.
- “Proposed Developments of Blind Signature Scheme based on The Elliptic Curve Discrete Logarithm Problem“. EH El Kinani, F Amounas. 2013. comengapp.ilkom.unsri.ac.id Computer …. 6 cites.
- “Fault attack to the elliptic curve digital signature algorithm with multiple bit faults“. A Barenghi, GM Bertoni, L Breveglieri…. 2011. dl.acm.org Proceedings of the 4th …. 6 cites.
- “Implementation of Elliptic Curve Cryptographic coprocessor over GF (2163) for ECC protocols“. Y Choi, HW Kim, MS Kim. 2002. pdfs.semanticscholar.org Proceedings of the 2002 …. 6 cites.
- “X9. 62-1998: Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA)“. A ANSI. 1998. … National Standards Institute (ANSI), Washington, DC. 6 cites.
- “A blind digital signature scheme using elliptic curve digital signature algorithm“. İ BÜTÜN, M DEMİRER. 2013. journals.tubitak.gov.tr Turkish Journal of Electrical …. 5 cites.
- “Blind signature scheme based on improved elliptic curve digital signature algorithm“. L Wan, FW Li, SJ Yan. 2011. en.cnki.com.cn Jisuanji Yingyong Yanjiu. 5 cites.
———————————————————-
(Featured Image: The Third Eye Drops)