@misc{aranha-karabina-longa-gebotys-lopez, | |
author = "D.~F.~Aranha and K.~Karabina and P.~Longa and C.~H.~ Gebotys and J.~Lopez", | |
title = "Faster Explicit Formulae for Computing Pairings over Ordinary Curves", | |
year = "2010", | |
howpublished = "Cryptology ePrint Archive, Report 2010/526", | |
note = {\url{http://eprint.iacr.org/2010/526}}, | |
} | |
@misc{bernstein-chuengsatiansup-lange, | |
author = {Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange}, | |
title = {Curve41417: Karatsuba revisited}, | |
howpublished = {Cryptology ePrint Archive, Report 2014/526}, | |
year = {2014}, | |
note = {\url{http://eprint.iacr.org/2014/526}}, | |
} | |
@article{montgomery, | |
author={Peter L. Montgomery}, | |
title={Modular Multiplication Without Trial Division}, | |
journal={Mathematics of Computation}, | |
volume="44", | |
number="170", | |
pages="519-521", | |
year="1985" | |
} | |
@misc{bos-costello-longa-naehrig, | |
author = {Joppe W. Bos and Craig Costello and Patrick Longa and Michael Naehrig}, | |
title = {Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis}, | |
howpublished = {Cryptology ePrint Archive, Report 2014/130}, | |
year = {2014}, | |
note = {\url{http://eprint.iacr.org/2014/130}}, | |
} | |
@misc{bernstein-duif-lange-schwabe-yang, | |
author = {Daniel J. Bernstein and Niels Duif and Tanja Lange and Peter Schwabe and Bo-Yin Yang}, | |
title = {High-speed high-security signatures}, | |
howpublished = {Cryptology ePrint Archive, Report 2011/368}, | |
year = {2011}, | |
note = {\url{http://eprint.iacr.org/2011/368}}, | |
} | |
@misc{tss, | |
author="Tangible Software Solutions", | |
note={\url{http://www.tangiblesoftwaresolutions.com/}}, | |
} | |
@misc{ml, | |
author="A.~ Miele and A.~K.~Lenstra", | |
title = "Efficient ephemeral elliptic curve cryptographic keys", | |
year="2015", | |
note={\url{http://csrc.nist.gov/groups/ST/ecc-workshop-2015/papers/session1-miele-paper.pdf}}, | |
} | |
@misc{gol, | |
author="Google j2objc", | |
note={\url{https://github.com/google/j2objc}}, | |
} | |
@Inproceedings{bernstein, | |
author={Daniel J. Bernstein}, | |
title={Curve25519: new {D}iffie-{H}ellman speed records}, | |
booktitle="PKC 2006", | |
pages="207--228", | |
publisher="Springer-Verlag", | |
series = "Lecture Notes in Computer Science", | |
volume="3958", | |
year="2006" | |
} | |
@misc{nist, | |
author="National Institute for Standards and Technology", | |
title="Federal Information Processing Standards Publication 186-2", | |
year="2000", | |
note = {\url{http://csrc.nist.gov/publications/fips/archive/fips186-2/fips186-2.pdf}}, | |
} | |
@misc{mpin, | |
author="M. ~Scott", | |
title= "M-{P}in: A Multi-Factor Zero Knowledge Authentication Protocol", | |
year="2014", | |
note={\url{http://www.miracl.com/crypto-labs}}, | |
} | |
@Inproceedings{barreto-naehrig, | |
author="P.S.L.M.~Barreto and M.~Naehrig", | |
title="Pairing-Friendly elliptic curves of prime order", | |
booktitle="Selected Areas in Cryptology -- {SAC} 2005", | |
pages="319--331", | |
publisher="Springer-Verlag", | |
series = "Lecture Notes in Computer Science", | |
volume= "3897", | |
year="2006", | |
} | |
@book{knuth, | |
author = {Knuth, Donald E.}, | |
title = {The Art of Computer Programming, Volume 2 (3rd Ed.): Seminumerical Algorithms}, | |
year = {1997}, | |
isbn = {0-201-89684-2}, | |
publisher = {Addison-Wesley Longman Publishing Co., Inc.}, | |
} | |
@Inproceedings{scott, | |
author="M.~ Scott", | |
title= "Implementing Cryptographic Pairings", | |
booktitle="Pairing 2007", | |
pages="177--196", | |
year="2007", | |
series = "Lecture Notes in Computer Science", | |
volume= "4575" | |
} | |
@article{montgomery2, | |
author={Peter L. Montgomery}, | |
title="Speeding the {P}ollard and Elliptic Curve Methods of Factorisation", | |
journal={Mathematics of Computation}, | |
volume="48", | |
number="177", | |
pages="243-264", | |
year="1987" | |
} | |
@misc{bernstein-lange, | |
author = {Daniel J. Bernstein and Tanja Lange}, | |
title = {Inverted {E}dwards coordinates}, | |
howpublished = {Cryptology ePrint Archive, Report 2007/410}, | |
year = {2007}, | |
note = {\url{http://eprint.iacr.org/2007/410}}, | |
} | |
@misc{brainpool, | |
author="Brainpool", | |
title="{ECC} Brainpool standard curves and curve generation.", | |
year={2005}, | |
note={\url{http://www.ecc-brainpool.org/download/Domain-parameters.pdf}}, | |
} | |
@misc{ANSSI, | |
author="{ANSSI}", | |
title="Publication d'un paramétrage de courbe elliptique visant des applications de passeport électronique et de l'administration électronique française.", | |
year={2011}, | |
note={\url{http://www.legifrance.gouv.fr/affichTexte.do?cidTexte=JORFTEXT000024668816}}, | |
} | |
@misc{certicom, | |
author="Certicom", | |
title="SEC 2: Recommended Elliptic Curve Domain Parameters, Version 2.0", | |
year={2010}, | |
note={\url{ http://www.secg.org/download/aid-784/sec2-v2.pdf }}, | |
} | |