Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2011
2011
2012
2012

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…The idea to use HEC for cryptographic applications has been further analyzed and implemented in software and hardware oriented platforms by Kuroki et al [26], Sakai and Sakurai [27], Nagao [28], and Smith [29]. We discussed the evolution of Hyperelliptic Curve Cryptosystems in [30].…”
Section: Explicit Formula For Genus 3 Curvesmentioning
confidence: 99%
See 1 more Smart Citation
“…The idea to use HEC for cryptographic applications has been further analyzed and implemented in software and hardware oriented platforms by Kuroki et al [26], Sakai and Sakurai [27], Nagao [28], and Smith [29]. We discussed the evolution of Hyperelliptic Curve Cryptosystems in [30].…”
Section: Explicit Formula For Genus 3 Curvesmentioning
confidence: 99%
“…We have considered the hyperelliptic curve : +1 of genus 3 over the finite field 2 7 . P=( 30 1 (after the first round). The timings have been measured on a PC with an Intel Core 2DUO CPU T6400@ 2.00GHz and windows vista operating system having jdk1.…”
Section: Performance Analysismentioning
confidence: 99%
“…Pelzl and Wollinger [6], [15], [16] propose a cost effective explicit formula for genus 2 and 3 curves and give first implementation of a HEC cryptosystem on an embedded processor. We have discussed Evolution of Hyperelliptic Curve Cryptosystems in [17].…”
Section: Fig 1: Hierarchy Of Operations Of Curve Based Cryptosystemsmentioning
confidence: 99%