Articles citing this article

The Citing articles tool gives a list of articles citing the current article.
The citing articles come from EDP Sciences database, as well as other publishers participating in CrossRef Cited-by Linking Program. You can set up your personal account to receive an email alert each time this article is cited by a new article (see the menu on the right-hand side of the abstract page).

Cited article:

This article has been cited by the following article(s):

Hybrid Binary-Ternary Number System for Elliptic Curve Cryptosystems

Jithra Adikari, Vassil S. Dimitrov and Laurent Imbert
IEEE Transactions on Computers 60 (2) 254 (2011)
DOI: 10.1109/TC.2010.138
See this article

Iterative sliding window method for shorter number of operations in modular exponentiation and scalar multiplication

Adamu Muhammad Noma, Abdullah Muhammed, Zuriati Ahmad Zukarnain, Muhammad Afendee Mohamed and Duc Pham
Cogent Engineering 4 (1) 1304499 (2017)
DOI: 10.1080/23311916.2017.1304499
See this article

Stern polynomials

Sandi Klavžar, Uroš Milutinović and Ciril Petr
Advances in Applied Mathematics 39 (1) 86 (2007)
DOI: 10.1016/j.aam.2006.01.003
See this article

Optimal left-to-right binary signed-digit recoding

M. Joye and Sung-Ming Yen
IEEE Transactions on Computers 49 (7) 740 (2000)
DOI: 10.1109/12.863044
See this article

A Survey of Fast Exponentiation Methods

Daniel M. Gordon
Journal of Algorithms 27 (1) 129 (1998)
DOI: 10.1006/jagm.1997.0913
See this article

Efficient algorithms for speeding up the computations of elliptic curve cryptosystems

Woei-Jiunn Tsaur and Chih-Ho Chou
Applied Mathematics and Computation 168 (2) 1045 (2005)
DOI: 10.1016/j.amc.2004.10.010
See this article

Signed digit representations of minimal Hamming weight

S. Arno and F.S. Wheeler
IEEE Transactions on Computers 42 (8) 1007 (1993)
DOI: 10.1109/12.238495
See this article

Jean-Sébastien Coron, David M’Raïhi and Christophe Tymen
2259 151 (2001)
DOI: 10.1007/3-540-45537-X_12
See this article

Dong-Guk Han, Nam Su Chang, Seok Won Jung, Young-Ho Park, Chang Han Kim and Heuisu Ryu
2727 67 (2003)
DOI: 10.1007/3-540-45067-X_7
See this article

Elisabeth Oswald and Manfred Aigner
2162 39 (2001)
DOI: 10.1007/3-540-44709-1_5
See this article

Gildas Avoine, Jean Monnerat and Thomas Peyrin
3348 260 (2004)
DOI: 10.1007/978-3-540-30556-9_21
See this article

Runhua Shi and Jiaxing Cheng
3619 462 (2005)
DOI: 10.1007/11534310_50
See this article

Shorter addition chain for smooth integers using decomposition method

M. A. Mohamed, M. R. Md Said, K. A. Mohd Atan and Z. Ahmad Zulkarnain
International Journal of Computer Mathematics 88 (11) 2222 (2011)
DOI: 10.1080/00207160.2010.543456
See this article

On Bellman’s and Knuth’s Problems and their Generalizations

V. V. Kochergin
Journal of Mathematical Sciences 233 (1) 103 (2018)
DOI: 10.1007/s10958-018-3928-4
See this article

Jae Cheol Ha and Sang Jae Moon
2523 551 (2003)
DOI: 10.1007/3-540-36400-5_40
See this article

Pierre-Alain Fouque and Frederic Valette
2779 269 (2003)
DOI: 10.1007/978-3-540-45238-6_22
See this article

Minimal expansions in redundant number systems: Fibonacci bases and Greedy algorithms

Clemens Heuberger
Periodica Mathematica Hungarica 49 (2) 65 (2004)
DOI: 10.1007/s10998-004-0523-x
See this article

Asymptotic expansions for linear homogeneous divide-and-conquer recurrences: Algebraic and analytic approaches collated

Philippe Dumas
Theoretical Computer Science 548 25 (2014)
DOI: 10.1016/j.tcs.2014.06.036
See this article

An Improved Binary Method for Scalar Multiplication in Elliptic Curve Cryptography

Journal of Mathematics and Statistics 6 (1) 28 (2010)
DOI: 10.3844/jmssp.2010.28.33
See this article

Joppe W. Bos and Thorsten Kleinjung
7658 467 (2012)
DOI: 10.1007/978-3-642-34961-4_29
See this article

Atsuko Miyaji, Takatoshi Ono and Henri Cohen
1334 282 (1997)
DOI: 10.1007/BFb0028484
See this article

Scalar Multiplication on Elliptic Curves by Frobenius Expansions

Jung Hee Cheon, Sangjoon Park, Choonsik Park and Sang Geun Hahn
ETRI Journal 21 (1) 28 (1999)
DOI: 10.4218/etrij.99.0199.0102
See this article

Haodong Wang and Qun Li
4307 519 (2006)
DOI: 10.1007/11935308_37
See this article

On the minimum path problem in Knödel graphs

Hovhannes A. Harutyunyan and Calin D. Morosan
Networks 50 (1) 86 (2007)
DOI: 10.1002/net.20169
See this article

Tetsuya Izu and Tsuyoshi Takagi
2274 280 (2002)
DOI: 10.1007/3-540-45664-3_20
See this article

Joppe W. Bos, Craig Costello, Huseyin Hisil and Kristin Lauter
7881 194 (2013)
DOI: 10.1007/978-3-642-38348-9_12
See this article

On the Number of Optimal Base 2 Representations of Integers

Peter J. Grabner and Clemens Heuberger
Designs, Codes and Cryptography 40 (1) 25 (2006)
DOI: 10.1007/s10623-005-6158-y
See this article

Nashwa A. F. Mohamed, Mohsin H. A. Hashim and Michael Hutter
7374 342 (2012)
DOI: 10.1007/978-3-642-31410-0_21
See this article

On-line evaluation of powers using Euclid's algorithm

Srećko Brlek, Pierre Castéran, Laurent Habsieger and Richard Mallette
RAIRO - Theoretical Informatics and Applications 29 (5) 431 (1995)
DOI: 10.1051/ita/1995290504311
See this article

Closed-form expression for the average weight of signed-digit representations

Huapeng Wu and M.A. Hasan
IEEE Transactions on Computers 48 (8) 848 (1999)
DOI: 10.1109/12.795126
See this article

Jean-Sébastien Coron
1717 292 (1999)
DOI: 10.1007/3-540-48059-5_25
See this article

Kenji Koyama and Yukio Tsuruoka
740 345 (1993)
DOI: 10.1007/3-540-48071-4_25
See this article

Michael Brown, Darrel Hankerson, Julio López and Alfred Menezes
2020 250 (2001)
DOI: 10.1007/3-540-45353-9_19
See this article

Raúl Gouet and Jorge Olivos
27 (1994)
DOI: 10.1007/978-1-4757-9805-0_5
See this article

L. Gao, Hanbo Lee and G.E. Sobelman
304 (1999)
DOI: 10.1109/FPGA.1999.803707
See this article

Fast elliptic scalar multiplication using new double-base chain and point halving

K.W. Wong, Edward C.W. Lee, L.M. Cheng and Xiaofeng Liao
Applied Mathematics and Computation 183 (2) 1000 (2006)
DOI: 10.1016/j.amc.2006.05.111
See this article

Christophe Doche, Thomas Icart and David R. Kohel
3958 191 (2006)
DOI: 10.1007/11745853_13
See this article

Roghaie Mahdavi and Abolghasem Saiadian
6467 184 (2010)
DOI: 10.1007/978-3-642-17619-7_14
See this article

Maurice Keller and William Marnane
4644 310 (2007)
DOI: 10.1007/978-3-540-74442-9_30
See this article

Complexity and fast algorithms for multiexponentiations

V.S. Dimitrov, G.A. Jullien and W.C. Miller
IEEE Transactions on Computers 49 (2) 141 (2000)
DOI: 10.1109/12.833110
See this article

Johannes Blömer, Martin Otto and Jean-Pierre Seifert
4236 36 (2006)
DOI: 10.1007/11889700_4
See this article


Journal of the Australian Mathematical Society 89 (2) 233 (2010)
DOI: 10.1017/S1446788710001503
See this article

Xiang Wang, Liping Wang, Yuanchen Bai, Zhenxue He, Tao Wang, Bin Xu, He Zhang, Xiaocui Wang, Cheng Zhou, Weike Wang and Pei Du
1397 (2015)
DOI: 10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.252
See this article

Matching for random systems with an application to minimal weight expansions

Karma Dajani, Charlene Kalle and Marta Maggioni
Nonlinearity 34 (6) 3676 (2021)
DOI: 10.1088/1361-6544/abebc6
See this article

Flexible Architectures for Cryptographic Algorithms — A Systematic Literature Review

Muhammad Rashid, Malik Imran, Atif Raza Jafri and Turki F. Al-Somani
Journal of Circuits, Systems and Computers 28 (03) 1930003 (2019)
DOI: 10.1142/S0218126619300034
See this article

Comparison of scalar point multiplication algorithms in a low resource device

Mohamed Ramdani, Mohamed Benmohammed and Nadjia Benblidia
Journal of King Saud University - Computer and Information Sciences 32 (4) 425 (2020)
DOI: 10.1016/j.jksuci.2019.07.013
See this article

Katsuyuki Okeya and Kouichi Sakurai
2384 420 (2002)
DOI: 10.1007/3-540-45450-0_32
See this article

Abhraneel Dutta, Aaron Hutchinson and Koray Karabina
12578 248 (2020)
DOI: 10.1007/978-3-030-65277-7_11
See this article

Elliptic curves and primality proving

A. O. L. Atkin and F. Morain
Mathematics of Computation 61 (203) 29 (1993)
DOI: 10.1090/S0025-5718-1993-1199989-X
See this article

David Jao, S. Ramesh Raju and Ramarathnam Venkatesan
4665 105 (2007)
DOI: 10.1007/978-3-540-74871-7_10
See this article

Jung Hee Cheon, Sungmo Park, Sangwoo Park and Daeho Kim
1431 195 (1998)
DOI: 10.1007/BFb0054025
See this article

Christophe Doche and Laurent Imbert
4329 335 (2006)
DOI: 10.1007/11941378_24
See this article

Mathieu Ciet and Marc Joye
2836 348 (2003)
DOI: 10.1007/978-3-540-39927-8_32
See this article

Mathieu Ciet and Francesco Sica
3715 171 (2005)
DOI: 10.1007/11554868_12
See this article

A Generalization of Addition Chains and Fast Inversions in Binary Fields

Kimmo Jarvinen, Vassil Dimitrov and Reza Azarderakhsh
IEEE Transactions on Computers 64 (9) 2421 (2015)
DOI: 10.1109/TC.2014.2375182
See this article

Henri Cohen, Atsuko Miyaji and Takatoshi Ono
1514 51 (1998)
DOI: 10.1007/3-540-49649-1_6
See this article

Symmetric digit sets for elliptic curve scalar multiplication without precomputation

Clemens Heuberger and Michela Mazzoli
Theoretical Computer Science 547 18 (2014)
DOI: 10.1016/j.tcs.2014.06.010
See this article

Automatic average-case analysis of algorithms

Philippe Flajolet, Bruno Salvy and Paul Zimmermann
Theoretical Computer Science 79 (1) 37 (1991)
DOI: 10.1016/0304-3975(91)90145-R
See this article

Unbalanced digit sets and the closest choice strategy for minimal weight integer representations

Clemens Heuberger and James A. Muir
Designs, Codes and Cryptography 52 (2) 185 (2009)
DOI: 10.1007/s10623-009-9276-0
See this article

Inversion-free arithmetic on elliptic curves through isomorphisms

Raveen R. Goundar and Marc Joye
Journal of Cryptographic Engineering 6 (3) 187 (2016)
DOI: 10.1007/s13389-016-0131-8
See this article

Hardware architectures for public key cryptography

Lejla Batina, Sıddıka Berna Örs, Bart Preneel and Joos Vandewalle
Integration 34 (1-2) 1 (2003)
DOI: 10.1016/S0167-9260(02)00053-6
See this article

Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle and Sheueling Chang Shantz
3156 119 (2004)
DOI: 10.1007/978-3-540-28632-5_9
See this article

Elliptic curve scalar multiplication algorithm using complementary recoding

P. Balasubramaniam and E. Karthikeyan
Applied Mathematics and Computation 190 (1) 51 (2007)
DOI: 10.1016/j.amc.2007.01.015
See this article

Christophe Doche
8874 297 (2014)
DOI: 10.1007/978-3-662-45611-8_16
See this article

Sujoy Sinha Roy, Chester Rebeiro and Debdeep Mukhopadhyay
553 (2012)
DOI: 10.1109/DSD.2012.10
See this article

Éric Brier and Marc Joye
2274 335 (2002)
DOI: 10.1007/3-540-45664-3_24
See this article

Erik De Win, Serge Mister, Bart Preneel and Michael Wiener
1423 252 (1998)
DOI: 10.1007/BFb0054867
See this article

Komathy K and Narayanasamy P
61 (2006)
DOI: 10.1109/ICCGI.2006.64
See this article

Robert P. Gallant, Robert J. Lambert and Scott A. Vanstone
2139 190 (2001)
DOI: 10.1007/3-540-44647-8_11
See this article

E. Karthikeyan and P. Balasubramaniam
254 (2006)
DOI: 10.1109/ICINFA.2006.374122
See this article

BaiJie Kuang, YueFei Zhu and YaJuan Zhang
3089 467 (2004)
DOI: 10.1007/978-3-540-24852-1_34
See this article

Modified Lim-Lee Combing Using Signed Window and Direct Doublings

Eswar Karthikeyan
Information Security Journal: A Global Perspective 18 (5) 267 (2009)
DOI: 10.1080/19393550903317062
See this article

Elliptic-curve scalar multiplication algorithm using ZOT structure

Hani Almimi, Azman Samsudin and Shahram Jahani
Security and Communication Networks 8 (6) 1141 (2015)
DOI: 10.1002/sec.1047
See this article

Speeding up the Elliptic Curve Scalar Multiplication Using Non Adjacent Form

Najlae Falah Hameed Al Saffar and Mohamad Rushdan Md Said
Journal of Discrete Mathematical Sciences and Cryptography 18 (6) 801 (2015)
DOI: 10.1080/09720529.2015.1023538
See this article

Elliptic Curve Cryptography Engineering

A. Cilardo, L. Coppolino, N. Mazzocca and L. Romano
Proceedings of the IEEE 94 (2) 395 (2006)
DOI: 10.1109/JPROC.2005.862438
See this article

Marc Joye and Sung-Ming Yen
2274 375 (2002)
DOI: 10.1007/3-540-45664-3_27
See this article

On the minimal Hamming weight of a multi-base representation

Daniel Krenn, Vorapong Suppakitpaisarn and Stephan Wagner
Journal of Number Theory 208 168 (2020)
DOI: 10.1016/j.jnt.2019.07.023
See this article

Katsuyuki Okeya and Kouichi Sakurai
2523 564 (2003)
DOI: 10.1007/3-540-36400-5_41
See this article

Erik Dahmen, Katsuyuki Okeya and Tsuyoshi Takagi
3813 189 (2005)
DOI: 10.1007/11601494_16
See this article

On the low hamming weight discrete logarithm problem for nonadjacent representations

J.A. Muir and D.R. Stinson
Applicable Algebra in Engineering, Communication and Computing 16 (6) 461 (2006)
DOI: 10.1007/s00200-005-0187-7
See this article

Luke O’Connor
1592 375 (1999)
DOI: 10.1007/3-540-48910-X_26
See this article

The Hamming weight of the non-adjacent-form under various input statistics

Clemens Heuberger and Helmut Prodinger
Periodica Mathematica Hungarica 55 (1) 81 (2007)
DOI: 10.1007/s10998-007-3081-z
See this article

Accelerated precomputation points-based scalar reduction on elliptic curve cryptography for wireless sensor networks

Youssou Faye, Hervé Guyennet, Shou Yanbo and Ibrahima Niang
International Journal of Communication Systems 30 (16) e3327 (2017)
DOI: 10.1002/dac.3327
See this article

Anil Pinapati and R. Padmavathy
556 9 (2019)
DOI: 10.1007/978-981-13-7091-5_2
See this article

Efficient scalar multiplication for elliptic curves over binary fields

Haihua Gu, Dawu Gu and Ya Liu
Wuhan University Journal of Natural Sciences 13 (6) 717 (2008)
DOI: 10.1007/s11859-008-0616-0
See this article

Fanyu Kong, Jia Yu, Zhun Cai and Daxing Li
299 (2006)
DOI: 10.1109/ICHIT.2006.253503
See this article

Nizar Ben Neji and Adel Bouhoula
24 (2011)
DOI: 10.1109/HPSR.2011.5985999
See this article

André Weimerskirch, Christof Paar and Sheueling Chang Shantz
2119 502 (2001)
DOI: 10.1007/3-540-47719-5_39
See this article

Tae-Jun Park, Mun-Kyu Lee and Kunsoo Park
2587 264 (2003)
DOI: 10.1007/3-540-36552-4_19
See this article

An Improved Signed Digit Representation of Integers

Arash Eghdamian and Azman Samsudin
Indian Journal of Science and Technology 10 (39) 1 (2017)
DOI: 10.17485/ijst/2017/v10i39/119863
See this article

Lijun Gao, Sarvesh Shrivastava and Gerald E. Sobelman
1717 257 (1999)
DOI: 10.1007/3-540-48059-5_22
See this article

Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmetic

Raveen R. Goundar, Marc Joye, Atsuko Miyaji, Matthieu Rivain and Alexandre Venelli
Journal of Cryptographic Engineering 1 (2) 161 (2011)
DOI: 10.1007/s13389-011-0012-0
See this article

Rudolf Ahlswede
12 225 (2016)
DOI: 10.1007/978-3-319-31515-7_4
See this article

Mathieu Ciet, Tanja Lange, Francesco Sica and Jean-Jacques Quisquater
2656 388 (2003)
DOI: 10.1007/3-540-39200-9_24
See this article

Fast Cryptography in Genus 2

Joppe W. Bos, Craig Costello, Huseyin Hisil and Kristin Lauter
Journal of Cryptology 29 (1) 28 (2016)
DOI: 10.1007/s00145-014-9188-7
See this article

Redundant τ-Adic Expansions II: Non-Optimality and Chaotic Behaviour

Clemens Heuberger
Mathematics in Computer Science 3 (2) 141 (2010)
DOI: 10.1007/s11786-009-0014-9
See this article

Efficient scalar multiplication of ECC using SMBR and fast septuple formula for IoT

Chong Guo and Bei Gong
EURASIP Journal on Wireless Communications and Networking 2021 (1) (2021)
DOI: 10.1186/s13638-021-01967-7
See this article

Hui Li, Zhonghua Liu and Junkai Yi
488 (2014)
DOI: 10.1109/ICSESS.2014.6933612
See this article

Mathieu Ciet, Quisquater Jean-Jacques and Francesco Sica
2247 108 (2001)
DOI: 10.1007/3-540-45311-3_11
See this article

Katsuyuki Okeya, Hidehiro Kato and Yasuyuki Nogami
6047 67 (2010)
DOI: 10.1007/978-3-642-12827-1_6
See this article

Christophe Doche and Daniel Sutantyo
8282 456 (2014)
DOI: 10.1007/978-3-662-43414-7_23
See this article

An Innovative Scalar Multiplication Method Based on Improved m-ary

Wenxue Tan, Yiyan Fan, Xiping Wang and Xiaoping Lou
Journal of Software 7 (11) (2012)
DOI: 10.4304/jsw.7.11.2470-2477
See this article

V.S. Dimitrov, G.A. Jullien and W.C. Miller
208 (1997)
DOI: 10.1109/ARITH.1997.614897
See this article

Elliptic and hyperelliptic curves on embedded μP

Thomas Wollinger, Jan Pelzl, Volker Wittelsberger, Christof Paar, Gökay Saldamli and Çetin K. Koç
ACM Transactions on Embedded Computing Systems 3 (3) 509 (2004)
DOI: 10.1145/1015047.1015051
See this article

Distribution results for low-weight binary representations for pairs of integers

Peter J. Grabner, Clemens Heuberger and Helmut Prodinger
Theoretical Computer Science 319 (1-3) 307 (2004)
DOI: 10.1016/j.tcs.2004.02.012
See this article

New and Improved Methods to Analyze and Compute Double-Scalar Multiplications

Christophe Doche and Daniel Sutantyo
IEEE Transactions on Computers 63 (1) 230 (2014)
DOI: 10.1109/TC.2012.184
See this article

Darrel Hankerson, Julio López Hernandez and Alfred Menezes
1965 1 (2000)
DOI: 10.1007/3-540-44499-8_1
See this article

Yongfei Han, Peng-Chor Leong, Peng-Chong Tan and Jiang Zhang
1716 75 (1999)
DOI: 10.1007/978-3-540-48000-6_8
See this article

Analysis of linear combination algorithms in cryptography

Peter J. Grabner, Clemens Heuberger, Helmut Prodinger and Jörg M. Thuswaldner
ACM Transactions on Algorithms 1 (1) 123 (2005)
DOI: 10.1145/1077464.1077473
See this article

Arithmetic Considerations for Isogeny-Based Cryptography

Joppe W. Bos and Simon J. Friedberger
IEEE Transactions on Computers 68 (7) 979 (2019)
DOI: 10.1109/TC.2018.2851238
See this article

Binary signed-digit integers and the Stern diatomic sequence

Laura Monroe
Designs, Codes and Cryptography 89 (12) 2653 (2021)
DOI: 10.1007/s10623-021-00903-6
See this article

James A. Muir and Douglas R. Stinson
3006 306 (2004)
DOI: 10.1007/978-3-540-24654-1_22
See this article

Nevine Ebeid and M. Anwar Hasan
3006 58 (2004)
DOI: 10.1007/978-3-540-24654-1_5
See this article

Radix-2 w Arithmetic for Scalar Multiplication in Elliptic Curve Cryptography

Abdelkrim Kamel Oudjida and Ahmed Liacha
IEEE Transactions on Circuits and Systems I: Regular Papers 68 (5) 1979 (2021)
DOI: 10.1109/TCSI.2021.3054781
See this article

Fanyu Kong and Daxing Li
3810 223 (2005)
DOI: 10.1007/11599371_19
See this article

Erik Woodward Knudsen
1716 135 (1999)
DOI: 10.1007/978-3-540-48000-6_12
See this article

Marc Joye and Christophe Tymen
1992 353 (2001)
DOI: 10.1007/3-540-44586-2_26
See this article

Alternative Digit Sets for Nonadjacent Representations

James A. Muir and Douglas R. Stinson
SIAM Journal on Discrete Mathematics 19 (1) 165 (2005)
DOI: 10.1137/S0895480103437651
See this article

Gurmeet Singh Manku and Joe Sawada
3669 438 (2005)
DOI: 10.1007/11561071_40
See this article

Minimal weight and colexicographically minimal integer representations

Clemens Heuberger and James A. Muir
Journal of Mathematical Cryptology 1 (4) (2007)
DOI: 10.1515/jmc.2007.015
See this article

Pierre-Alain Fouque, Frédéric Muller, Guillaume Poupard and Frédéric Valette
3156 312 (2004)
DOI: 10.1007/978-3-540-28632-5_23
See this article

Minimal weight expansions in Pisot bases

Christiane Frougny and Wolfgang Steiner
Journal of Mathematical Cryptology 2 (4) (2008)
DOI: 10.1515/JMC.2008.017
See this article

Analysis of fractional window recoding methods and their application to elliptic curve cryptosystems

K. Schmidt-Samoa, O. Semay and T. Takagi
IEEE Transactions on Computers 55 (1) 48 (2006)
DOI: 10.1109/TC.2006.3
See this article