Articles citing this article

The Citing articles tool gives a list of articles citing the current article.
The citing articles come from EDP Sciences database, as well as other publishers participating in CrossRef Cited-by Linking Program. You can set up your personal account to receive an email alert each time this article is cited by a new article (see the menu on the right-hand side of the abstract page).

Cited article:

This article has been cited by the following article(s):

Hybrid Binary-Ternary Number System for Elliptic Curve Cryptosystems

Jithra Adikari, Vassil S. Dimitrov and Laurent Imbert
IEEE Transactions on Computers 60 (2) 254 (2011)
DOI: 10.1109/TC.2010.138
See this article

Closed-form expression for the average weight of signed-digit representations

Huapeng Wu and M.A. Hasan
IEEE Transactions on Computers 48 (8) 848 (1999)
DOI: 10.1109/12.795126
See this article

Elliptic-curve scalar multiplication algorithm using ZOT structure

Hani Almimi, Azman Samsudin and Shahram Jahani
Security and Communication Networks 8 (6) 1141 (2015)
DOI: 10.1002/sec.1047
See this article

Speeding up the Elliptic Curve Scalar Multiplication Using Non Adjacent Form

Najlae Falah Hameed Al Saffar and Mohamad Rushdan Md Said
Journal of Discrete Mathematical Sciences and Cryptography 18 (6) 801 (2015)
DOI: 10.1080/09720529.2015.1023538
See this article

Fast Cryptography in Genus 2

Joppe W. Bos, Craig Costello, Huseyin Hisil and Kristin Lauter
Journal of Cryptology 29 (1) 28 (2016)
DOI: 10.1007/s00145-014-9188-7
See this article

Distribution results for low-weight binary representations for pairs of integers

Peter J. Grabner, Clemens Heuberger and Helmut Prodinger
Theoretical Computer Science 319 (1-3) 307 (2004)
DOI: 10.1016/j.tcs.2004.02.012
See this article

Inversion-free arithmetic on elliptic curves through isomorphisms

Raveen R. Goundar and Marc Joye
Journal of Cryptographic Engineering 6 (3) 187 (2016)
DOI: 10.1007/s13389-016-0131-8
See this article

Iterative sliding window method for shorter number of operations in modular exponentiation and scalar multiplication

Adamu Muhammad Noma, Abdullah Muhammed, Zuriati Ahmad Zukarnain, Muhammad Afendee Mohamed and Duc Pham
Cogent Engineering 4 (1) (2017)
DOI: 10.1080/23311916.2017.1304499
See this article

Optimal left-to-right binary signed-digit recoding

M. Joye and Sung-Ming Yen
IEEE Transactions on Computers 49 (7) 740 (2000)
DOI: 10.1109/12.863044
See this article

Hardware architectures for public key cryptography

Lejla Batina, Sıddıka Berna Örs, Bart Preneel and Joos Vandewalle
Integration, the VLSI Journal 34 (1-2) 1 (2003)
DOI: 10.1016/S0167-9260(02)00053-6
See this article

Fast elliptic scalar multiplication using new double-base chain and point halving

K.W. Wong, Edward C.W. Lee, L.M. Cheng and Xiaofeng Liao
Applied Mathematics and Computation 183 (2) 1000 (2006)
DOI: 10.1016/j.amc.2006.05.111
See this article

Stern polynomials

Sandi Klavžar, Uroš Milutinović and Ciril Petr
Advances in Applied Mathematics 39 (1) 86 (2007)
DOI: 10.1016/j.aam.2006.01.003
See this article

Elliptic curve scalar multiplication algorithm using complementary recoding

P. Balasubramaniam and E. Karthikeyan
Applied Mathematics and Computation 190 (1) 51 (2007)
DOI: 10.1016/j.amc.2007.01.015
See this article

A Survey of Fast Exponentiation Methods

Daniel M. Gordon
Journal of Algorithms 27 (1) 129 (1998)
DOI: 10.1006/jagm.1997.0913
See this article

Complexity and fast algorithms for multiexponentiations

V.S. Dimitrov, G.A. Jullien and W.C. Miller
IEEE Transactions on Computers 49 (2) 141 (2000)
DOI: 10.1109/12.833110
See this article

Accelerated precomputation points-based scalar reduction on elliptic curve cryptography for wireless sensor networks

Youssou Faye, Hervé Guyennet, Shou Yanbo and Ibrahima Niang
International Journal of Communication Systems e3327 (2017)
DOI: 10.1002/dac.3327
See this article

Efficient algorithms for speeding up the computations of elliptic curve cryptosystems

Woei-Jiunn Tsaur and Chih-Ho Chou
Applied Mathematics and Computation 168 (2) 1045 (2005)
DOI: 10.1016/j.amc.2004.10.010
See this article

Analysis of fractional window recoding methods and their application to elliptic curve cryptosystems

K. Schmidt-Samoa, O. Semay and T. Takagi
IEEE Transactions on Computers 55 (1) 48 (2006)
DOI: 10.1109/TC.2006.3
See this article