Jerome A. Solinas
National Security Agency
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jerome A. Solinas.
Designs, Codes and Cryptography | 2003
Laurie Law; Alfred Menezes; Minghua Qu; Jerome A. Solinas; Scott A. Vanstone
This paper proposes an efficient two-pass protocol for authenticated key agreement in the asymmetric (public-key) setting. The protocol is based on Diffie-Hellman key agreement and can be modified to work in an arbitrary finite group and, in particular, elliptic curve groups. Two modifications of this protocol are also presented: a one-pass authenticated key agreement protocol suitable for environments where only one entity is on-line, and a three-pass protocol in which key confirmation is additionally provided. Variants of these protocols have been standardized in IEEE P1363 [17], ANSI X9.42 [2], ANSI X9.63 [4] and ISO 15496-3 [18], and are currently under consideration for standardization and by the U.S. governments National Institute for Standards and Technology [30].
public key cryptography | 2000
Jerome A. Solinas
It has become increasingly common to implement discrete-logarithm based public-key protocols on elliptic curves over finite fields. The basic operation is scalar multiplication: taking a given integer multiple of a given point on the curve. The cost of the protocols depends on that of the elliptic scalar multiplication operation.Koblitz introduced a family of curves which admit especially fast elliptic scalar multiplication. His algorithm was later modified by Meier and Staffelbach. We give an improved version of the algorithm which runs 50 than any previous version. It is based on a new kind of representation of an integer, analogous to certain kinds of binary expansions. We also outline further speedups using precomputation and storage.
international cryptology conference | 1997
Jerome A. Solinas
It has become increasingly common to implement discrete-logarithm based public-key protocols on elliptic curves over finite fields. The basic operation is scalar multiplication: taking a given integer multiple of a given point on the curve. The cost of the protocols depends on that of the elliptic scalar multiplication operation.
Designs, Codes and Cryptography | 2005
Ezra Brown; Bruce T. Myers; Jerome A. Solinas
We present a family of hyperelliptic curves whose Jacobians are suitable for cryptographic use, and whose parameters can be specified in a highly efficient way. This is done via complex multiplication and identity-based parameters. We also present some novel computational shortcuts for these families.
Archive | 1998
Robert W. Reiter; Jerome A. Solinas
Archive | 2001
Jerome A. Solinas
Archive | 1998
Robert W. Reiter; Jerome A. Solinas
Archive | 2001
Jerome A. Solinas
Archive | 2002
Jerome A. Solinas
Archive | 2002
Jerome A. Solinas