Digital Signature Algorithm

Results: 127



#Item
1

The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces Phong Q. Nguyen∗ ´ D´epartement d’Informatique, Ecole

Add to Reading List

Source URL: pdfs.semanticscholar.org

- Date: 2015-12-07 13:47:51
    2Cryptography / Abstract algebra / Algebra / Group theory / Finite fields / Elliptic curve cryptography / Public-key cryptography / Elliptic curves / Weil pairing / Elliptic curve / Elliptic Curve Digital Signature Algorithm / Discrete logarithm

    ECC Summer School – Exercices Damien RobertCryptography Implement public key encryption and signature with elliptic curves:

    Add to Reading List

    Source URL: www.normalesup.org

    Language: English - Date: 2015-09-25 11:36:46
    3Cryptography / Elliptic curve cryptography / Public-key cryptography / Elliptic Curve Digital Signature Algorithm / Electromagnetic attack / Digital Signature Algorithm / Digital signature / RSA / OpenSSL / Scalar / Matrix / Random number generator attack

    ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels ∗ Daniel Genkin Lev Pachmanov

    Add to Reading List

    Source URL: www.cs.tau.ac.il

    Language: English - Date: 2016-08-19 14:59:40
    4Cryptography / Public-key cryptography / Secret sharing / Key management / Digital signature / Signature / Digital Signature Algorithm / Commitment scheme / Threshold cryptosystem / Semantic security / RSA / Bitcoin

    Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Rosario Gennaro1 , Steven Goldfeder2 , and Arvind Narayanan2 1 City College, City University of New York

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2016-01-26 19:57:17
    5Cryptography / Message authentication codes / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Digital Signature Algorithm / FIPS 140-2 / Dual EC DRBG / OpenSSL / SHA-2 / Hash-based message authentication code

    FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2016-05-26 13:27:36
    6Elliptic curve cryptography / Elliptic Curve Digital Signature Algorithm / Elliptic curve / Multiplier / Multiplication algorithm / CLMUL instruction set / MQV

    Two is the fastest prime Thomaz Oliveira 1 Julio L´ opez 2 Diego F. Aranha Francisco Rodr´ıguez-Henr´ıquez 1 1 2

    Add to Reading List

    Source URL: delta.cs.cinvestav.mx

    Language: English - Date: 2014-08-19 19:37:37
    7Cryptography / Public-key cryptography / Key management / Digital signature / Post-quantum cryptography / Key / Elliptic Curve Digital Signature Algorithm / RSA / Cryptographic hash function / Merkle signature scheme / Lamport signature

    State Management for Hash Based Signatures David McGrew1 , Panos Kampanakis1 , Scott Fluhrer1 , Stefan-Lukas Gazdag2 , Denis Butin3 , and Johannes Buchmann3 1 Cisco Systems, USA

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2016-04-06 13:04:46
    8Elliptic curve cryptography / Automatic identification and data capture / Public-key cryptography / Ubiquitous computing / Radio-frequency identification / Elliptic curve / Cryptography / Elliptic Curve Digital Signature Algorithm

    Institut für Integrierte Systeme Integrated Systems Laboratory ECC is Ready for RFID – A Proof in Silicon RFIDsec 08 Presentation

    Add to Reading List

    Source URL: events.iaik.tugraz.at

    Language: English - Date: 2008-07-17 01:42:00
    9Public-key cryptography / Cryptographic protocols / Secure communication / Cryptographic software / Double Ratchet Algorithm / DiffieHellman key exchange / WhatsApp / Digital signature / XTR / Elliptic curve DiffieHellman / Signal

    How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

    Add to Reading List

    Source URL: www.nds.rub.de

    Language: English - Date: 2016-05-24 15:16:00
    10Cryptography / Public-key cryptography / Elliptic curve cryptography / Computer networking / Named data networking / Key management / Digital signature / RSA / Elliptic Curve Digital Signature Algorithm / Secure Shell / Type-length-value / Digital Signature Algorithm

    Moderator-controlled Information Sharing by Identity-based Aggregate Signatures for Information Centric Networking Tohru Asami The University of Tokyo

    Add to Reading List

    Source URL: conferences2.sigcomm.org

    Language: English - Date: 2015-10-01 13:18:49
    UPDATE