Elliptic curve cryptography

Results: 465



#Item
1

Edwards Curves and the ECM Factorisation Method Peter Birkner Eindhoven University of Technology The 12th Workshop on Elliptic Curve Cryptography

Add to Reading List

Source URL: www.pbirkner.fastmail.fm

Language: English - Date: 2008-09-22 17:16:30
    2

    Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 based Processors Patrick Longa, and Catherine Gebotys Department of Electrical and Computer Engineering, University of Waterloo, Canada, {pl

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2010-06-09 13:30:54
      3

      Elliptic Curves over Q Peter Birkner Technische Universiteit Eindhoven DIAMANT Summer School on Elliptic and Hyperelliptic Curve Cryptography

      Add to Reading List

      Source URL: www.pbirkner.fastmail.fm

      Language: English - Date: 2008-09-19 03:32:03
        4

        Crafting Certified Elliptic Curve Cryptography Implementations in Coq Andres Erbsen Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree o

        Add to Reading List

        Source URL: adam.chlipala.net

        Language: English - Date: 2018-02-11 06:46:49
          5

          Elliptic curve cryptography on FPGAs: How fast can we go with a single chip? Kimmo Järvinen Department of Information and Computer Science Aalto University, Finland

          Add to Reading List

          Source URL: users.ics.aalto.fi

          Language: English - Date: 2011-07-19 11:03:52
            6

            A gentle introduction to elliptic curve cryptography Craig Costello Tutorial at SPACE 2016 December 15, 2016 CRRao AIMSCS, Hyderabad, India

            Add to Reading List

            Source URL: www.craigcostello.com.au

            Language: English - Date: 2016-12-16 02:30:21
              7

              Attacking Elliptic-Curve Cryptography Ruben Niederhagen April 15, 2010 Why cryptography?

              Add to Reading List

              Source URL: www.polycephaly.org

              Language: English - Date: 2010-04-19 10:03:17
                8

                This is Chapter 7 by Gerhard Frey and Tanja Lange of the Handbook of Elliptic and Hyperelliptic Curve Cryptography, Henri Cohen, Christophe Doche, and Gerhard Frey, Editors, CRC PressCRC Press has granted the foll

                Add to Reading List

                Source URL: hyperelliptic.org

                Language: English - Date: 2014-03-13 14:22:38
                  9

                  by @bascule ELLIPTIC CURVE CRYPTOGRAPHY Public-key cryptography based on elliptic curves is gradually replacing RSA thanks to faster implementations and smaller key sizes.

                  Add to Reading List

                  Source URL: fails.org

                  Language: English - Date: 2015-10-01 12:32:52
                    10

                    Standards for Efficient Cryptography SEC 1: Elliptic Curve Cryptography Certicom Research Contact: Daniel R. L. Brown () May 21, 2009

                    Add to Reading List

                    Source URL: www.secg.org

                    Language: English - Date: 2015-01-29 09:45:12
                      UPDATE