Elliptic curve cryptography

Results: 465



#Item
11

Hyperelliptic Curves Peter Birkner Technische Universiteit Eindhoven DIAMANT Summer School on Elliptic and Hyperelliptic Curve Cryptography

Add to Reading List

Source URL: www.pbirkner.fastmail.fm

Language: English - Date: 2008-09-19 03:32:20
    12

    This is the Table of Contents of the Handbook of Elliptic and Hyperelliptic Curve Cryptography, Henri Cohen, Christophe Doche, and Gerhard Frey, Editors, CRC PressCRC Press has granted the following specific permi

    Add to Reading List

    Source URL: hyperelliptic.org

    Language: English - Date: 2006-09-06 22:21:24
      13

      20 years of isogeny-based cryptography Luca De Feo feat. Jean Kieffer, Benjamin Smith Université Paris Saclay, UVSQ & Inria November 14, 2017, Elliptic Curve Cryptography, Nijmegen

      Add to Reading List

      Source URL: defeo.lu

      Language: English - Date: 2018-05-31 20:20:22
        14

        Published in Designs, Codes and Cryptography 14(1):53–56, Reducing the elliptic curve cryptosystem of Meyer-M¨ uller to the cryptosystem of Rabin-Williams

        Add to Reading List

        Source URL: joye.site88.net

        Language: English - Date: 2015-09-04 19:43:59
          15

          S TANDARDS FOR E FFICIENT C RYPTOGRAPHY SEC 1: Elliptic Curve Cryptography Certicom Research Contact:

          Add to Reading List

          Source URL: www.secg.org

          Language: English - Date: 2015-01-29 09:45:12
            16

            An Introduction to Elliptic Curve Cryptography Tanner Prynn Elliptic Curves The Discrete Logarithm Problem

            Add to Reading List

            Source URL: tannerprynn.com

            - Date: 2016-11-15 21:24:42
              17

              International Journal of Network Security, Vol.18, No.2, PP, MarA Lightweight RFID Security Protocol Based on Elliptic Curve Cryptography

              Add to Reading List

              Source URL: ijns.jalaxy.com.tw

              - Date: 2015-07-25 23:03:43
                18

                Fast, twist-secure elliptic curve cryptography from Q-curves Benjamin Smith Team GRACE INRIA Saclay–ˆIle-de-France ´

                Add to Reading List

                Source URL: www.cosic.esat.kuleuven.be

                - Date: 2013-09-19 10:39:36
                  19Mathematics / Mathematical analysis / Number theory / Conjectures / Analytic number theory / Modular forms / Riemann surfaces / Millennium Prize Problems / Riemann hypothesis / Elliptic curve / Langlands program / L-function

                  1. Introduction 1.1. Background. L-functions and modular forms underlie much of twentieth century number theory and are connected to the practical applications of number theory in cryptography. The fundamental importance

                  Add to Reading List

                  Source URL: www.williamstein.org

                  Language: English - Date: 2009-02-03 20:12:03
                  20Cryptography / Public-key cryptography / Identity-based cryptography / Elliptic curve cryptography / Dan Boneh / ID-based encryption / Association for Computing Machinery / Pairing-based cryptography / Boneh / Infosys / ID-based cryptography / Computer science

                  EMBARGOED FOR RELEASE March 31, 12:01 a.m. ET Bruce Shriver ACMMarie Gentile

                  Add to Reading List

                  Source URL: fellows.acm.org

                  Language: English - Date: 2015-03-30 17:41:07
                  UPDATE