Elliptic curve cryptography

Results: 465



#Item
21Abstract algebra / Algebra / Geometry / Elliptic curves / Algebraic varieties / Elliptic curve cryptography / Analytic number theory / Elliptic curve / Group theory / Projective variety / Weil pairing / Divisor

Efficient arithmetic on elliptic curves in characteristic 2 David Kohel Institut de Math´ematiques de Luminy Universit´e d’Aix-Marseille 163, avenue de Luminy, Case 907

Add to Reading List

Source URL: iml.univ-mrs.fr

Language: English - Date: 2012-10-26 16:31:31
22Hashing / Information retrieval / Cryptography / Information science / Search algorithms / Elliptic curves / Error detection and correction / Analytic number theory / Elliptic curve / Supersingular elliptic curve / Hash function / BonehLynnShacham

Indifferentiable Hashing to Elliptic and Hyperelliptic Curves Mehdi Tibouchi NTT Secure Platform Laboratories ECC Workshop 2013, 2013–09–17

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2013-10-09 09:45:18
23Cryptography / Elliptic curve cryptography / Public-key cryptography / Pairing-based cryptography / Finite fields / Group theory / Hyperelliptic curve cryptography / Tate pairing / DiffieHellman key exchange / BonehLynnShacham / Elliptic curve / Abelian variety

Theta functions and applications in cryptography Fonctions thêta et applications en cryptographie Thèse d’informatique Damien Robert1 1

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2014-08-03 16:15:38
24Abstract algebra / Geometry / Group theory / Algebra / Analytic number theory / Elliptic curve / Position / Elliptic curves / Elliptic curve cryptography

Intro Background 4-dim GLV dec. E

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2013-09-20 10:31:31
25Cryptography / Abstract algebra / Algebra / Group theory / Finite fields / Elliptic curve cryptography / Public-key cryptography / Elliptic curves / Weil pairing / Elliptic curve / Elliptic Curve Digital Signature Algorithm / Discrete logarithm

ECC Summer School – Exercices Damien RobertCryptography Implement public key encryption and signature with elliptic curves:

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-09-25 11:36:46
26Cryptography / Public-key cryptography / DiffieHellman key exchange / Elliptic curve cryptography / Finite fields / SPEKE / Elliptic curve DiffieHellman

Algorithm and Implementation Optimisation of Cryptographic Computation over Elliptic Curves (F2m ) Jean-Marc ROBERT Team DALI/LIRMM, University of Perpignan, France Perpignan, the 30th of may 2012

Add to Reading List

Source URL: raim2012.u-bourgogne.fr

Language: English - Date: 2012-07-16 09:25:38
27Abstract algebra / Algebra / Cryptography / Finite fields / Group theory / Logarithms / Computational hardness assumptions / Binary operations / Discrete logarithm / Elliptic curve cryptography / Prime number / Elliptic curve

Computing discrete logarithms in fields of small characteristic Francisco Rodr´ıguez-Henr´ıquez CINVESTAV-IPN Joint work with:

Add to Reading List

Source URL: delta.cs.cinvestav.mx

Language: English - Date: 2014-04-09 13:26:56
28Cryptography / Algebra / Elliptic curve cryptography / Mathematics / Pairing-based cryptography / Elliptic curves / Elliptic curve / Tate pairing / Supersingular elliptic curve / Pairing / Curve

The S˜ao Paulo Advanced School of Cryptography — SP-ASCryptoHardware Implementation of Pairings Francisco Rodr´ıguez-Henr´ıquez CINVESTAV-IPN, Mexico City, Mexico

Add to Reading List

Source URL: delta.cs.cinvestav.mx

Language: English - Date: 2011-10-24 22:54:15
29Cryptography / Geometry / Abstract algebra / Elliptic curve cryptography / Finite fields / Public-key cryptography / Group theory / Elliptic curve / SECG / Ellipse / Cofactor / Curve

STANDARS FOR EFFICIENT CRYPTOGRAPHY SEC X.2: Recommended Elliptic Curve Domain Parameters Nippon Telephone and Telegraph Corporation

Add to Reading List

Source URL: info.isl.ntt.co.jp

Language: English - Date: 2015-03-02 00:44:51
30Cryptography / Elliptic curve cryptography / Public-key cryptography / Elliptic Curve Digital Signature Algorithm / Electromagnetic attack / Digital Signature Algorithm / Digital signature / RSA / OpenSSL / Scalar / Matrix / Random number generator attack

ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels ∗ Daniel Genkin Lev Pachmanov

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2016-08-19 14:59:40
UPDATE