Elliptic curve cryptography

Results: 465



#Item
31Cryptography / Public-key cryptography / Cryptographic protocols / Secure communication / Cryptographic software / Signal Protocol / DiffieHellman key exchange / Digital signature / XTR / HKDF / Signal / Elliptic curve DiffieHellman

How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

Add to Reading List

Source URL: www.ei.rub.de

Language: English - Date: 2016-05-24 15:16:00
32Algebra / Mathematics / Geometry / Elliptic curve cryptography / Finite fields / Public-key cryptography / Group theory / Elliptic curve / Curve

On the applicability of one method of elliptic curve discrete logarithm problem over prime fields to the Russian standardized curves E.K. Alekseev, V.D. Nikolaev, S.V. Smyshlyaev © CryptoPro LLC

Add to Reading List

Source URL: ctcrypt.ru

Language: English - Date: 2016-06-16 04:28:47
33Economy / ECC / Department of Labor and Employment / Social Security / Insurance / Elliptic curve cryptography / Data Matrix

Add to Reading List

Source URL: ecc.gov.ph

Language: English - Date: 2016-01-13 01:39:23
34Cryptography / Public-key cryptography / Key management / Konrad Zuse / Mechanical computers / Elliptic curve cryptography / Radio-frequency identification / Key / Z2 / Z1 / Digital signature

Proceedings - NN - A Milestone Towards RFID Products Offering Asymmetric Authentication Based on Elliptic

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:43:24
35Mathematics / Abstract algebra / Algebra / Elliptic curves / Group theory / Finite fields / Elliptic curve cryptography / Analytic number theory / Elliptic curve / Supersingular elliptic curve / Prime number / Algorithm

CM proofs for elliptic curves over number elds Stephen Enright•Ward Für meine Lieblingsdeutschlehrerin.

Add to Reading List

Source URL: iml.univ-mrs.fr

Language: English - Date: 2014-09-16 07:05:16
36Mathematical analysis / Mathematics / Modular arithmetic / Computer arithmetic / Multiplication / Elliptic curve cryptography / Residue number system / Pi / 2N / Multiplication algorithm / Key size

1 A Randomized Multi-modulo RNS Architecture for Double-and-Add in ECC to prevent Power Analysis Side Channel Attacks Jude Angelo Ambrose†

Add to Reading List

Source URL: www.inesc-id.pt

Language: English - Date: 2013-12-23 08:24:26
37Abstract algebra / Algebra / Mathematics / Finite fields / Modular arithmetic / Computer arithmetic / Complex analysis / Residue number system / Elliptic curve cryptography / Pi / Addition / XTR

DARNS:A Randomized Multi-modulo RNS Architecture for Double-and-Add in ECC to prevent Power Analysis Side Channel Attacks Jude Angelo Ambrose Hector Pettenghi, Leonel Sousa

Add to Reading List

Source URL: www.inesc-id.pt

Language: English - Date: 2013-03-08 09:35:27
38Elliptic curves / Abstract algebra / Mathematics / Algebra / Elliptic curve cryptography / Group theory / Analytic number theory / Elliptic curve / Multiplication algorithm

Fast point multiplication algorithms for binary elliptic curves with and without precomputation Thomaz Oliveira 1 Diego F. Aranha 2 Julio L´opez Francisco Rodr´ıguez-Henr´ıquez 1 1

Add to Reading List

Source URL: delta.cs.cinvestav.mx

Language: English - Date: 2014-08-18 00:05:38
39Elliptic curve cryptography / Public-key cryptography / Finite fields / Hyperelliptic curve cryptography / Hyperelliptic curve / Cryptography / Mathematics / Science and technology / Science

MACISA — Mathematics applied to cryptology and information security in Africa — LIRIMA Meeting, Saint-Louis, Sénégal Damien Robert Équipe LFANT, Inria Bordeaux Sud-Ouest

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-05-29 11:53:40
40Abstract algebra / Algebra / Mathematics / Field theory / Algebraic surfaces / Algebraic curves / Elliptic curve / Polynomial / Supersingular elliptic curve / Finite field / Valuation / Abelian variety

The 2-adic CM method for genus 2 curves with application to cryptography P. Gaudry1,2 , T. Houtmann2 , D. Kohel3 , C. Ritzenthaler4 , and A. Weng2 1 LORIA - Projet SPACES

Add to Reading List

Source URL: iml.univ-mrs.fr

Language: English - Date: 2006-09-01 11:00:34
UPDATE