Elliptic curve cryptography

Results: 465



#Item
41Geometry / Abstract algebra / Algebra / Algebraic curves / Elliptic curve cryptography / Public-key cryptography / Finite fields / Hyperelliptic curve / Elliptic curve / Cryptography / Curve

MACISA — Mathematics applied to cryptology and information security in Africa — LIRIMA Evaluation Seminar, Paris Tony Ezome, Damien Robert Équipe LFANT, Inria Bordeaux Sud-Ouest

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2014-10-04 12:30:49
42Cryptography / Public-key cryptography / Elliptic curve cryptography / Finite fields / Elliptic curve / RSA Security / National Security Agency / Index of cryptography articles / Book:Cryptography

Algorithmic number theory and cryptography — Comité des projets, Bordeaux Damien R󰀻󰀮󰀱󰀾󰁀 Équipe LFANT, Inria Bordeaux Sud-Ouest

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2014-08-21 15:44:55
43Abstract algebra / Algebra / Elliptic curve cryptography / Finite fields / Public-key cryptography / Group theory / Elliptic curve / Complex multiplication

Standards for Efficient Cryptography SEC X.1: Supplemental Document for Odd Characteristic Extension Fields Nippon Telephone and Telegraph Corporation Contact: Kazumaro Aoki, Tetsutaro Kobayashi, and Akira Nagai

Add to Reading List

Source URL: info.isl.ntt.co.jp

Language: English - Date: 2015-03-02 00:44:50
44Mathematics / Abstract algebra / Algebra / Elliptic curves / Analytic number theory / Diophantine geometry / Number theory / Elliptic curve cryptography / Elliptic curve / Birch and Swinnerton-Dyer conjecture / Rank of an elliptic curve / Twists of curves

Twisted L-Functions and Monodromy Nicholas M. Katz Contents Introduction

Add to Reading List

Source URL: web.math.princeton.edu

Language: English - Date: 2001-11-05 12:32:04
45Abstract algebra / Algebra / Mathematics / Elliptic curves / Finite fields / Group theory / Elliptic curve cryptography / Conjectures / Lenstra elliptic curve factorization / Elliptic curve / Divisor / Generalized Riemann hypothesis

Annals of Mathematics, ), Factoring integers with elliptic curves By H. W. LENSTRA, JR.

Add to Reading List

Source URL: www.mat.uniroma2.it

Language: English - Date: 2008-11-09 06:36:38
46Cryptography / Cryptographic hash functions / Public-key cryptography / Error detection and correction / Hash function / Digital signature / Parameter / SECG / SHA-2

Elliptic Curve Abe-Okamoto-Suzuki Message Recovery Signature Scheme (ECAOS) Working DraftAugust 25,

Add to Reading List

Source URL: info.isl.ntt.co.jp

Language: English - Date: 2015-03-02 00:44:50
47Cryptography / Public-key cryptography / Algebra / Pairing-based cryptography / Elliptic curve cryptography / Elliptic curves / Linear algebra / Identity-based cryptography / Tate pairing / Weil pairing / Pairing / ID-based encryption

A Survey on Craptological Pairing Algorithms PauloS.//// LMBarreto Anonymized for submission

Add to Reading List

Source URL: www.anagram.com

Language: English - Date: 2010-11-11 14:43:35
48Elliptic curve cryptography / Elliptic curves / Abstract algebra / Geometry / Algebra / Twisted Hessian curves / Hessian form of an elliptic curve / Twisted Edwards curve / Elliptic curve / Edwards curve / Montgomery curve / Cubic plane curve

Twisted Hessian curves Daniel J. Bernstein1,2 , Chitchanok Chuengsatiansup1 , David Kohel3 , and Tanja Lange1 1 Department of Mathematics and Computer Science

Add to Reading List

Source URL: iml.univ-mrs.fr

Language: English - Date: 2015-09-01 15:57:48
49Public-key cryptography / Notary / Elliptic curve cryptography / Randomness / Finite fields / Radio-frequency identification / Authentication protocol / Physical unclonable function / Authentication / Digital signature / Quantum readout of PUFs / Types of physical unclonable function

Public-Key Cryptography for RFID-Tags? L. Batina1 , J. Guajardo2 , T. Kerins2 , N. Mentens1 , P. Tuyls2 , and I. Verbauwhede1 1 Katholieke Universiteit Leuven, ESAT/COSIC, Belgium {Lejla.Batina,Nele.Mentens,Ingrid.Verbau

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-08-29 03:45:16
50Elliptic curve cryptography / Public-key cryptography / RSA / Common Criteria / Side-channel attack / Evaluation

Microsoft PowerPoint - Killmann_sca_ecc.ppt

Add to Reading List

Source URL: www.yourcreativesolutions.nl

Language: English - Date: 2010-08-31 09:40:00
UPDATE