Elliptic curve cryptography

Results: 465



#Item
81Algebra / Mathematics / Abstract algebra / Elliptic curve cryptography / Number theory / Elliptic curves / Pairing-based cryptography / Elliptic divisibility sequence / Division polynomials / Elliptic curve / Tate pairing / Pairing

Elliptic Nets in Cryptography Katherine Stange Elliptic Divisibility Sequences

Add to Reading List

Source URL: mathsci.ucd.ie

Language: English - Date: 2007-09-14 09:56:21
82Cryptography / Public-key cryptography / Electric power / Microcontrollers / Smart grid / Smart meter / Electricity meter / Zero-knowledge proof / Commitment scheme / Digital signature / Elliptic curve cryptography / TI MSP430

Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers Andres Molina-Markham, George Danezis† , Kevin Fu, Prashant Shenoy, and David Irwin University of Massachusetts Amherst †

Add to Reading List

Source URL: www.ecs.umass.edu

Language: English - Date: 2014-08-13 10:33:20
83Elliptic curve cryptography / NaCl / Public-domain software / EdDSA / Daniel J. Bernstein / Curve25519 / Poly1305 / Cryptography / Key

EdDSA signatures and Ed25519 Peter Schwabe Joint work with Daniel J. Bernstein, Niels Duif, Tanja Lange, and Bo-Yin Yang March 20, 2012

Add to Reading List

Source URL: caramba.loria.fr

Language: English - Date: 2016-06-13 15:37:33
84Elliptic curve cryptography / Elliptic curves / Doubling-oriented DocheIcartKohel curve

From now on: non-binary field k; non-square d 2 k. ( ) = f(x; y ) 2 k  k :

Add to Reading List

Source URL: mathsci.ucd.ie

Language: English - Date: 2007-09-14 09:56:21
85Algebraic curves / Elliptic curve cryptography / Public-key cryptography / Finite fields / Algebraic surfaces / Elliptic curve / Abelian variety / Curve

Cover and Decomposition Attacks on Elliptic Curves Vanessa VITSE Joint work with Antoine JOUX Universit´ e de Versailles Saint-Quentin, Laboratoire PRiSM

Add to Reading List

Source URL: ecc2011.loria.fr

Language: English - Date: 2011-09-30 12:40:06
86

Efficient Prime-Field Arithmetic for Elliptic Curve Cryptography on Wireless Sensor Nodes Yang Zhang Johann Großschadl ¨

Add to Reading List

Source URL: www.cryptolux.org

Language: English - Date: 2013-09-17 06:26:54
    87Secure communication / Public-key cryptography / Elliptic curve cryptography / Cryptographic protocols / Cryptographic software / Transport Layer Security / Cipher suite / OpenSSL / HTTPS / Elliptic curve DiffieHellman / Handshaking / RSA

    A Cross-Protocol Attack on the TLS Protocol Nikos Mavrogiannopoulos Frederik Vercauteren Vesselin Velichkov

    Add to Reading List

    Source URL: securewww.esat.kuleuven.be

    Language: English
    88Elliptic curves / Algebraic curves / Analytic number theory / Algebraic surfaces / Supersingular elliptic curve / Elliptic curve / Isogeny / Abelian variety / Supersingular variety / Supersingular isogeny key exchange / Elliptic curve cryptography

    Isogenies and endomorphism rings of elliptic curves ECC Summer School Damien Robert Microsoft ResearchNancy)

    Add to Reading List

    Source URL: ecc2011.loria.fr

    Language: English - Date: 2011-09-30 12:40:05
    89Algebraic curves / Finite fields / Abelian variety / Niels Henrik Abel / Elliptic curve / DiffieHellman problem / Hyperelliptic curve cryptography / Hyperelliptic curve

    Useful Stuff Benjamin Smith Context Algebraic Curves Useful Stuff

    Add to Reading List

    Source URL: ecc2011.loria.fr

    Language: English - Date: 2011-09-30 12:40:05
    90Geography of Belgium / Katholieke Universiteit Leuven / Leuven / Alice series / Wouter

    Introduction to Elliptic Curve Cryptography ECC Summer School KU Leuven, Belgium September 11, 2013

    Add to Reading List

    Source URL: www.cosic.esat.kuleuven.be

    Language: English - Date: 2013-09-23 05:41:56
    UPDATE