1![The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces Phong Q. Nguyen∗ ´ D´epartement d’Informatique, Ecole The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces Phong Q. Nguyen∗ ´ D´epartement d’Informatique, Ecole](https://www.pdfsearch.io/img/193319adfe708dda115ebff6d574d425.jpg) | Add to Reading ListSource URL: pdfs.semanticscholar.org- Date: 2015-12-07 13:47:51
|
---|
2![ECC Summer School – Exercices Damien RobertCryptography Implement public key encryption and signature with elliptic curves: ECC Summer School – Exercices Damien RobertCryptography Implement public key encryption and signature with elliptic curves:](https://www.pdfsearch.io/img/7aba9cfc3af8529b5b429024c796b003.jpg) | Add to Reading ListSource URL: www.normalesup.orgLanguage: English - Date: 2015-09-25 11:36:46
|
---|
3![ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels ∗ Daniel Genkin Lev Pachmanov ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels ∗ Daniel Genkin Lev Pachmanov](https://www.pdfsearch.io/img/3bfb4cec3ee08e1a991b2c863691515b.jpg) | Add to Reading ListSource URL: www.cs.tau.ac.ilLanguage: English - Date: 2016-08-19 14:59:40
|
---|
4![Two is the fastest prime Thomaz Oliveira 1 Julio L´ opez 2 Diego F. Aranha Francisco Rodr´ıguez-Henr´ıquez 1 1 2 Two is the fastest prime Thomaz Oliveira 1 Julio L´ opez 2 Diego F. Aranha Francisco Rodr´ıguez-Henr´ıquez 1 1 2](https://www.pdfsearch.io/img/5b12e9cbd2483bd560868ffc8f7382be.jpg) | Add to Reading ListSource URL: delta.cs.cinvestav.mxLanguage: English - Date: 2014-08-19 19:37:37
|
---|
5![State Management for Hash Based Signatures David McGrew1 , Panos Kampanakis1 , Scott Fluhrer1 , Stefan-Lukas Gazdag2 , Denis Butin3 , and Johannes Buchmann3 1 Cisco Systems, USA State Management for Hash Based Signatures David McGrew1 , Panos Kampanakis1 , Scott Fluhrer1 , Stefan-Lukas Gazdag2 , Denis Butin3 , and Johannes Buchmann3 1 Cisco Systems, USA](https://www.pdfsearch.io/img/d7d045ce68993dbd6f9e235c8c076cb0.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2016-04-06 13:04:46
|
---|
6![Institut für Integrierte Systeme Integrated Systems Laboratory ECC is Ready for RFID – A Proof in Silicon RFIDsec 08 Presentation Institut für Integrierte Systeme Integrated Systems Laboratory ECC is Ready for RFID – A Proof in Silicon RFIDsec 08 Presentation](https://www.pdfsearch.io/img/37e1c8f4cc197f1098365e0f041dda45.jpg) | Add to Reading ListSource URL: events.iaik.tugraz.atLanguage: English - Date: 2008-07-17 01:42:00
|
---|
7![How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de](https://www.pdfsearch.io/img/9682a17ab629ca17d5b77a75bf43a4d5.jpg) | Add to Reading ListSource URL: www.nds.rub.deLanguage: English - Date: 2016-05-24 15:16:00
|
---|
8![Moderator-controlled Information Sharing by Identity-based Aggregate Signatures for Information Centric Networking Tohru Asami The University of Tokyo Moderator-controlled Information Sharing by Identity-based Aggregate Signatures for Information Centric Networking Tohru Asami The University of Tokyo](https://www.pdfsearch.io/img/f3dfd3b277dbe7fee69eabfc53cd9ab5.jpg) | Add to Reading ListSource URL: conferences2.sigcomm.orgLanguage: English - Date: 2015-10-01 13:18:49
|
---|
9![Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep](https://www.pdfsearch.io/img/24f2e8a015c864fc31222559e0cd2132.jpg) | Add to Reading ListSource URL: www.hyperelliptic.orgLanguage: English - Date: 2008-09-27 14:59:29
|
---|
10![Hierarchical deterministic Bitcoin wallets that tolerate key leakage (Short paper) Gus Gutoski1 and Douglas Stebila2 1 Hierarchical deterministic Bitcoin wallets that tolerate key leakage (Short paper) Gus Gutoski1 and Douglas Stebila2 1](https://www.pdfsearch.io/img/5821d0b31aed33afdf91d7a27bb182ce.jpg) | Add to Reading ListSource URL: fc15.ifca.aiLanguage: English - Date: 2015-01-11 00:32:41
|
---|