Elliptic-curve cryptography

Results: 465



#Item
91Cryptography / Public-key cryptography / Electric power / Microcontrollers / Smart grid / Smart meter / Electricity meter / Zero-knowledge proof / Commitment scheme / Digital signature / Elliptic curve cryptography / TI MSP430

Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers Andres Molina-Markham, George Danezis† , Kevin Fu, Prashant Shenoy, and David Irwin University of Massachusetts Amherst †

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:48:54
92Elliptic curve cryptography / Public-key cryptography / Analytic number theory / Elliptic curve / Group theory / Mathematics

Non-generic attacks on elliptic curve DLPs Benjamin Smith Team GRACE INRIA Saclay–ˆIle-de-France ´ Laboratoire d’Informatique de l’Ecole

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2013-09-18 02:32:53
93Cryptography / Abstract algebra / Algebra / Computational hardness assumptions / Finite fields / DiffieHellman problem / Group theory / Elliptic curve cryptography / Provable security / Whitfield Diffie / DiffieHellman key exchange / Elliptic curve

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields

Add to Reading List

Source URL: 2010.eccworkshop.org

Language: English - Date: 2010-10-25 19:46:00
94

Practical Invalid Curve Attacks on TLS-ECDH ? Tibor Jager, J¨org Schwenk, and Juraj Somorovsky Horst G¨ortz Institute for IT Security, Ruhr University Bochum Abstract. Elliptic Curve Cryptography (ECC) is based on cycl

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2015-09-14 06:05:06
    95Algebra / Abstract algebra / Analytic number theory / Invariant theory / Algebraic surfaces / Algebraic curves / Moduli space / Moduli theory / Modular form / Abelian variety / Elliptic curve / Complex multiplication

    Computing genus 2 curves from invariants on the Hilbert moduli space Journal of Number Theory, Special Issue on Elliptic Curve Cryptography http://eprint.iacr.org

    Add to Reading List

    Source URL: 2010.eccworkshop.org

    Language: English - Date: 2010-10-26 20:15:50
    96Mass surveillance / National Security Agency / United States government secrecy / Bullrun / RSA Security / Global surveillance disclosures / RSA BSAFE / IPsec / Elliptic curve cryptography / Cryptography / Dual EC DRBG / Crypto Wars

    Mathematicians Discuss the Snowden Revelations This is the latest installment in the Notices discussion of the National Security Agency (NSA). The previous installment, “The Mathematics Community and the NSA,” by Mic

    Add to Reading List

    Source URL: www.ams.org

    Language: English - Date: 2015-03-10 15:36:10
    97

    To appear in Designs, Codes and Cryptography. Trading Inversions for Multiplications in Elliptic Curve Cryptography Mathieu Ciet∗ () Gemplus S.A., Card Security Group, La Vigie,

    Add to Reading List

    Source URL: joye.site88.net

    Language: English - Date: 2015-09-04 19:43:29
      98

      Published in Designs, Codes and Cryptography 36(1):33–43, Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults Mathieu Ciet∗ () Universit´e catholique de Louvain,

      Add to Reading List

      Source URL: joye.site88.net

      Language: English - Date: 2015-09-04 19:43:27
        99

        Elliptic Curves a Hardware Perspective Joppe W. Bos NIST Workshop on Elliptic Curve Cryptography Standards June 11- June, Gaithersburg, MD, USA

        Add to Reading List

        Source URL: csrc.nist.gov

        Language: English - Date: 2015-06-08 08:37:26
          100Key management / Public-key cryptography / Cryptography / Elliptic curve cryptography / Key size / Key / Symmetric-key algorithm / RSA / Cipher / Elliptic curve DiffieHellman / DiffieHellman key exchange / Cryptographic key types

          CERTICOM WHITEPAPER SERIES ECC and SCADA Key Management Rob Lambert, Certicom August 2010

          Add to Reading List

          Source URL: www.certicom.com

          Language: English - Date: 2010-11-08 15:42:56
          UPDATE