Elliptic-curve cryptography

Results: 465



#Item
101A Faster way to do ECC Mike Scott Dublin City University Joint work with Steven Galbraith Royal Holloway, University of London

A Faster way to do ECC Mike Scott Dublin City University Joint work with Steven Galbraith Royal Holloway, University of London

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2008-09-27 14:59:29
102A Provably Secure Elliptic Curve Scheme with Fast Encryption David Galindo1 , Sebasti` a Mart´ın1 , Tsuyoshi Takagi2 and Jorge L. Villar1 1

A Provably Secure Elliptic Curve Scheme with Fast Encryption David Galindo1 , Sebasti` a Mart´ın1 , Tsuyoshi Takagi2 and Jorge L. Villar1 1

Add to Reading List

Source URL: www.dgalindo.es

Language: English - Date: 2007-11-26 10:35:53
103Moderator-controlled Information Sharing by Identity-based Aggregate Signatures for Information Centric Networking Tohru Asami  The University of Tokyo

Moderator-controlled Information Sharing by Identity-based Aggregate Signatures for Information Centric Networking Tohru Asami The University of Tokyo

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-10-01 13:18:49
104Attacking Elliptic-Curve Cryptography Ruben Niederhagen April 15, 2010  Why cryptography?

Attacking Elliptic-Curve Cryptography Ruben Niederhagen April 15, 2010 Why cryptography?

Add to Reading List

Source URL: polycephaly.org

Language: English - Date: 2010-04-19 10:03:17
    105Low Power Elliptic Curve Cryptography by ¨ urk Erdin¸c Ozt¨ A Thesis

    Low Power Elliptic Curve Cryptography by ¨ urk Erdin¸c Ozt¨ A Thesis

    Add to Reading List

    Source URL: www.wpi.edu

    Language: English - Date: 2005-05-05 12:58:44
      106Binary Edwards Curves Reza Rezaeian Farashahi Dept. of Mathematics and Computing Science TU Eindhoven joint work with: and

      Binary Edwards Curves Reza Rezaeian Farashahi Dept. of Mathematics and Computing Science TU Eindhoven joint work with: and

      Add to Reading List

      Source URL: www.hyperelliptic.org

      Language: English - Date: 2008-10-03 15:27:31
      107Elliptic Curve Cryptography in JavaScript Laurie Haustenne, Quentin De Neyer, and Olivier Pereira? Universit´e catholique de Louvain ICTEAM – Crypto Group B-1348 Louvain-la-Neuve – Belgium

      Elliptic Curve Cryptography in JavaScript Laurie Haustenne, Quentin De Neyer, and Olivier Pereira? Universit´e catholique de Louvain ICTEAM – Crypto Group B-1348 Louvain-la-Neuve – Belgium

      Add to Reading List

      Source URL: www.uclouvain.be

      Language: English - Date: 2011-12-14 05:30:45
        108Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

        Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

        Add to Reading List

        Source URL: aaspring.com

        Language: English - Date: 2015-08-21 16:58:21
        109Bilinear Pairings in Cryptography Master thesis #603 by

        Bilinear Pairings in Cryptography Master thesis #603 by

        Add to Reading List

        Source URL: www.math.ru.nl

        Language: English - Date: 2009-07-13 10:25:27
        110Itron Secures Metering Systems with Certicom AMI Solution A CERTICOM CUSTOMER USE CASE AUGUST 2010

        Itron Secures Metering Systems with Certicom AMI Solution A CERTICOM CUSTOMER USE CASE AUGUST 2010

        Add to Reading List

        Source URL: www.certicom.com

        Language: English - Date: 2010-10-20 19:20:59