Elliptic-curve cryptography

Results: 465



#Item
111Micronas / Elliptic curve cryptography / Cryptography / Hardware security module / High-bandwidth Digital Content Protection / BlackBerry Limited / Key management / Key

Micronas Secures Production with Certicom KeyInject ® Micronas needed a secure system for transporting and embedding keys into silicon chips for use in consumer electronics. Certicom

Add to Reading List

Source URL: www.certicom.com

Language: English - Date: 2008-11-09 16:17:51
112Pairing-based cryptography / Elliptic curve cryptography / Elliptic curves / Linear algebra / Module theory / Pairing / Tate pairing / Divisor / Elliptic curve / Weil pairing

ECCEfficient and Generalized Pairing Computation on Abelian Varieties Hyang-Sook Lee Ewha Womans University

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2008-10-03 22:36:38
113

Efficient Algorithms for Finite Fields, with Applications in Elliptic Curve Cryptography by Sel¸cuk Baktır A Thesis Submitted to the Faculty

Add to Reading List

Source URL: www.wpi.edu

Language: English - Date: 2003-05-01 13:28:01
    114Cryptography / Security / Elliptic curve cryptography / Public-key cryptography / Building automation / Home automation / BlackBerry Limited / ZigBee / Ami / Smart grid / Computer security / ECC patents

    Certicom AMI 7000 Series Security Appliances for Advanced Metering Infrastructure The Need for Security

    Add to Reading List

    Source URL: www.certicom.com

    Language: English - Date: 2010-08-10 15:49:45
    115Cryptography / Cryptographic hash functions / Error detection and correction / SHA-1 / SHA-2 / MD5 / NIST hash function competition / SHA-3 / Elliptic curve only hash / Elliptic Curve Digital Signature Algorithm / Libgcrypt / FORK-256

    Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep

    Add to Reading List

    Source URL: www.hyperelliptic.org

    Language: English - Date: 2008-09-27 14:59:29
    116Transport Layer Security / Secure communication / Finite fields / Cryptographic protocols / Public-key cryptography / Logjam / DiffieHellman key exchange / Index calculus algorithm / XTR / Elliptic curve DiffieHellman / Key size / Safe prime

    Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

    Add to Reading List

    Source URL: weakdh.org

    Language: English - Date: 2015-10-15 14:53:20
    117Cryptography / Identity-based cryptography / Public-key cryptography / Elliptic curve cryptography / Pairing-based cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / ID-based encryption / Advantage / Encryption / BonehFranklin scheme / Ciphertext

    Boneh-Franklin Identity Based Encryption Revisited David Galindo Institute for Computing and Information Sciences Radboud University Nijmegen P.O.BoxGL, Nijmegen, The Netherlands.

    Add to Reading List

    Source URL: www.dgalindo.es

    Language: English - Date: 2007-11-26 10:35:37
    118Cryptography / Key management / E-commerce / Public-key cryptography / Cryptocurrencies / Bitcoin / Elliptic Curve Digital Signature Algorithm / RSA / Electronic money / Key / Digital signature / Cryptographic hash function

    Hierarchical deterministic Bitcoin wallets that tolerate key leakage (Short paper) Gus Gutoski1 and Douglas Stebila2 1

    Add to Reading List

    Source URL: fc15.ifca.ai

    Language: English - Date: 2015-01-11 00:32:41
    119Abstract algebra / Algebra / Mathematics / Finite fields / Integer factorization algorithms / Group theory / Elliptic curve cryptography / Lenstra elliptic curve factorization / Elliptic curves / Elliptic curve / Torsion / Order

    Edwards Curves and the ECM Factorisation Method Peter Birkner Eindhoven University of Technology The 12th Workshop on Elliptic Curve Cryptography

    Add to Reading List

    Source URL: www.hyperelliptic.org

    Language: English - Date: 2008-09-27 14:59:29
    120Cryptography / Books on cryptography / Elliptic curve cryptography / Cryptanalysis / RSA / Key size / Public-key cryptography / Cryptographic hash function / Outline of cryptography / Cipher / Block cipher / Elliptic curve

    The Book Review Column1 by William Gasarch Department of Computer Science University of Maryland at College Park College Park, MD, 20742 email:

    Add to Reading List

    Source URL: www.cs.umd.edu

    Language: English - Date: 2014-06-30 10:38:30
    UPDATE