Elliptic-curve cryptography

Results: 465



#Item
141Algebra / Mathematics / Elliptic curve / Affine space / Exponentiation / Hessian form of an elliptic curve / Table of costs of operations in elliptic curves / Abstract algebra / Elliptic curves / Elliptic curve cryptography

Countermeasures against side-channel attacks for EC cryptosystems 1 Countermeasures against Side-Channel Attacks for Elliptic Curve Cryptosystems*

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2001-11-23 07:00:41
142Group theory / Elliptic curve cryptography / Elliptic curve / Password / Discrete logarithm / XTR / Prime number / ECC patents / Abstract algebra / Finite fields / Cryptography

draft-irtf-cfrg-dragonfly-07 - Dragonfly Key Exchange

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2015-03-31 12:55:39
143Analytic number theory / Elliptic curve / Group theory / Mathematics / Hash function / Cryptographic hash function / Information retrieval / Artificial intelligence / Boneh/Franklin scheme / Cryptography / Search algorithms / Hashing

Introduction Related Works Proposal Hashing Conclusion How to Hash into Elliptic Curves Thomas Icart

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-10-23 17:02:32
144Information / NSA Suite B Cryptography / Internet Key Exchange / IPsec / Elliptic curve cryptography / Elliptic curve Diffie–Hellman / Elliptic Curve DSA / Key-agreement protocol / Diffie–Hellman key exchange / Cryptographic protocols / Cryptography / Data

Internet Engineering Task Force (IETF) Request for Comments: 6380 Category: Informational ISSN: K. Burgin

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2011-10-18 14:31:43
145Mathematics / Elliptic curve cryptography / Elliptic curve / Boneh/Franklin scheme / ID-based encryption / Pairing / Homomorphic signatures for network coding / BLS / Cryptography / Abstract algebra / Algebra

Verified Indifferentiable Hashing into Elliptic Curves Santiago Zanella B´eguelin1 Gilles Barthe2 , Benjamin Gr´egoire3 , Sylvain Heraud3 and Federico Olmedo2

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
146Forking lemma / Random oracle / Preimage attack / Digital signature / Collision resistance / Elliptic Curve DSA / Standard model / MD5 / Birthday attack / Cryptography / Cryptographic hash functions / Schnorr signature

Hash Function Requirements for Schnorr Signatures Gregory Neven1,2 , Nigel P. Smart3 , and Bogdan Warinschi3 1 IBM Research – Zurich, Switzerland

Add to Reading List

Source URL: www.neven.org

Language: English - Date: 2012-04-18 06:08:49
147Finite fields / Computational hardness assumptions / Group theory / Diffie–Hellman key exchange / XTR / Secure Shell / Cipher suite / Index calculus algorithm / Elliptic curve Diffie–Hellman / Cryptography / Abstract algebra / Cryptographic protocols

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice David Adrian¶ Karthikeyan Bhargavan∗ Zakir Durumeric¶ Pierrick Gaudry† Matthew Green§ J. Alex Halderman¶ Nadia Heninger‡ Drew Springall¶ Emmanuel

Add to Reading List

Source URL: weakdh.org

Language: English - Date: 2015-05-22 22:25:48
148Ubiquitous computing / Smart cards / Contactless smart card / RSA / Digital signature / Java Card / Elliptic Curve DSA / Magnetic stripe card / Power analysis / Cryptography / Public-key cryptography / ISO standards

May 20, 2011 Smart card implementation of a digital signature scheme for Twisted Edwards curves Author: Niels Duif∗

Add to Reading List

Source URL: www.nielsduif.nl

Language: English - Date: 2011-05-20 10:31:35
149Physical Unclonable Function / Randomness / Elliptic curve cryptography / Side channel attack / PUF / LEX / Hardware Trojan / Digital rights management / Joint Test Action Group / Cryptography / Advanced Encryption Standard / Trojan horses

HOST-2010 3rd Annual IEEE International Symposium on Hardware-Oriented Security and Trust June 13-14, 2010 – Anaheim Convention Center, Anaheim, CA Sunday, June 13th

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2010-10-16 10:23:01
150Internet protocols / Key management / Public-key cryptography / Cipher suite / Transport Layer Security / Elliptic curve cryptography / Key size / Secure Shell / Key / Cryptography / Secure communication / Cryptographic protocols

Speeding up Secure Web Transactions Using Elliptic Curve Cryptography Vipul Gupta, Douglas Stebila∗, Stephen Fung* , Sheueling Chang Shantz, Nils Gura, Hans Eberle Sun Microsystems, IncCasey Avenue

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:42
UPDATE