Elliptic-curve cryptography

Results: 465



#Item
181Elliptic curve cryptography / Elliptic curves

Infinity in Mathematics & Computer Science ∞ Lecture at QUANTANovemberCMS, Lucknow, India

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2009-06-24 11:11:44
182Elementary algebra / Multiplication / Multiplicative inverse / Elliptic curve cryptography / Elliptic curves / Mathematics / Algebra / Abstract algebra

ERRORS IN HACKER’S DELIGHT Sixth and later printings P. 4 line 14: Append a semicolon in the “code” font, so that the line is

Add to Reading List

Source URL: www.hackersdelight.org

Language: English - Date: 2012-12-31 16:33:54
183Secure communication / Internet standards / Cipher suite / Transport Layer Security / Elliptic curve cryptography / Elliptic curve Diffie–Hellman / X.509 / Public-key cryptography / Key / Cryptography / Cryptographic protocols / Internet protocols

Network Working Group Request for Comments: 4492 Category: Informational S. Blake-Wilson SafeNet

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2006-05-16 18:05:25
184Digital signature / Elliptic Curve DSA / Public key certificate / SHA-1 / Federal Information Processing Standard / RSA / Non-repudiation / Data Encryption Standard / Secure Hash Standard / Cryptography / Public-key cryptography / Digital Signature Algorithm

FIPS PUB 186-2 (+Change Notice) FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION 2000 January 27

Add to Reading List

Source URL: techheap.packetizer.com

Language: English - Date: 2002-12-15 10:57:16
185Pairing / Weil pairing / Elliptic curve cryptography / Tate pairing / BLS / Elliptic curve / ID-based encryption / Power analysis / Side channel attack / Cryptography / Abstract algebra / Algebra

Improved Side Channel Attacks on Pairing Based Cryptography Johannes Blömer∗ Peter Günther†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-24 04:01:18
186Mathematics / Supersingular elliptic curve / Hyperelliptic curve cryptography / Curve / Hessian form of an elliptic curve / Classical modular curve / Abstract algebra / Elliptic curves / Cryptography

Fast hashing to G2 on pairing friendly curves Michael Scott, Naomi Benger, Manuel Charlemagne, Luis J. Dominguez Perez, and Ezekiel J. Kachisa School of Computing Dublin City University Ballymun, Dublin 9, Ireland.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-18 11:36:28
187Cryptographic software / Secure Shell / UTS / Elliptic curve cryptography

Release Announcement - Version

Add to Reading List

Source URL: www.georgiasoftworks.com

Language: English - Date: 2014-05-02 19:09:24
188Secure communication / Key management / Transport Layer Security / Public-key cryptography / Perfect forward secrecy / Cipher suite / Secure Shell / Key / Elliptic curve Diffie–Hellman / Cryptography / Cryptographic protocols / Internet protocols

PDF Document

Add to Reading List

Source URL: www.isecpartners.com

Language: English - Date: 2014-09-04 15:37:42
189Finite fields / Electronic commerce / Key size / RSA / Key / Elliptic curve cryptography / Brute-force attack / XTR / Cryptanalysis / Cryptography / Public-key cryptography / Key management

J. Cryptology: 255–293 DOI: s00145 © 2001 International Association for Cryptologic Research Selecting Cryptographic Key Sizes

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2011-07-09 03:55:16
190Telecommunications engineering / Research In Motion / S&P/TSX 60 Index / Elliptic curve cryptography / Economy of Canada / Server / Network-attached storage / Storage area network / Electronic engineering / Computer storage / Computing / Local area networks

Success Story Certicom Certicom was founded in 1985 by a team of world-class cryptographers at the University of Waterloo in Ontario, Canada. In those early days, the researchers were intent on making elliptic curve cryp

Add to Reading List

Source URL: www.openstore.com

Language: English
UPDATE