31![How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de](https://www.pdfsearch.io/img/c0311beb27007c20cc4db7fd478a69e7.jpg) | Add to Reading ListSource URL: www.ei.rub.deLanguage: English - Date: 2016-05-24 15:16:00
|
---|
32![On the applicability of one method of elliptic curve discrete logarithm problem over prime fields to the Russian standardized curves E.K. Alekseev, V.D. Nikolaev, S.V. Smyshlyaev © CryptoPro LLC On the applicability of one method of elliptic curve discrete logarithm problem over prime fields to the Russian standardized curves E.K. Alekseev, V.D. Nikolaev, S.V. Smyshlyaev © CryptoPro LLC](https://www.pdfsearch.io/img/50e8d3a0de6a8a4cf6c364d9ecd81c57.jpg) | Add to Reading ListSource URL: ctcrypt.ruLanguage: English - Date: 2016-06-16 04:28:47
|
---|
33![](https://www.pdfsearch.io/img/25841821e72b51b0ae3973b9a1ce8cd1.jpg) |
Add to Reading ListSource URL: ecc.gov.phLanguage: English - Date: 2016-01-13 01:39:23
|
---|
34![Proceedings - NN - A Milestone Towards RFID Products Offering Asymmetric Authentication Based on Elliptic Proceedings - NN - A Milestone Towards RFID Products Offering Asymmetric Authentication Based on Elliptic](https://www.pdfsearch.io/img/6a378a1b07c7a2444baee1c5db69b35b.jpg) | Add to Reading ListSource URL: events.iaik.tugraz.atLanguage: English - Date: 2008-07-17 01:43:24
|
---|
35![CM proofs for elliptic curves over number elds Stephen Enright•Ward
Für meine Lieblingsdeutschlehrerin. CM proofs for elliptic curves over number elds Stephen Enright•Ward
Für meine Lieblingsdeutschlehrerin.](https://www.pdfsearch.io/img/fb389f12be70a6cd1e610909e0ecad37.jpg) | Add to Reading ListSource URL: iml.univ-mrs.frLanguage: English - Date: 2014-09-16 07:05:16
|
---|
36![1 A Randomized Multi-modulo RNS Architecture for Double-and-Add in ECC to prevent Power Analysis Side Channel Attacks Jude Angelo Ambrose† 1 A Randomized Multi-modulo RNS Architecture for Double-and-Add in ECC to prevent Power Analysis Side Channel Attacks Jude Angelo Ambrose†](https://www.pdfsearch.io/img/766fd4606476c3b1bf3c9b541a3627f6.jpg) | Add to Reading ListSource URL: www.inesc-id.ptLanguage: English - Date: 2013-12-23 08:24:26
|
---|
37![DARNS:A Randomized Multi-modulo RNS Architecture for Double-and-Add in ECC to prevent Power Analysis Side Channel Attacks Jude Angelo Ambrose Hector Pettenghi, Leonel Sousa DARNS:A Randomized Multi-modulo RNS Architecture for Double-and-Add in ECC to prevent Power Analysis Side Channel Attacks Jude Angelo Ambrose Hector Pettenghi, Leonel Sousa](https://www.pdfsearch.io/img/d9a06933a73ff9b8f489ddada0c2dc16.jpg) | Add to Reading ListSource URL: www.inesc-id.ptLanguage: English - Date: 2013-03-08 09:35:27
|
---|
38![Fast point multiplication algorithms for binary elliptic curves with and without precomputation Thomaz Oliveira 1 Diego F. Aranha 2 Julio L´opez Francisco Rodr´ıguez-Henr´ıquez 1 1 Fast point multiplication algorithms for binary elliptic curves with and without precomputation Thomaz Oliveira 1 Diego F. Aranha 2 Julio L´opez Francisco Rodr´ıguez-Henr´ıquez 1 1](https://www.pdfsearch.io/img/3c9935448c0f11263b46d911f1cfc91f.jpg) | Add to Reading ListSource URL: delta.cs.cinvestav.mxLanguage: English - Date: 2014-08-18 00:05:38
|
---|
39![MACISA — Mathematics applied to cryptology and information security in Africa — LIRIMA Meeting, Saint-Louis, Sénégal Damien Robert Équipe LFANT, Inria Bordeaux Sud-Ouest MACISA — Mathematics applied to cryptology and information security in Africa — LIRIMA Meeting, Saint-Louis, Sénégal Damien Robert Équipe LFANT, Inria Bordeaux Sud-Ouest](https://www.pdfsearch.io/img/a1bd6b7b8d6b18d350eb76b1872b88e0.jpg) | Add to Reading ListSource URL: www.normalesup.orgLanguage: English - Date: 2015-05-29 11:53:40
|
---|
40![The 2-adic CM method for genus 2 curves with application to cryptography P. Gaudry1,2 , T. Houtmann2 , D. Kohel3 , C. Ritzenthaler4 , and A. Weng2 1 LORIA - Projet SPACES The 2-adic CM method for genus 2 curves with application to cryptography P. Gaudry1,2 , T. Houtmann2 , D. Kohel3 , C. Ritzenthaler4 , and A. Weng2 1 LORIA - Projet SPACES](https://www.pdfsearch.io/img/93b9ef81e211779628ec737831686c82.jpg) | Add to Reading ListSource URL: iml.univ-mrs.frLanguage: English - Date: 2006-09-01 11:00:34
|
---|