<--- Back to Details
First PageDocument Content
Elliptic curve cryptography / Public-key cryptography / Pairing-based cryptography / Group theory / Binary operations / Hyperelliptic curve cryptography / Tate pairing / Elliptic curve / Abelian variety / Cryptography / DiffieHellman key exchange / BonehLynnShacham
Date: 2013-11-15 16:58:00
Elliptic curve cryptography
Public-key cryptography
Pairing-based cryptography
Group theory
Binary operations
Hyperelliptic curve cryptography
Tate pairing
Elliptic curve
Abelian variety
Cryptography
DiffieHellman key exchange
BonehLynnShacham

Abelian varieties, Theta functions and cryptography MSR presentation Damien Robert1 1

Add to Reading List

Source URL: www.normalesup.org

Download Document from Source Website

File Size: 427,73 KB

Share Document on Facebook

Similar Documents

C OLONEL B LOTTO : S EARCHING FOR PATTERNS IN A G AME OF A LLOCATION By Jeremiah Jones

C OLONEL B LOTTO : S EARCHING FOR PATTERNS IN A G AME OF A LLOCATION By Jeremiah Jones

DocID: 1rtXP - View Document

Time Series Lesson 9 Grant Foster  Representing Data

Time Series Lesson 9 Grant Foster Representing Data

DocID: 1rs99 - View Document

The Practical Use of the Bemer Method for Exponentials Update Version: September 5, 2006 Ron Doerfler (http://www.myreckonings.com) In Chapter 4 of my book, Dead Reckoning: Calculating Without Instruments, a method is gi

The Practical Use of the Bemer Method for Exponentials Update Version: September 5, 2006 Ron Doerfler (http://www.myreckonings.com) In Chapter 4 of my book, Dead Reckoning: Calculating Without Instruments, a method is gi

DocID: 1rrb5 - View Document

Microsoft Word - Eureka Math Grade 1 Module 3 Tips for Parents.docx

Microsoft Word - Eureka Math Grade 1 Module 3 Tips for Parents.docx

DocID: 1rqUG - View Document

Maths Home Learning Terms 5 & 6  Year 5 & 6 I know and understand

Maths Home Learning Terms 5 & 6 Year 5 & 6 I know and understand

DocID: 1rnQX - View Document