<--- Back to Details
First PageDocument Content
Abstract algebra / Algebra / Geometry / Finite fields / Elliptic curve cryptography / Elliptic curves / Analytic number theory / Elliptic curve / Group theory / Curve / Elliptic-curve cryptography / Supersingular elliptic curve
Date: 2018-06-12 00:43:12
Abstract algebra
Algebra
Geometry
Finite fields
Elliptic curve cryptography
Elliptic curves
Analytic number theory
Elliptic curve
Group theory
Curve
Elliptic-curve cryptography
Supersingular elliptic curve

A New Family of Pairing-Friendly elliptic curves Michael Scott1 and Aurore Guillevic2 1 2

Add to Reading List

Source URL: www.waifi.org

Download Document from Source Website

File Size: 327,42 KB

Share Document on Facebook

Similar Documents

The Next Bigly Thing : Plastic-To-Oil by Robert A. Nelson Many experts warn that we are on the down side of the

The Next Bigly Thing : Plastic-To-Oil by Robert A. Nelson Many experts warn that we are on the down side of the "Peak Oil" Bell Curve of supply:demand -- but we clever hominids shall probe ever deeper with mighty microwa

DocID: 1xVPR - View Document

Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbrenner, Hoang Le, Mohammed Khaleeluddin, Ramakrishna Bachimanchi George Mason University {kg

Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbrenner, Hoang Le, Mohammed Khaleeluddin, Ramakrishna Bachimanchi George Mason University {kg

DocID: 1xVNI - View Document

Hardware for Collision Search on Elliptic Curve over GF(2m) Philippe Bulens∗, Guerric Meurice de Dormale† and Jean-Jacques Quisquater UCL Crypto Group Universit´e Catholique de Louvain

Hardware for Collision Search on Elliptic Curve over GF(2m) Philippe Bulens∗, Guerric Meurice de Dormale† and Jean-Jacques Quisquater UCL Crypto Group Universit´e Catholique de Louvain

DocID: 1xVem - View Document

On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp

On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp

DocID: 1xUIc - View Document