<--- Back to Details
First PageDocument Content
Cryptography / Elliptic curve cryptography / Elliptic-curve DiffieHellman / DiffieHellman key exchange / Cryptographic protocols / Alice and Bob / Computational hardness assumptions / Transport Layer Security / WolfSSH
Date: 2018-07-31 15:14:59
Cryptography
Elliptic curve cryptography
Elliptic-curve DiffieHellman
DiffieHellman key exchange
Cryptographic protocols
Alice and Bob
Computational hardness assumptions
Transport Layer Security
WolfSSH

In search of CurveSwap: Measuring elliptic curve implementations in the wild Luke Valenta∗ , Nick Sullivan† , Antonio Sanso‡ , Nadia Heninger∗ ∗ University

Add to Reading List

Source URL: www.seas.upenn.edu

Download Document from Source Website

File Size: 1,83 MB

Share Document on Facebook

Similar Documents

Cryptography / Public-key cryptography / Commitment scheme / ElGamal encryption / DiffieHellman key exchange / Elgamal / Homomorphic encryption

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

DocID: 1rsiG - View Document

Cryptography / Elliptic curve cryptography / Public-key cryptography / Pairing-based cryptography / Finite fields / Group theory / Hyperelliptic curve cryptography / Tate pairing / DiffieHellman key exchange / BonehLynnShacham / Elliptic curve / Abelian variety

Theta functions and applications in cryptography Fonctions thêta et applications en cryptographie Thèse d’informatique Damien Robert1 1

DocID: 1ramq - View Document

Cryptography / Public-key cryptography / DiffieHellman key exchange / Elliptic curve cryptography / Finite fields / SPEKE / Elliptic curve DiffieHellman

Algorithm and Implementation Optimisation of Cryptographic Computation over Elliptic Curves (F2m ) Jean-Marc ROBERT Team DALI/LIRMM, University of Perpignan, France Perpignan, the 30th of may 2012

DocID: 1r4wa - View Document

Cryptography / Key management / Public-key cryptography / Public key infrastructure / DiffieHellman key exchange / Key-agreement protocol / Information-theoretic security / IEEE 802.11 / RSA / Key generation / Key distribution / Secure channel

Random Channel Hopping Schemes for Key Agreement in Wireless Networks Bin Zan Marco Gruteser

DocID: 1r3wb - View Document

Cryptography / Public-key cryptography / Cryptographic protocols / Secure communication / Cryptographic software / Signal Protocol / DiffieHellman key exchange / Digital signature / XTR / HKDF / Signal / Elliptic curve DiffieHellman

How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

DocID: 1qNCV - View Document