Back to Results
First PageMeta Content



Elliptic Curve Cryptography in Practice Joppe W. Bos1 , J. Alex Halderman2 , Nadia Heninger3 , Jonathan Moore, Michael Naehrig1 , and Eric Wustrow2 1 Microsoft Research
Add to Reading List

Document Date: 2013-12-02 05:21:30


Open Document

File Size: 576,02 KB

Share Result on Facebook

Company

E. / Sony / CBC / Microsoft / /

Country

Taiwan / Austria / /

Currency

USD / /

Facility

Microsoft Research University of Michigan University of Pennsylvania / /

IndustryTerm

rho algorithm / online payments / resource-limited embedded and headless devices / network firewall product / elliptic curve digital signature algorithm / divisor algorithm / real-world applications / standardized key exchange protocols / cryptographic / Internet-wide / public-key cryptography protocols / Internet-wide port scanner / software bugs / cryptographic systems / lightweight directory access protocol / message authenticity algorithms / automorphism / block chain / /

OperatingSystem

Android / /

Organization

U.S. Department of the Treasury / University of Pennsylvania / University of Michigan University / /

Person

Jonathan Moore / Bob / Alice / /

Product

Sony PlayStation 3 / ZMap / /

ProgrammingLanguage

Java / Javascript / /

ProvinceOrState

Pennsylvania / /

Technology

virtual machine / 2.4 Elliptic Curve Digital Signatures The Elliptic Curve Digital Signature Algorithm / peer-to-peer / lightweight directory access protocol / SSH protocols / private key / secret key / Android / SSH protocol / secure shell / basic elliptic curve Diffie-Hellman protocol / little-endian / encryption / Cryptography / Digital Certificate / public key / public-key cryptography protocols / Java / firewall / elliptic curve digital signature algorithm / divisor algorithm / standardized key exchange protocols / IPv4 / digital signature / rho algorithm / message authenticity algorithms / /

SocialTag