<--- Back to Details
First PageDocument Content
Cryptography / Elliptic curve cryptography / EdDSA / Elliptic-curve cryptography / Elliptic Curve Digital Signature Algorithm / Curve25519 / Elliptic-curve DiffieHellman / Digital signature / Digital Signature Algorithm / Daniel J. Bernstein / Hash function / Public-key cryptography
Date: 2011-07-09 00:19:47
Cryptography
Elliptic curve cryptography
EdDSA
Elliptic-curve cryptography
Elliptic Curve Digital Signature Algorithm
Curve25519
Elliptic-curve DiffieHellman
Digital signature
Digital Signature Algorithm
Daniel J. Bernstein
Hash function
Public-key cryptography

High-speed high-security signatures Daniel J. Bernstein1 , Niels Duif2 , Tanja Lange2 , Peter Schwabe3 , and Bo-Yin Yang4 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

Add to Reading List

Source URL: precision.moscito.org

Download Document from Source Website

File Size: 269,36 KB

Share Document on Facebook

Similar Documents

Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper  1

Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper 1

DocID: 1ov5N - View Document

EdDSA signatures and Ed25519 Peter Schwabe Joint work with Daniel J. Bernstein, Niels Duif, Tanja Lange, and Bo-Yin Yang March 20, 2012

EdDSA signatures and Ed25519 Peter Schwabe Joint work with Daniel J. Bernstein, Niels Duif, Tanja Lange, and Bo-Yin Yang March 20, 2012

DocID: 1niQQ - View Document