COSIC

Results: 193



#Item
11

On a generalized Gross-Zagier formula and applications to genus 2 curves in cryptography Kristin Lauter, Microsoft Research Joint work with: Bianca Viray, Brown University

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

- Date: 2013-09-19 10:39:02
    12

    Fast Cryptography in Genus 2 Joppe W. Bos Joint work with Craig Costello, Huseyin Hisil, Kristin Lauter

    Add to Reading List

    Source URL: www.cosic.esat.kuleuven.be

    - Date: 2013-09-19 10:38:53
      13

      Applications of class groups of CM-fields Marco Streng Universiteit Leiden joint work with

      Add to Reading List

      Source URL: www.cosic.esat.kuleuven.be

      - Date: 2013-09-19 10:39:13
        14

        Fast, twist-secure elliptic curve cryptography from Q-curves Benjamin Smith Team GRACE INRIA Saclay–ˆIle-de-France ´

        Add to Reading List

        Source URL: www.cosic.esat.kuleuven.be

        - Date: 2013-09-19 10:39:36
          15

          Toward an Efficient Website Fingerprinting Defense Marc Juarez1 , Mohsen Imani2 , Mike Perry3 , Claudia Diaz1 , and Matthew Wright2 1 KU Leuven, ESAT/COSIC and iMinds, Leuven, Belgium,

          Add to Reading List

          Source URL: securehomes.esat.kuleuven.be

          - Date: 2016-07-19 06:21:33
            16

            Two is the fastest prime Thomaz Oliveira 1 Julio L´ opez 2 Diego F. Aranha Francisco Rodr´ıguez-Henr´ıquez 1 1 2

            Add to Reading List

            Source URL: www.cosic.esat.kuleuven.be

            - Date: 2013-10-09 09:48:53
              17Economy / Money / Finance / Credit cards / Payment systems / American Express / Visa Inc. / Leuven / Novotel / Diners Club International / Payment card number

              Reservation form Novotel Leuven Centrum : KUL – ESATReservation for MR / MRS (block capitals) Date : _________

              Add to Reading List

              Source URL: www.cosic.esat.kuleuven.be

              Language: English - Date: 2013-05-03 09:06:22
              18Hashing / Information retrieval / Cryptography / Information science / Search algorithms / Elliptic curves / Error detection and correction / Analytic number theory / Elliptic curve / Supersingular elliptic curve / Hash function / BonehLynnShacham

              Indifferentiable Hashing to Elliptic and Hyperelliptic Curves Mehdi Tibouchi NTT Secure Platform Laboratories ECC Workshop 2013, 2013–09–17

              Add to Reading List

              Source URL: www.cosic.esat.kuleuven.be

              Language: English - Date: 2013-10-09 09:45:18
              19Abstract algebra / Geometry / Group theory / Algebra / Analytic number theory / Elliptic curve / Position / Elliptic curves / Elliptic curve cryptography

              Intro Background 4-dim GLV dec. E

              Add to Reading List

              Source URL: www.cosic.esat.kuleuven.be

              Language: English - Date: 2013-09-20 10:31:31
              20Machine learning / Computing / Statistics / Internet / Cluster analysis / Data mining / Geostatistics / K-means clustering / Statistical classification / Recommender system / Unsupervised learning / Tor

              Profiling Tor Users with Unsupervised Learning Techniques Rafael G´ alvez, Marc Juarez, and Claudia Diaz KU Leuven, ESAT/COSIC and iMinds, Leuven, Belgium {name.surname}@esat.kuleuven.be

              Add to Reading List

              Source URL: securehomes.esat.kuleuven.be

              Language: English - Date: 2016-07-19 06:23:33
              UPDATE