<--- Back to Details
First PageDocument Content
Internet protocols / Secure communication / Elliptic Curve DSA / Elliptic curve cryptography / Cipher suite / Digital signature / Cryptographic nonce / RSA / Timing attack / Cryptography / Public-key cryptography / Cryptographic protocols
Date: 2011-06-08 04:40:03
Internet protocols
Secure communication
Elliptic Curve DSA
Elliptic curve cryptography
Cipher suite
Digital signature
Cryptographic nonce
RSA
Timing attack
Cryptography
Public-key cryptography
Cryptographic protocols

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 347,99 KB

Share Document on Facebook

Similar Documents

Public-key cryptography / Elliptic Curve DSA / Hash function / Key / Wallet / Cryptographic nonce / SHA-2 / Cryptography / Bitcoin / Peer-to-peer computing

Deterministic wallets End Deterministic wallets Gregory Maxwell et. al.

DocID: 1gGjd - View Document

Information / NSA Suite B Cryptography / Internet Key Exchange / IPsec / Elliptic curve cryptography / Elliptic curve Diffie–Hellman / Elliptic Curve DSA / Key-agreement protocol / Diffie–Hellman key exchange / Cryptographic protocols / Cryptography / Data

Internet Engineering Task Force (IETF) Request for Comments: 6380 Category: Informational ISSN: K. Burgin

DocID: 1avEc - View Document

Forking lemma / Random oracle / Preimage attack / Digital signature / Collision resistance / Elliptic Curve DSA / Standard model / MD5 / Birthday attack / Cryptography / Cryptographic hash functions / Schnorr signature

Hash Function Requirements for Schnorr Signatures Gregory Neven1,2 , Nigel P. Smart3 , and Bogdan Warinschi3 1 IBM Research – Zurich, Switzerland

DocID: 19LBC - View Document

Ubiquitous computing / Smart cards / Contactless smart card / RSA / Digital signature / Java Card / Elliptic Curve DSA / Magnetic stripe card / Power analysis / Cryptography / Public-key cryptography / ISO standards

May 20, 2011 Smart card implementation of a digital signature scheme for Twisted Edwards curves Author: Niels Duif∗

DocID: 19d9u - View Document

Cryptographic protocols / Elliptic curve Diffie–Hellman / Diffie–Hellman key exchange / SHA-1 / SHA-2 / Elliptic Curve DSA / Key derivation function / Key / CRYPTREC / Cryptography / Cryptographic hash functions / Key management

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Key Establishment Schemes —

DocID: 18KxF - View Document