Elliptic Curve DSA

Results: 77



#Item
1Public-key cryptography / Elliptic Curve DSA / Hash function / Key / Wallet / Cryptographic nonce / SHA-2 / Cryptography / Bitcoin / Peer-to-peer computing

Deterministic wallets End Deterministic wallets Gregory Maxwell et. al.

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2014-05-26 22:22:44
2Information / NSA Suite B Cryptography / Internet Key Exchange / IPsec / Elliptic curve cryptography / Elliptic curve Diffie–Hellman / Elliptic Curve DSA / Key-agreement protocol / Diffie–Hellman key exchange / Cryptographic protocols / Cryptography / Data

Internet Engineering Task Force (IETF) Request for Comments: 6380 Category: Informational ISSN: K. Burgin

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2011-10-18 14:31:43
3Forking lemma / Random oracle / Preimage attack / Digital signature / Collision resistance / Elliptic Curve DSA / Standard model / MD5 / Birthday attack / Cryptography / Cryptographic hash functions / Schnorr signature

Hash Function Requirements for Schnorr Signatures Gregory Neven1,2 , Nigel P. Smart3 , and Bogdan Warinschi3 1 IBM Research – Zurich, Switzerland

Add to Reading List

Source URL: www.neven.org

Language: English - Date: 2012-04-18 06:08:49
4Ubiquitous computing / Smart cards / Contactless smart card / RSA / Digital signature / Java Card / Elliptic Curve DSA / Magnetic stripe card / Power analysis / Cryptography / Public-key cryptography / ISO standards

May 20, 2011 Smart card implementation of a digital signature scheme for Twisted Edwards curves Author: Niels Duif∗

Add to Reading List

Source URL: www.nielsduif.nl

Language: English - Date: 2011-05-20 10:31:35
5Cryptographic protocols / Elliptic curve Diffie–Hellman / Diffie–Hellman key exchange / SHA-1 / SHA-2 / Elliptic Curve DSA / Key derivation function / Key / CRYPTREC / Cryptography / Cryptographic hash functions / Key management

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Key Establishment Schemes —

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:17:39
6Public-key cryptography / Cryptographic protocols / Elliptic curve cryptography / Key size / Elliptic curve Diffie–Hellman / Digital signature / Elliptic Curve DSA / Diffie–Hellman key exchange / Elliptic curve / Cryptography / Key management / Finite fields

Lecture 14: Elliptic Curve Cryptography and Digital Rights Management Lecture Notes on “Computer and Network Security” by Avi Kak () April 23, :55am

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-23 00:56:33
7Digital signature / Digital Signature Algorithm / SHA-2 / SHA-1 / RSA / FIPS 140-2 / Public key certificate / Cryptography / Public-key cryptography / Elliptic Curve DSA

PDF Document

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:18:14
8Digital signature / Elliptic Curve DSA / Public key certificate / SHA-1 / Federal Information Processing Standard / RSA / Non-repudiation / Data Encryption Standard / Secure Hash Standard / Cryptography / Public-key cryptography / Digital Signature Algorithm

FIPS PUB 186-2 (+Change Notice) FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION 2000 January 27

Add to Reading List

Source URL: techheap.packetizer.com

Language: English - Date: 2002-12-15 10:57:16
9Numeral systems / Elliptic Curve DSA / Exponentiation / Logarithm / Radix / Precomputation / Elliptic curve cryptography / Exponentiation by squaring / Mathematics / Abstract algebra / Exponentials

Cryptology ePrint Archive, Report, http://eprint.iacr.org/ Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification Bodo M¨oller and Andy Rupp

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2008-05-19 15:51:37
10Electronic commerce / Cyberwarfare / Mathematics / Applied mathematics / Implicit certificate / Finite fields / Elliptic Curve DSA / Elliptic curve cryptography / Digital signature / Public-key cryptography / Cryptography / Key management

Security of ECQV-Certified ECDSA Against Passive Adversaries

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-03-09 14:11:31
UPDATE