Elliptic Curve DSA

Results: 77



#Item
11Proceedings of PKC ’05 (January 23–26, 2005, Les Diablerets, Switzerland) S. Vaudenay (Ed.), vol. ???? of Lecture Notes in Computer Science, pages ??–?? c 
IACR (http://www.iacr.org) and Springer-Verlag (http://www

Proceedings of PKC ’05 (January 23–26, 2005, Les Diablerets, Switzerland) S. Vaudenay (Ed.), vol. ???? of Lecture Notes in Computer Science, pages ??–?? c IACR (http://www.iacr.org) and Springer-Verlag (http://www

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-11-19 06:18:26
12Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes Dalin Chu Johann Großschädl

Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes Dalin Chu Johann Großschädl

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-03-25 20:03:52
13VLSI Implementation of Double-Base Scalar Multiplication on a Twisted Edwards Curve with an Efficiently Computable Endomorphism Zhe Liu1 , Husen Wang2 , Johann Großsch¨adl1 , Zhi Hu3 , and Ingrid Verbauwhede1 1

VLSI Implementation of Double-Base Scalar Multiplication on a Twisted Edwards Curve with an Efficiently Computable Endomorphism Zhe Liu1 , Husen Wang2 , Johann Großsch¨adl1 , Zhi Hu3 , and Ingrid Verbauwhede1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-04 12:51:01
14Elliptic Curves in the BasicCard Tony Guilfoyle ZeitControl cardsystems GmbH e-mail:  14th February 2000

Elliptic Curves in the BasicCard Tony Guilfoyle ZeitControl cardsystems GmbH e-mail: 14th February 2000

Add to Reading List

Source URL: www.basiccard.com

Language: English - Date: 2000-02-16 08:07:52
15Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme Steven Goldfeder Princeton University [removed]  Rosario Gennaro

Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme Steven Goldfeder Princeton University [removed] Rosario Gennaro

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2015-03-08 09:13:05
16Authenticated Key Exchange over Bitcoin Patrick McCorry, Siamak F. Shahandashti, Dylan Clarke, Feng Hao Newcastle University, UK {patrick.mccorry,siamak.shahandashti,dylan.clarke,feng.hao}@ncl.ac.uk  Abstract. Bitcoin is

Authenticated Key Exchange over Bitcoin Patrick McCorry, Siamak F. Shahandashti, Dylan Clarke, Feng Hao Newcastle University, UK {patrick.mccorry,siamak.shahandashti,dylan.clarke,feng.hao}@ncl.ac.uk Abstract. Bitcoin is

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-03 08:37:15
17Toward Mitigating Denial of Service Attacks in Power-Constrained Sensor Networks Ortal Arazi, Hairong Qi College of Engineering Dept. of Electrical & Computer Engineering

Toward Mitigating Denial of Service Attacks in Power-Constrained Sensor Networks Ortal Arazi, Hairong Qi College of Engineering Dept. of Electrical & Computer Engineering

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-11 16:35:44
183-11 Hysteresis Signature and Its Related Technologies to Maintain the Digital Evidence for Network Activities in Future Society TOYOSHIMA Hisashi and MIYAZAKI Kunihiko Security Requirements are varied with rapid growth

3-11 Hysteresis Signature and Its Related Technologies to Maintain the Digital Evidence for Network Activities in Future Society TOYOSHIMA Hisashi and MIYAZAKI Kunihiko Security Requirements are varied with rapid growth

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:59:46
19Lattice-based Fault Attacks on DSA - Another Possible Strategy

Lattice-based Fault Attacks on DSA - Another Possible Strategy

Add to Reading List

Source URL: crypto.hyperlink.cz

Language: English - Date: 2005-08-29 10:42:00
20Cryptographic Insecurity of the Test&Repeat Paradigm

Cryptographic Insecurity of the Test&Repeat Paradigm

Add to Reading List

Source URL: crypto.hyperlink.cz

Language: English - Date: 2005-08-29 10:42:00