Elliptic curve cryptography

Results: 465



#Item
171Accumulator / Central processing unit / Elliptic curve cryptography / Bloom filter / Elliptic curve Diffie–Hellman / Elliptic curve / Key / Wireless sensor network / Contiki / Cryptography / Key management / Public-key cryptography

Introduction to Laboratory Research : Evaluation of a Distributed Key Certification using Accumulators in very Constrained Wireless Sensor Networks Andr´e Naz1 Supervisors: Jun-Young Bae2 , Franck Rousseau2

Add to Reading List

Source URL: ensiwiki.ensimag.fr

Language: English - Date: 2013-05-26 13:35:07
172XTR / Function / Cryptographic protocols / Mathematics / Elliptic curve Diffie–Hellman / Public-key cryptography

A quantum-safe circuit-extension handshake for Tor

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:35:22
173Computing / Telecommunications engineering / Key distribution / Key management / Wireless mesh network / Public-key cryptography / ANT / Sensor node / Elliptic curve Diffie–Hellman / Wireless sensor network / Wireless networking / Technology

Securing Network Access in Wireless Sensor Networks* Kun Sun§ § An Liu†

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:22
174Digital signature / Digital Signature Algorithm / SHA-2 / SHA-1 / RSA / FIPS 140-2 / Public key certificate / Cryptography / Public-key cryptography / Elliptic Curve DSA

PDF Document

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:18:14
175Key management / Post-quantum cryptography / Key size / NTRU / Elliptic curve cryptography / Homomorphic encryption / RSA / McEliece cryptosystem / Key / Cryptography / Public-key cryptography / Electronic commerce

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 12:49:59
176Quantum cryptography / Quantum information science / Key management / Quantum computer / Quantum key distribution / Quantum algorithm / Public-key cryptography / Elliptic curve cryptography / Quantum information / Cryptography / Applied mathematics / Theoretical computer science

PDF Document

Add to Reading List

Source URL: docbox.etsi.org

Language: English - Date: 2014-10-04 16:35:34
177IEEE P1363 / SPEKE / Secure Remote Password protocol / Encrypted key exchange / Password / PKCS / Key-agreement protocol / Key exchange / Elliptic curve cryptography / Cryptography / Cryptographic protocols / Password-authenticated key agreement

PDF Document

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2008-04-27 09:53:57
178Dual EC DRBG / National Institute of Standards and Technology / National Security Agency / Factorial / Blum Blum Shub / RBG / One-way function / Mathematics / Pseudorandom number generators / Cryptography

. The Dual Elliptic Curve Deterministic RBG . Background, Specification, Security and Notes

Add to Reading List

Source URL: www.untruth.org

Language: English - Date: 2013-06-22 03:51:50
179Quantum cryptography / Quantum information science / Key management / Quantum computer / Quantum key distribution / Quantum algorithm / Public-key cryptography / Elliptic curve cryptography / Quantum information / Cryptography / Applied mathematics / Theoretical computer science

Quantum Safe Whitepaper 1 0 0

Add to Reading List

Source URL: portal.etsi.org

Language: English - Date: 2015-02-09 10:34:26
180Diffie–Hellman problem / Key-agreement protocol / Public-key cryptography / Key exchange / Elliptic curve cryptography / ID-based encryption / Internet Key Exchange / Boneh/Franklin scheme / Elliptic curve Diffie–Hellman / Cryptographic protocols / Cryptography / Diffie–Hellman key exchange

Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols Jue-Sam Chou1 , Yalin Chen 2 , Ming-De Yang 3 1 Department of Information Management, Nanhua University Chiayi 622 Taiwan, R.O.C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-09 06:49:50
UPDATE