Elliptic curve cryptography

Results: 465



#Item
21Efficient arithmetic on elliptic curves in characteristic 2 David Kohel Institut de Math´ematiques de Luminy Universit´e d’Aix-Marseille 163, avenue de Luminy, Case 907

Efficient arithmetic on elliptic curves in characteristic 2 David Kohel Institut de Math´ematiques de Luminy Universit´e d’Aix-Marseille 163, avenue de Luminy, Case 907

Add to Reading List

Source URL: iml.univ-mrs.fr

Language: English - Date: 2012-10-26 16:31:31
22Indifferentiable Hashing to Elliptic and Hyperelliptic Curves Mehdi Tibouchi NTT Secure Platform Laboratories  ECC Workshop 2013, 2013–09–17

Indifferentiable Hashing to Elliptic and Hyperelliptic Curves Mehdi Tibouchi NTT Secure Platform Laboratories ECC Workshop 2013, 2013–09–17

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2013-10-09 09:45:18
23Theta functions and applications in cryptography Fonctions thêta et applications en cryptographie Thèse d’informatique Damien Robert1 1

Theta functions and applications in cryptography Fonctions thêta et applications en cryptographie Thèse d’informatique Damien Robert1 1

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2014-08-03 16:15:38
24Intro  Background 4-dim GLV dec. E

Intro Background 4-dim GLV dec. E

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2013-09-20 10:31:31
25ECC Summer School – Exercices Damien RobertCryptography  Implement public key encryption and signature with elliptic curves:

ECC Summer School – Exercices Damien RobertCryptography Implement public key encryption and signature with elliptic curves:

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-09-25 11:36:46
26Algorithm and Implementation Optimisation of Cryptographic Computation over Elliptic Curves (F2m ) Jean-Marc ROBERT Team DALI/LIRMM, University of Perpignan, France  Perpignan, the 30th of may 2012

Algorithm and Implementation Optimisation of Cryptographic Computation over Elliptic Curves (F2m ) Jean-Marc ROBERT Team DALI/LIRMM, University of Perpignan, France Perpignan, the 30th of may 2012

Add to Reading List

Source URL: raim2012.u-bourgogne.fr

Language: English - Date: 2012-07-16 09:25:38
27Computing discrete logarithms in fields of small characteristic Francisco Rodr´ıguez-Henr´ıquez CINVESTAV-IPN  Joint work with:

Computing discrete logarithms in fields of small characteristic Francisco Rodr´ıguez-Henr´ıquez CINVESTAV-IPN Joint work with:

Add to Reading List

Source URL: delta.cs.cinvestav.mx

Language: English - Date: 2014-04-09 13:26:56
28The S˜ao Paulo Advanced School of Cryptography — SP-ASCryptoHardware Implementation of Pairings Francisco Rodr´ıguez-Henr´ıquez CINVESTAV-IPN, Mexico City, Mexico

The S˜ao Paulo Advanced School of Cryptography — SP-ASCryptoHardware Implementation of Pairings Francisco Rodr´ıguez-Henr´ıquez CINVESTAV-IPN, Mexico City, Mexico

Add to Reading List

Source URL: delta.cs.cinvestav.mx

Language: English - Date: 2011-10-24 22:54:15
29STANDARS FOR EFFICIENT CRYPTOGRAPHY  SEC X.2: Recommended Elliptic Curve Domain Parameters  Nippon Telephone and Telegraph Corporation

STANDARS FOR EFFICIENT CRYPTOGRAPHY SEC X.2: Recommended Elliptic Curve Domain Parameters Nippon Telephone and Telegraph Corporation

Add to Reading List

Source URL: info.isl.ntt.co.jp

Language: English - Date: 2015-03-02 00:44:51
30ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels ∗ Daniel Genkin Lev Pachmanov

ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels ∗ Daniel Genkin Lev Pachmanov

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2016-08-19 14:59:40