Elliptic curve cryptography

Results: 465



#Item
321Cryptography standards / Elliptic curve cryptography / HMAC / SHA-1 / SHA-2 / Key size / FIPS 140-2 / PBKDF2 / Crypto++ / Cryptography / Cryptographic software / Cryptographic hash functions

RSA BSAFE Crypto-C Micro Edition[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-06-24 12:10:48
322Elliptic curve cryptography / HMAC / Whitfield Diffie / FIPS 140-2 / Crypto++ / Network Security Services / Cryptography / Cryptographic software / Key size

RSA BSAFE® Crypto-C Micro Edition for Samsung MFP SW Platform (VxWorks) Security Policy Version[removed]December 3, 2012

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-03 06:34:12
323FIPS 140 / NSA Suite B Cryptography / HMAC / Elliptic curve cryptography / Advanced Encryption Standard / Key generation / Microsoft CryptoAPI / Crypto++ / Cryptography / Cryptography standards / Cryptographic software

Microsoft Word - C3m_software_SP.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-11-29 10:31:00
324Analytic geometry / Analytic functions / Differential equations / Elliptic curve cryptography / Mathematical analysis / Mathematics / Geometry

MATHEMATICS A The University of the State of New York REGENTS HIGH SCHOOL EXAMINATION MATHEMATICS A

Add to Reading List

Source URL: www.nysedregents.org

Language: English - Date: 2010-01-07 07:52:04
325Number theorists / Fields Medalists / Elliptic curve cryptography / Gerhard Frey / Algebraic topology / Quantum cryptography / Homotopy / John Milnor / Elliptic curve / Mathematics / Cryptography / Science

FIELDSNOTES JANUARY 2007 I VOLUME 7:1

Add to Reading List

Source URL: www.fields.utoronto.ca

Language: English - Date: 2007-03-13 13:31:41
326Privacy of telecommunications / Mass surveillance / National Security Agency / Signals intelligence / Espionage / NSA warrantless surveillance controversy / Foreign Intelligence Surveillance Act / Telephone tapping / Elliptic curve cryptography / National security / Security / Surveillance

web extra Making Sense of Snowden, Part II: What’s Significant in the NSA Revelations Susan Landau, Google

Add to Reading List

Source URL: www.computer.org

Language: English - Date: 2014-01-30 14:23:54
327Elliptic curve cryptography / Key size / Key / NTRU / IEEE P1363 / Integer factorization / Elliptic curve / Elliptic Curve DSA / Digital signature / Cryptography / Key management / Public-key cryptography

Elliptic Curve PKI An exploration of the benefits and challenges of a PKI based on elliptic curve cryptography Get this White Paper

Add to Reading List

Source URL: entrust.wpengine.netdna-cdn.com

Language: English - Date: 2013-05-03 16:51:59
328Quality / Validation / FIPS 140-2 / Elliptic curve cryptography / Key derivation function / Key / Digital Signature Algorithm / Acceptance testing / Crypt / Cryptography / Key management / Public-key cryptography

The Key Agreement Schemes Validation System (KASVS) Updated: May 22, 2014 Previously Updated: January 23, 2013 Previously Updated: September 1, 2011

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-05-22 10:26:32
329

Legend for Description Field for the Historical SP800-56A Section[removed]Elliptic Curve Cryptography Cofactor Diffie-Hellman (ECCCDH) Primitive Last Update: [removed]NOTICE: The SP800-131A Transitions: Recommendation

Add to Reading List

Source URL: csrc.nist.gov

- Date: 2014-01-08 12:26:57
    330Elliptic curve cryptography / Elliptic Curve DSA / Digital signature / Key / Parameter validation / Validation / Cryptography / Key management / Public-key cryptography

    Legend for Description Field for Historical List for All of SP800-56A EXCEPT KDF Last Update: [removed]NOTICE: The SP800-131A Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Leng

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2014-01-08 12:27:28
    UPDATE