Elliptic curve cryptography

Results: 465



#Item
31How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

Add to Reading List

Source URL: www.ei.rub.de

Language: English - Date: 2016-05-24 15:16:00
32On the applicability of one method of elliptic curve discrete logarithm problem over prime fields to the Russian standardized curves E.K. Alekseev, V.D. Nikolaev, S.V. Smyshlyaev  © CryptoPro LLC

On the applicability of one method of elliptic curve discrete logarithm problem over prime fields to the Russian standardized curves E.K. Alekseev, V.D. Nikolaev, S.V. Smyshlyaev © CryptoPro LLC

Add to Reading List

Source URL: ctcrypt.ru

Language: English - Date: 2016-06-16 04:28:47
33

Add to Reading List

Source URL: ecc.gov.ph

Language: English - Date: 2016-01-13 01:39:23
34Proceedings  - NN - A Milestone Towards RFID Products Offering Asymmetric Authentication Based on Elliptic

Proceedings - NN - A Milestone Towards RFID Products Offering Asymmetric Authentication Based on Elliptic

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:43:24
35CM proofs for elliptic curves over number elds Stephen Enright•Ward Für meine Lieblingsdeutschlehrerin.

CM proofs for elliptic curves over number elds Stephen Enright•Ward Für meine Lieblingsdeutschlehrerin.

Add to Reading List

Source URL: iml.univ-mrs.fr

Language: English - Date: 2014-09-16 07:05:16
361  A Randomized Multi-modulo RNS Architecture for Double-and-Add in ECC to prevent Power Analysis Side Channel Attacks Jude Angelo Ambrose†

1 A Randomized Multi-modulo RNS Architecture for Double-and-Add in ECC to prevent Power Analysis Side Channel Attacks Jude Angelo Ambrose†

Add to Reading List

Source URL: www.inesc-id.pt

Language: English - Date: 2013-12-23 08:24:26
37DARNS:A Randomized Multi-modulo RNS Architecture for Double-and-Add in ECC to prevent Power Analysis Side Channel Attacks Jude Angelo Ambrose  Hector Pettenghi, Leonel Sousa

DARNS:A Randomized Multi-modulo RNS Architecture for Double-and-Add in ECC to prevent Power Analysis Side Channel Attacks Jude Angelo Ambrose Hector Pettenghi, Leonel Sousa

Add to Reading List

Source URL: www.inesc-id.pt

Language: English - Date: 2013-03-08 09:35:27
38Fast point multiplication algorithms for binary elliptic curves with and without precomputation Thomaz Oliveira 1 Diego F. Aranha 2 Julio L´opez Francisco Rodr´ıguez-Henr´ıquez 1 1

Fast point multiplication algorithms for binary elliptic curves with and without precomputation Thomaz Oliveira 1 Diego F. Aranha 2 Julio L´opez Francisco Rodr´ıguez-Henr´ıquez 1 1

Add to Reading List

Source URL: delta.cs.cinvestav.mx

Language: English - Date: 2014-08-18 00:05:38
39MACISA — Mathematics applied to cryptology and information security in Africa — LIRIMA Meeting, Saint-Louis, Sénégal Damien Robert Équipe LFANT, Inria Bordeaux Sud-Ouest

MACISA — Mathematics applied to cryptology and information security in Africa — LIRIMA Meeting, Saint-Louis, Sénégal Damien Robert Équipe LFANT, Inria Bordeaux Sud-Ouest

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-05-29 11:53:40
40The 2-adic CM method for genus 2 curves with application to cryptography P. Gaudry1,2 , T. Houtmann2 , D. Kohel3 , C. Ritzenthaler4 , and A. Weng2 1  LORIA - Projet SPACES

The 2-adic CM method for genus 2 curves with application to cryptography P. Gaudry1,2 , T. Houtmann2 , D. Kohel3 , C. Ritzenthaler4 , and A. Weng2 1 LORIA - Projet SPACES

Add to Reading List

Source URL: iml.univ-mrs.fr

Language: English - Date: 2006-09-01 11:00:34