Elliptic curve cryptography

Results: 465



#Item
401Algebraic curves / Group theory / Cryptography / Finite fields / Hyperelliptic curve cryptography / Public-key cryptography / Imaginary hyperelliptic curve / Real hyperelliptic curve / Elliptic curve cryptography / Abstract algebra / Algebra / Mathematics

9th Central European Conference on Cryptography - Tˇ reb´ıˇ c’09

Add to Reading List

Source URL: conf.fme.vutbr.cz

Language: English - Date: 2009-05-12 03:20:24
402Analytic number theory / Elliptic curves / Group theory / Elliptic curve cryptography / Algebraic curves / Elliptic curve / Abelian variety / Birch and Swinnerton-Dyer conjecture / Tripling-oriented Doche–Icart–Kohel curve / Abstract algebra / Algebraic geometry / Mathematics

Elliptic Curves over Q Steven Finch October 10, 2005 All polynomials and rational functions in this essay are assumed to have coefficients in Q. Fix an integer n ≥ 1. An affine variety is a simultaneous irreducible sys

Add to Reading List

Source URL: www.people.fas.harvard.edu

Language: English - Date: 2014-02-09 14:07:28
403Mathematics / Science / Dimension / Cryptography / Elliptic curve / Ellipse

Errata for Elliptic Curves: Number Theory and Cryptography, 2nd ed. by Lawrence C. Washington page vi, line 17: Insert a period at the end of the sentence. page xviii, line -2: the references start on page 499 (not 501)

Add to Reading List

Source URL: www.math.umd.edu

Language: English - Date: 2009-04-15 10:19:26
404Finite fields / Cryptography / Field theory / Group theory / Elliptic curves / Elliptic curve cryptography / Elliptic curve / Normal basis / Curve / Abstract algebra / Algebra / Mathematics

RECOMMENDED ELLIPTIC CURVES FOR FEDERAL

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2008-12-04 00:00:00
405Finite fields / BLS / Computational hardness assumptions / Digital signature / Full Domain Hash / Rabin signature algorithm / Diffie–Hellman key exchange / Diffie–Hellman problem / Elliptic Curve DSA / Cryptography / Public-key cryptography / Cryptographic protocols

Short Signatures from the Weil Pairing∗ Dan Boneh† [removed]

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2007-09-08 17:10:53
406Internet protocols / Internet standards / Electronic commerce / Online Certificate Status Protocol / SMS / X.509 / Elliptic curve cryptography / Mobile banking / MQV / Cryptography / Public-key cryptography / Cryptographic protocols

SSMS - A Secure SMS Messaging Protocol for the M-Payment Systems † Mohsen Toorani ‡

Add to Reading List

Source URL: webpages.iust.ac.ir

Language: English - Date: 2012-03-16 17:40:29
407Key management / Elliptic curve cryptography / IEEE P1363 / MQV / Integrated Encryption Scheme / Elliptic curve Diffie–Hellman / SECG / Digital signature / Key size / Cryptography / Cryptography standards / Public-key cryptography

S TANDARDS FOR E FFICIENT C RYPTOGRAPHY SEC 1: Elliptic Curve Cryptography

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2002-09-13 00:00:00
408Pseudorandomness / Pseudorandom number generators / Computational complexity theory / Cryptography / Randomness / Pseudorandom generator / Random number generation / Elliptic curve cryptography / Normal distribution / Theoretical computer science / Applied mathematics / Mathematics

Cryptanalysis of the Dual Elliptic Curve Pseudorandom Generator Berry Schoenmakers and Andrey Sidorenko Dept. of Mathematics and Computer Science, TU Eindhoven,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-09-15 11:33:41
409Secure communication / Cryptographic protocols / Elliptic curve cryptography / Cipher suite / Bitcoin / Elliptic Curve DSA / Secure Shell / Public-key cryptography / Elliptic curve Diffie–Hellman / Cryptography / Key management / Internet protocols

Elliptic Curve Cryptography in Practice Joppe W. Bos1 , J. Alex Halderman2 , Nadia Heninger3 , Jonathan Moore, Michael Naehrig1 , and Eric Wustrow2

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2013-11-14 17:18:03
410Public-key cryptography / Elliptic curve / Cryptanalysis / Curve / Cipher / IEEE P1363 / ECC patents / Key size / Cryptography / Finite fields / Elliptic curve cryptography

Security dangers of the NIST curves Daniel J. Bernstein, Tanja Lange

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2013-06-08 20:02:29
UPDATE