Elliptic curve cryptography

Results: 465



#Item
41MACISA — Mathematics applied to cryptology and information security in Africa — LIRIMA Evaluation Seminar, Paris Tony Ezome, Damien Robert Équipe LFANT, Inria Bordeaux Sud-Ouest

MACISA — Mathematics applied to cryptology and information security in Africa — LIRIMA Evaluation Seminar, Paris Tony Ezome, Damien Robert Équipe LFANT, Inria Bordeaux Sud-Ouest

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2014-10-04 12:30:49
42Algorithmic number theory and cryptography — Comité des projets, Bordeaux Damien R󰀻󰀮󰀱󰀾󰁀 Équipe LFANT, Inria Bordeaux Sud-Ouest

Algorithmic number theory and cryptography — Comité des projets, Bordeaux Damien R󰀻󰀮󰀱󰀾󰁀 Équipe LFANT, Inria Bordeaux Sud-Ouest

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2014-08-21 15:44:55
43Standards for Efficient Cryptography  SEC X.1: Supplemental Document for Odd Characteristic Extension Fields Nippon Telephone and Telegraph Corporation Contact: Kazumaro Aoki, Tetsutaro Kobayashi, and Akira Nagai

Standards for Efficient Cryptography SEC X.1: Supplemental Document for Odd Characteristic Extension Fields Nippon Telephone and Telegraph Corporation Contact: Kazumaro Aoki, Tetsutaro Kobayashi, and Akira Nagai

Add to Reading List

Source URL: info.isl.ntt.co.jp

Language: English - Date: 2015-03-02 00:44:50
44Twisted L-Functions and Monodromy  Nicholas M. Katz Contents Introduction

Twisted L-Functions and Monodromy Nicholas M. Katz Contents Introduction

Add to Reading List

Source URL: web.math.princeton.edu

Language: English - Date: 2001-11-05 12:32:04
45Annals of Mathematics, ), Factoring integers with elliptic curves By H. W.  LENSTRA, JR.

Annals of Mathematics, ), Factoring integers with elliptic curves By H. W. LENSTRA, JR.

Add to Reading List

Source URL: www.mat.uniroma2.it

Language: English - Date: 2008-11-09 06:36:38
46Elliptic Curve Abe-Okamoto-Suzuki Message Recovery Signature Scheme (ECAOS) Working DraftAugust 25,

Elliptic Curve Abe-Okamoto-Suzuki Message Recovery Signature Scheme (ECAOS) Working DraftAugust 25,

Add to Reading List

Source URL: info.isl.ntt.co.jp

Language: English - Date: 2015-03-02 00:44:50
47A Survey on Craptological Pairing Algorithms PauloS.//// LMBarreto Anonymized for submission

A Survey on Craptological Pairing Algorithms PauloS.//// LMBarreto Anonymized for submission

Add to Reading List

Source URL: www.anagram.com

Language: English - Date: 2010-11-11 14:43:35
48Twisted Hessian curves Daniel J. Bernstein1,2 , Chitchanok Chuengsatiansup1 , David Kohel3 , and Tanja Lange1 1  Department of Mathematics and Computer Science

Twisted Hessian curves Daniel J. Bernstein1,2 , Chitchanok Chuengsatiansup1 , David Kohel3 , and Tanja Lange1 1 Department of Mathematics and Computer Science

Add to Reading List

Source URL: iml.univ-mrs.fr

Language: English - Date: 2015-09-01 15:57:48
49Public-Key Cryptography for RFID-Tags? L. Batina1 , J. Guajardo2 , T. Kerins2 , N. Mentens1 , P. Tuyls2 , and I. Verbauwhede1 1 Katholieke Universiteit Leuven, ESAT/COSIC, Belgium {Lejla.Batina,Nele.Mentens,Ingrid.Verbau

Public-Key Cryptography for RFID-Tags? L. Batina1 , J. Guajardo2 , T. Kerins2 , N. Mentens1 , P. Tuyls2 , and I. Verbauwhede1 1 Katholieke Universiteit Leuven, ESAT/COSIC, Belgium {Lejla.Batina,Nele.Mentens,Ingrid.Verbau

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-08-29 03:45:16
50Microsoft PowerPoint - Killmann_sca_ecc.ppt

Microsoft PowerPoint - Killmann_sca_ecc.ppt

Add to Reading List

Source URL: www.yourcreativesolutions.nl

Language: English - Date: 2010-08-31 09:40:00