Elliptic curve cryptography

Results: 465



#Item
51Network Working Group Request for Comments: 4492 Category: Informational S. Blake-Wilson SafeNet

Network Working Group Request for Comments: 4492 Category: Informational S. Blake-Wilson SafeNet

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2016-02-04 15:25:45
52Francisco Rodr´ıguez-Henr´ıquez Associate Professor CINVESTAV 3-C CINVESTAV-IPN Av. Instituto Polit´ecnico Nacional No. 2508, 07360, M´exico City, M´exico Tel: (3800 Ext. 6570

Francisco Rodr´ıguez-Henr´ıquez Associate Professor CINVESTAV 3-C CINVESTAV-IPN Av. Instituto Polit´ecnico Nacional No. 2508, 07360, M´exico City, M´exico Tel: (3800 Ext. 6570

Add to Reading List

Source URL: delta.cs.cinvestav.mx

Language: English - Date: 2015-03-12 01:14:57
53Proceedings  - NN - Password Authenticated Key Agreement for Contactless Smart Cards

Proceedings - NN - Password Authenticated Key Agreement for Contactless Smart Cards

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:45:53
54Two is the fastest prime Thomaz Oliveira 1 Julio L´ opez 2 Diego F. Aranha Francisco Rodr´ıguez-Henr´ıquez 1 1 2

Two is the fastest prime Thomaz Oliveira 1 Julio L´ opez 2 Diego F. Aranha Francisco Rodr´ıguez-Henr´ıquez 1 1 2

Add to Reading List

Source URL: delta.cs.cinvestav.mx

Language: English - Date: 2014-08-19 19:37:37
55Abelian varieties, Theta functions and cryptography MSR presentation Damien Robert1 1

Abelian varieties, Theta functions and cryptography MSR presentation Damien Robert1 1

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2013-11-15 16:58:00
56Are standards compliant Elliptic Curve Cryptosystems feasible on RFID? Sandeep S. Kumar and Christof Paar Horst G¨ ortz Institute for IT Security, Ruhr-Universit¨

Are standards compliant Elliptic Curve Cryptosystems feasible on RFID? Sandeep S. Kumar and Christof Paar Horst G¨ ortz Institute for IT Security, Ruhr-Universit¨

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-07-04 00:26:04
5727  Master Computer Science — Universität Bonn Module

27 Master Computer Science — Universität Bonn Module

Add to Reading List

Source URL: cosec.bit.uni-bonn.de

Language: English - Date: 2014-02-03 05:34:57
58K AT H E R I N E E . S TA N G E personal information email

K AT H E R I N E E . S TA N G E personal information email

Add to Reading List

Source URL: math.colorado.edu

Language: English - Date: 2016-08-09 16:21:07
59Indifferentiable Deterministic Hashing to Elliptic and Hyperelliptic Curves Reza R. Farashahi1 , Pierre-Alain Fouque2 , Igor E. Shparlinski1 , Mehdi Tibouchi2 , and J. Felipe Voloch3 1

Indifferentiable Deterministic Hashing to Elliptic and Hyperelliptic Curves Reza R. Farashahi1 , Pierre-Alain Fouque2 , Igor E. Shparlinski1 , Mehdi Tibouchi2 , and J. Felipe Voloch3 1

Add to Reading List

Source URL: www.ma.utexas.edu

Language: English - Date: 2010-07-19 10:41:17
60State Management for Hash Based Signatures David McGrew1 , Panos Kampanakis1 , Scott Fluhrer1 , Stefan-Lukas Gazdag2 , Denis Butin3 , and Johannes Buchmann3 1  Cisco Systems, USA

State Management for Hash Based Signatures David McGrew1 , Panos Kampanakis1 , Scott Fluhrer1 , Stefan-Lukas Gazdag2 , Denis Butin3 , and Johannes Buchmann3 1 Cisco Systems, USA

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-04-06 13:04:46