Elliptic curve

Results: 1220



#Item
301

Elliptic Curve Cryptography in JavaScript Laurie Haustenne, Quentin De Neyer, and Olivier Pereira? Universit´e catholique de Louvain ICTEAM – Crypto Group B-1348 Louvain-la-Neuve – Belgium

Add to Reading List

Source URL: www.uclouvain.be

Language: English - Date: 2011-12-14 05:30:45
    302

    Efficient Elliptic Curve Processor Architectures for Field Programmable Logic by Gerardo Orlando A Dissertation Submitted to the Faculty

    Add to Reading List

    Source URL: www.emsec.rub.de

    Language: English - Date: 2010-04-20 21:53:09
      303Cryptography / Transport Layer Security / Secure communication / Finite fields / Cryptographic protocols / Public-key cryptography / Logjam / DiffieHellman key exchange / Index calculus algorithm / XTR / Elliptic curve DiffieHellman / Key size

      Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

      Add to Reading List

      Source URL: aaspring.com

      Language: English - Date: 2015-08-21 16:58:21
      304Elliptic curve cryptography / Pairing-based cryptography / Public-key cryptography / Group theory / Finite fields / Tate pairing / Hyperelliptic curve / Weil pairing / BonehLynnShacham / BonehFranklin scheme / Pairing / ID-based encryption

      Bilinear Pairings in Cryptography Master thesis #603 by

      Add to Reading List

      Source URL: www.math.ru.nl

      Language: English - Date: 2009-07-13 10:25:27
      305

      MATH CIRCLE - ELLIPTIC CURVES WEEKS 1 & 2 SAM LICHTENSTEIN 1. What is a curve? We started by considering the idea of a curve. This is just the set of points in the plane which satisfy a polynomial equation. For example,

      Add to Reading List

      Source URL: themathcircle.org

      Language: English - Date: 2007-10-20 22:29:22
        306Smart grid / Electric power distribution / Emerging technologies / Elliptic curve cryptography / Itron / Public services / Smart meter / Automatic meter reading / ANSI C12.22 / BlackBerry Limited / Meter data management / Key

        Itron Secures Metering Systems with Certicom AMI Solution A CERTICOM CUSTOMER USE CASE AUGUST 2010

        Add to Reading List

        Source URL: www.certicom.com

        Language: English - Date: 2010-10-20 19:20:59
        307Micronas / Elliptic curve cryptography / Cryptography / Hardware security module / High-bandwidth Digital Content Protection / BlackBerry Limited / Key management / Key

        Micronas Secures Production with Certicom KeyInject ® Micronas needed a secure system for transporting and embedding keys into silicon chips for use in consumer electronics. Certicom

        Add to Reading List

        Source URL: www.certicom.com

        Language: English - Date: 2008-11-09 16:17:51
        308Pairing-based cryptography / Elliptic curve cryptography / Elliptic curves / Linear algebra / Module theory / Pairing / Tate pairing / Divisor / Elliptic curve / Weil pairing

        ECCEfficient and Generalized Pairing Computation on Abelian Varieties Hyang-Sook Lee Ewha Womans University

        Add to Reading List

        Source URL: www.hyperelliptic.org

        Language: English - Date: 2008-10-03 22:36:38
        309

        Efficient Algorithms for Finite Fields, with Applications in Elliptic Curve Cryptography by Sel¸cuk Baktır A Thesis Submitted to the Faculty

        Add to Reading List

        Source URL: www.wpi.edu

        Language: English - Date: 2003-05-01 13:28:01
          310Cryptography / Security / Elliptic curve cryptography / Public-key cryptography / Building automation / Home automation / BlackBerry Limited / ZigBee / Ami / Smart grid / Computer security / ECC patents

          Certicom AMI 7000 Series Security Appliances for Advanced Metering Infrastructure The Need for Security

          Add to Reading List

          Source URL: www.certicom.com

          Language: English - Date: 2010-08-10 15:49:45
          UPDATE