Elliptic curve

Results: 1220



#Item
341Abstract algebra / Algebraic geometry / Algebra / Elliptic curves / Diophantine geometry / Abelian varieties / Semistable abelian variety / Algebraic curves / Lenstra elliptic curve factorization / Hyperelliptic curve cryptography

R. van Bommel Almost all hyperelliptic Jacobians have a bad semi-abelian prime Master’s thesis, 23 June 2014 Supervisor: dr. D. Holmes

Add to Reading List

Source URL: algant.eu

Language: English - Date: 2014-07-04 06:58:52
342

On the Greatest Prime Divisor of Np Amir Akbary∗ Abstract Let E be an elliptic curve defined over Q. For any prime p of good reduction, let Ep be the reduction of E mod p. Denote by Np the cardinality of Ep (Fp ), wher

Add to Reading List

Source URL: www.cs.uleth.ca

Language: English - Date: 2012-08-16 19:45:28
    343

    Mobile Netw Appl:259–270 DOIs11036A State-of-the-art Elliptic Curve Cryptographic Processor Operating in the Frequency Domain Selçuk Baktır · Sandeep Kumar ·

    Add to Reading List

    Source URL: akademik.bahcesehir.edu.tr

    Language: English - Date: 2012-08-27 08:33:32
      344

      Public-Key Cryptography Before 1985 Two public-key families emerged that were commercially viable: The Elliptic Curve Discrete Logarithm Problem: State of the Art

      Add to Reading List

      Source URL: www.iwsec.org

      Language: English - Date: 2008-12-18 21:11:06
        345

        An End-to-End Systems Approach to Elliptic Curve Cryptography Nils Gura, Sheueling Chang Shantz, Hans Eberle, Sumit Gupta, Vipul Gupta, Daniel Finchelstein, Edouard Goupy,

        Add to Reading List

        Source URL: www.chesworkshop.org

        Language: English - Date: 2008-01-10 16:29:43
          346

          A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2n) Michael Jung1, M. Ernst1, F. Madlener1, S. Huss1, R. Blümel2 1

          Add to Reading List

          Source URL: www.chesworkshop.org

          Language: English - Date: 2008-01-10 16:40:06
            347

            Elliptic Curve Cryptography in Practice Joppe W. Bos1 , J. Alex Halderman2 , Nadia Heninger3 , Jonathan Moore, Michael Naehrig1 , and Eric Wustrow2 1 Microsoft Research

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2013-12-02 05:21:30
              348Public-key cryptography / Elliptic Curve DSA / Hash function / Key / Wallet / Cryptographic nonce / SHA-2 / Cryptography / Bitcoin / Peer-to-peer computing

              Deterministic wallets End Deterministic wallets Gregory Maxwell et. al.

              Add to Reading List

              Source URL: www.cs.technion.ac.il

              Language: English - Date: 2014-05-26 22:22:44
              349Elliptic curves / Elliptic curve cryptography / Elliptic curve / ECC patents / Abstract algebra / Cryptography / Finite fields

              Microsoft Word - AcceptedPapers_ECC2015.docx

              Add to Reading List

              Source URL: nist.gov

              Language: English - Date: 2015-05-18 12:17:18
              350Elliptic curve cryptography / École Polytechnique Fédérale de Lausanne / Academia / Technology / Science / Workshop on Cryptographic Hardware and Embedded Systems / Worcester Polytechnic Institute / Cryptography

              umentstyle[12pt]{article}

              Add to Reading List

              Source URL: www.emsec.rub.de

              Language: English - Date: 2014-10-01 03:53:53
              UPDATE