Elliptic curve

Results: 1220



#Item
421Metric geometry / Topology / Circle / Elliptic curve / Geometry / Curves / General topology

Freie Universität Berlin Fachbereich Mathematik und Informatik Gauss Codes and Thrackles On Characterizations of Closed Curves in the Plane with an Application to the Thrackle Conjecture

Add to Reading List

Source URL: www.felixbreuer.net

Language: English - Date: 2012-10-07 20:32:42
422XTR / Function / Cryptographic protocols / Mathematics / Elliptic curve Diffie–Hellman / Public-key cryptography

A quantum-safe circuit-extension handshake for Tor

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:35:22
423Computing / Telecommunications engineering / Key distribution / Key management / Wireless mesh network / Public-key cryptography / ANT / Sensor node / Elliptic curve Diffie–Hellman / Wireless sensor network / Wireless networking / Technology

Securing Network Access in Wireless Sensor Networks* Kun Sun§ § An Liu†

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:22
424Digital signature / Digital Signature Algorithm / SHA-2 / SHA-1 / RSA / FIPS 140-2 / Public key certificate / Cryptography / Public-key cryptography / Elliptic Curve DSA

PDF Document

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:18:14
425Key management / Post-quantum cryptography / Key size / NTRU / Elliptic curve cryptography / Homomorphic encryption / RSA / McEliece cryptosystem / Key / Cryptography / Public-key cryptography / Electronic commerce

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 12:49:59
426Quantum cryptography / Quantum information science / Key management / Quantum computer / Quantum key distribution / Quantum algorithm / Public-key cryptography / Elliptic curve cryptography / Quantum information / Cryptography / Applied mathematics / Theoretical computer science

PDF Document

Add to Reading List

Source URL: docbox.etsi.org

Language: English - Date: 2014-10-04 16:35:34
427IEEE P1363 / SPEKE / Secure Remote Password protocol / Encrypted key exchange / Password / PKCS / Key-agreement protocol / Key exchange / Elliptic curve cryptography / Cryptography / Cryptographic protocols / Password-authenticated key agreement

PDF Document

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2008-04-27 09:53:57
428Dual EC DRBG / National Institute of Standards and Technology / National Security Agency / Factorial / Blum Blum Shub / RBG / One-way function / Mathematics / Pseudorandom number generators / Cryptography

. The Dual Elliptic Curve Deterministic RBG . Background, Specification, Security and Notes

Add to Reading List

Source URL: www.untruth.org

Language: English - Date: 2013-06-22 03:51:50
429Quantum cryptography / Quantum information science / Key management / Quantum computer / Quantum key distribution / Quantum algorithm / Public-key cryptography / Elliptic curve cryptography / Quantum information / Cryptography / Applied mathematics / Theoretical computer science

Quantum Safe Whitepaper 1 0 0

Add to Reading List

Source URL: portal.etsi.org

Language: English - Date: 2015-02-09 10:34:26
430Diffie–Hellman problem / Key-agreement protocol / Public-key cryptography / Key exchange / Elliptic curve cryptography / ID-based encryption / Internet Key Exchange / Boneh/Franklin scheme / Elliptic curve Diffie–Hellman / Cryptographic protocols / Cryptography / Diffie–Hellman key exchange

Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols Jue-Sam Chou1 , Yalin Chen 2 , Ming-De Yang 3 1 Department of Information Management, Nanhua University Chiayi 622 Taiwan, R.O.C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-09 06:49:50
UPDATE