Elliptic curve

Results: 1220



#Item
461Fabless semiconductor companies / Reconfigurable computing / Xilinx / Field-programmable gate array / Elliptic curve cryptography / Power analysis / Multiplication algorithm / Multiplication / Side channel attack / Electronic engineering / Mathematics / Electronics

How Different Electrical Circuits of ECC Designs Influence the Shape of Power Traces measured on FPGA Thomas Basmer, Christian Wittke, Zoya Dyka, and Peter Langendoerfer System dept., IHP, Im Technologiepark 25,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-19 03:59:09
462Group theory / Constructible universe / Elliptic curve

On small secret key attack against RSA with high bits known prime factor Yasufumi Hashimoto ∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-26 20:36:27
463Analytic number theory / Elliptic curve / Group theory / Frobenius endomorphism / Pullback / Spectral theory of ordinary differential equations / Abstract algebra / Algebra / Mathematics

Speeding up the Bilinear Pairings Computation on Curves with Automorphisms.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-04-13 02:45:23
464Group theory / Finite fields / Computational hardness assumptions / Logarithms / Discrete logarithm / Diffie–Hellman problem / Baby-step giant-step / Elliptic curve / Diffie–Hellman key exchange / Abstract algebra / Cryptography / Mathematics

Chapter 10 Number-Theoretic Primitives Number theory is a source of several computational problems that serve as primitives in the design of cryptographic schemes. Asymmetric cryptography in particular relies on these pr

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:35:30
465Public-key cryptography / Adaptive chosen-ciphertext attack / Elliptic curve cryptography / Diffie–Hellman problem / Advantage / Chosen-ciphertext attack / Cipher / Key encapsulation / Elliptic curve Diffie–Hellman / Cryptography / Finite fields / Ciphertext indistinguishability

Appears in P. Samarati, P. Ryan, D. Gollmann, R. Molva (Eds.): Computer Security – ESORICS 2004, Springer-Verlag LNCS 3193, pp. 335–351, ISBNA Public-Key Encryption Scheme with Pseudo-Random Ciphertex

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:25:23
466Algebraic curves / Cryptography / Hyperelliptic curve / Elliptic curve / Covering space / Abelian variety / Ample line bundle / Abstract algebra / Algebraic geometry / Topology

Classification of Elliptic/hyperelliptic Curves with Weak Coverings against GHS Attack without Isogeny Condition Tsutomu Iijima ∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-11-21 23:49:35
467Analytic number theory / Algebra / Elliptic curve / Group theory / Hyperelliptic curve / Curry–Howard correspondence / Ordinal number / Hyperelliptic curve cryptography / Imaginary hyperelliptic curve / Abstract algebra / Algebraic curves / Mathematics

ISOMORPHISM CLASSES OF HYPERELLIPTIC CURVES OF GENUS 3 OVER FINITE FIELDS EUNKYUNG JEONG DEPARTMENT OF MATHEMATICS POHANG UNIVERSITY OF SCIENCE AND TECHNOLOGY POHANG, 790–784, KOREA

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-30 23:34:48
468Elliptic curves / Finite fields / Elliptic curve cryptography / Elliptic curve / Multiplication / XTR / Matrix / Scalar / Hessian form of an elliptic curve / Abstract algebra / Mathematics / Algebra

Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves Extended Version? Franck Rondepierre Oberthur Technologies, Crypto Group 420, rue Estienne d’Orves, Colombes, France

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-30 11:35:26
469Elliptic curves / Twisted Edwards curve / Elliptic curve / Montgomery curve / Edwards curve / Hyperelliptic curve cryptography / Curve / Elliptic Curve DSA / Table of costs of operations in elliptic curves / Cryptography / Elliptic curve cryptography / Abstract algebra

Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes Dalin Chu Johann Großschädl

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-03-25 20:03:52
470Finite fields / Multiplication / Elliptic curve point multiplication / Group theory / Elliptic curve cryptography / Elliptic curve / Hessian form of an elliptic curve / Abstract algebra / Mathematics / Elliptic curves

Main text appears in A. H. Chan, V. Gligor (Eds.): Information Security – ISC 2002, Springer-Verlag LNCS 2433, pp. 402–413, ISBNNotes addedParallelizable Elliptic Curve Point Multiplicati

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:24:21
UPDATE