Elliptic curve

Results: 1220



#Item
481Computer arithmetic / Finite fields / Group theory / Binary arithmetic / Cryptography / Elliptic curve cryptography / Arbitrary-precision arithmetic / Modular arithmetic / XTR / Abstract algebra / Mathematics / Arithmetic

Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices Johann Großsch¨adl1 , Dan Page2 , and Stefan Tillich2 1 University of Luxembourg, CSC Research Unit, LACS,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-08-28 16:24:04
482Finite fields / Group theory / Cryptography / Twisted Edwards curve / Elliptic curve / Edwards curve / Elliptic Curve DSA / Complex multiplication / Matrix / Abstract algebra / Elliptic curves / Elliptic curve cryptography

VLSI Implementation of Double-Base Scalar Multiplication on a Twisted Edwards Curve with an Efficiently Computable Endomorphism Zhe Liu1 , Husen Wang2 , Johann Großsch¨adl1 , Zhi Hu3 , and Ingrid Verbauwhede1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-04 12:51:01
483Mechanical computers / Elliptic curves / Elliptic curve cryptography / Finite fields / Z2 / Z3 / Z1 / Elliptic curve point multiplication / Lookup table / Abstract algebra / History of computing hardware / Computing

On the Implementation of Unified Arithmetic on Binary Huff Curves Santosh Ghosh1⋆ , Amit Kumar2⋆⋆ , Amitabh Das3 , and Ingrid Verbauwhede3 1 Security and Privacy Research, Intel Labs

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-12 13:10:28
484Hashing / Artificial intelligence / Information retrieval / Hash function / Hash table / MD5 / Collision / Provably secure cryptographic hash function / Elliptic curve only hash / Cryptographic hash functions / Cryptography / Search algorithms

Time-memory Trade-offs for Near-collisions Gaëtan Leurent UCL Crypto Group Abstract. In this work we consider generic algorithms to find near-collisions for a hash

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-31 14:07:22
485Mathematics / Cryptography / Advantage / Elliptic curve cryptography

Microsoft Word - Efficient and provably-secure certificateless signature scheme without bilinear pairings.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-02-27 09:37:29
486Elliptic curve cryptography / Elliptic curves

Infinity in Mathematics & Computer Science ∞ Lecture at QUANTANovemberCMS, Lucknow, India

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2007-11-19 11:02:50
487Claw-free permutation / MD5 / One-way function / Universal one-way hash function / SHA-1 / Provably secure cryptographic hash function / Elliptic curve only hash / Cryptographic hash functions / Cryptography / Hash function

An abridged version of this paper appears in Advances in Cryptology { Eurocrypt 97 Proceedings, Lecture Notes in Computer Science Vol. 1233, W. Fumy ed., Springer-Verlag, 1997. A New Paradigm for Collision-free Hashing:

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 1998-07-30 12:00:14
488Exponentials / Modular arithmetic / Binary operations / Computer arithmetic / Public-key cryptography / Modular exponentiation / Addition-chain exponentiation / Exponentiation / Elliptic curve cryptography / Mathematics / Cryptography / Abstract algebra

Two Exponentiation Algorithms Resistant to Cross-correlation Power Analysis and to Other Known Attacks Yaacov Belenky, Zeev Geyzel, Michael Kara-Ivanov, and Avraham Entelis NDS Technologies Israel Ltd., Shlomo haLevi Str

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-26 09:40:24
489Mathematical notation / Multiplication / Elliptic curve cryptography / Elliptic curves / Planar lamina / Doubling-oriented Doche–Icart–Kohel curve / Mathematics / Abstract algebra / Elementary arithmetic

PDF Document

Add to Reading List

Source URL: emedia.rmit.edu.au

Language: English - Date: 2012-11-21 21:52:54
490Finite fields / Group theory / Elliptic curves / Cryptography / Polynomials / Elliptic curve / Lenstra elliptic curve factorization / Division polynomials / Prime number / Abstract algebra / Mathematics / Algebra

Elliptic Curves in Algorithmic Number Theory and Cryptography Otto Forster §1 Applications in Algorithmic Number Theory In this section we describe briefly the use of elliptic curves over finite fields for

Add to Reading List

Source URL: www.mathematik.uni-muenchen.de

Language: English - Date: 2003-12-07 11:29:32
UPDATE