<--- Back to Details
First PageDocument Content
Elliptic curve / Lenstra elliptic curve factorization / Discrete logarithm / XTR / Elliptic Curve DSA / Prime number / Cyclic group / Hyperelliptic curve cryptography / Hessian form of an elliptic curve / Abstract algebra / Finite fields / Elliptic curve cryptography
Date: 2009-05-17 13:10:56
Elliptic curve
Lenstra elliptic curve factorization
Discrete logarithm
XTR
Elliptic Curve DSA
Prime number
Cyclic group
Hyperelliptic curve cryptography
Hessian form of an elliptic curve
Abstract algebra
Finite fields
Elliptic curve cryptography

Reverse Engineering of Strong CryptoSignatures Schemes

Add to Reading List

Source URL: www.reteam.org

Download Document from Source Website

File Size: 201,93 KB

Share Document on Facebook

Similar Documents

Public-key cryptography / Elliptic Curve DSA / Hash function / Key / Wallet / Cryptographic nonce / SHA-2 / Cryptography / Bitcoin / Peer-to-peer computing

Deterministic wallets End Deterministic wallets Gregory Maxwell et. al.

DocID: 1gGjd - View Document

Information / NSA Suite B Cryptography / Internet Key Exchange / IPsec / Elliptic curve cryptography / Elliptic curve Diffie–Hellman / Elliptic Curve DSA / Key-agreement protocol / Diffie–Hellman key exchange / Cryptographic protocols / Cryptography / Data

Internet Engineering Task Force (IETF) Request for Comments: 6380 Category: Informational ISSN: K. Burgin

DocID: 1avEc - View Document

Forking lemma / Random oracle / Preimage attack / Digital signature / Collision resistance / Elliptic Curve DSA / Standard model / MD5 / Birthday attack / Cryptography / Cryptographic hash functions / Schnorr signature

Hash Function Requirements for Schnorr Signatures Gregory Neven1,2 , Nigel P. Smart3 , and Bogdan Warinschi3 1 IBM Research – Zurich, Switzerland

DocID: 19LBC - View Document

Ubiquitous computing / Smart cards / Contactless smart card / RSA / Digital signature / Java Card / Elliptic Curve DSA / Magnetic stripe card / Power analysis / Cryptography / Public-key cryptography / ISO standards

May 20, 2011 Smart card implementation of a digital signature scheme for Twisted Edwards curves Author: Niels Duif∗

DocID: 19d9u - View Document

Cryptographic protocols / Elliptic curve Diffie–Hellman / Diffie–Hellman key exchange / SHA-1 / SHA-2 / Elliptic Curve DSA / Key derivation function / Key / CRYPTREC / Cryptography / Cryptographic hash functions / Key management

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Key Establishment Schemes —

DocID: 18KxF - View Document