Elliptic Curve Digital Signature Algorithm

Results: 39



#Item
1The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces Phong Q. Nguyen∗ ´ D´epartement d’Informatique, Ecole

The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces Phong Q. Nguyen∗ ´ D´epartement d’Informatique, Ecole

Add to Reading List

Source URL: pdfs.semanticscholar.org

- Date: 2015-12-07 13:47:51
    2ECC Summer School – Exercices Damien RobertCryptography  Implement public key encryption and signature with elliptic curves:

    ECC Summer School – Exercices Damien RobertCryptography Implement public key encryption and signature with elliptic curves:

    Add to Reading List

    Source URL: www.normalesup.org

    Language: English - Date: 2015-09-25 11:36:46
    3ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels ∗ Daniel Genkin Lev Pachmanov

    ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels ∗ Daniel Genkin Lev Pachmanov

    Add to Reading List

    Source URL: www.cs.tau.ac.il

    Language: English - Date: 2016-08-19 14:59:40
    4Two is the fastest prime Thomaz Oliveira 1 Julio L´ opez 2 Diego F. Aranha Francisco Rodr´ıguez-Henr´ıquez 1 1 2

    Two is the fastest prime Thomaz Oliveira 1 Julio L´ opez 2 Diego F. Aranha Francisco Rodr´ıguez-Henr´ıquez 1 1 2

    Add to Reading List

    Source URL: delta.cs.cinvestav.mx

    Language: English - Date: 2014-08-19 19:37:37
    5State Management for Hash Based Signatures David McGrew1 , Panos Kampanakis1 , Scott Fluhrer1 , Stefan-Lukas Gazdag2 , Denis Butin3 , and Johannes Buchmann3 1  Cisco Systems, USA

    State Management for Hash Based Signatures David McGrew1 , Panos Kampanakis1 , Scott Fluhrer1 , Stefan-Lukas Gazdag2 , Denis Butin3 , and Johannes Buchmann3 1 Cisco Systems, USA

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2016-04-06 13:04:46
    6Institut für Integrierte Systeme Integrated Systems Laboratory ECC is Ready for RFID – A Proof in Silicon  RFIDsec 08 Presentation

    Institut für Integrierte Systeme Integrated Systems Laboratory ECC is Ready for RFID – A Proof in Silicon RFIDsec 08 Presentation

    Add to Reading List

    Source URL: events.iaik.tugraz.at

    Language: English - Date: 2008-07-17 01:42:00
    7How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

    How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

    Add to Reading List

    Source URL: www.nds.rub.de

    Language: English - Date: 2016-05-24 15:16:00
    8Moderator-controlled Information Sharing by Identity-based Aggregate Signatures for Information Centric Networking Tohru Asami  The University of Tokyo

    Moderator-controlled Information Sharing by Identity-based Aggregate Signatures for Information Centric Networking Tohru Asami The University of Tokyo

    Add to Reading List

    Source URL: conferences2.sigcomm.org

    Language: English - Date: 2015-10-01 13:18:49
    9Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research  ECC 2008, Utrecht, Sep

    Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep

    Add to Reading List

    Source URL: www.hyperelliptic.org

    Language: English - Date: 2008-09-27 14:59:29
    10Hierarchical deterministic Bitcoin wallets that tolerate key leakage (Short paper) Gus Gutoski1 and Douglas Stebila2 1

    Hierarchical deterministic Bitcoin wallets that tolerate key leakage (Short paper) Gus Gutoski1 and Douglas Stebila2 1

    Add to Reading List

    Source URL: fc15.ifca.ai

    Language: English - Date: 2015-01-11 00:32:41