Elliptic Curve Digital Signature Algorithm

Results: 39



#Item
1

The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces Phong Q. Nguyen∗ ´ D´epartement d’Informatique, Ecole

Add to Reading List

Source URL: pdfs.semanticscholar.org

- Date: 2015-12-07 13:47:51
    2Cryptography / Abstract algebra / Algebra / Group theory / Finite fields / Elliptic curve cryptography / Public-key cryptography / Elliptic curves / Weil pairing / Elliptic curve / Elliptic Curve Digital Signature Algorithm / Discrete logarithm

    ECC Summer School – Exercices Damien RobertCryptography Implement public key encryption and signature with elliptic curves:

    Add to Reading List

    Source URL: www.normalesup.org

    Language: English - Date: 2015-09-25 11:36:46
    3Cryptography / Elliptic curve cryptography / Public-key cryptography / Elliptic Curve Digital Signature Algorithm / Electromagnetic attack / Digital Signature Algorithm / Digital signature / RSA / OpenSSL / Scalar / Matrix / Random number generator attack

    ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels ∗ Daniel Genkin Lev Pachmanov

    Add to Reading List

    Source URL: www.cs.tau.ac.il

    Language: English - Date: 2016-08-19 14:59:40
    4Elliptic curve cryptography / Elliptic Curve Digital Signature Algorithm / Elliptic curve / Multiplier / Multiplication algorithm / CLMUL instruction set / MQV

    Two is the fastest prime Thomaz Oliveira 1 Julio L´ opez 2 Diego F. Aranha Francisco Rodr´ıguez-Henr´ıquez 1 1 2

    Add to Reading List

    Source URL: delta.cs.cinvestav.mx

    Language: English - Date: 2014-08-19 19:37:37
    5Cryptography / Public-key cryptography / Key management / Digital signature / Post-quantum cryptography / Key / Elliptic Curve Digital Signature Algorithm / RSA / Cryptographic hash function / Merkle signature scheme / Lamport signature

    State Management for Hash Based Signatures David McGrew1 , Panos Kampanakis1 , Scott Fluhrer1 , Stefan-Lukas Gazdag2 , Denis Butin3 , and Johannes Buchmann3 1 Cisco Systems, USA

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2016-04-06 13:04:46
    6Elliptic curve cryptography / Automatic identification and data capture / Public-key cryptography / Ubiquitous computing / Radio-frequency identification / Elliptic curve / Cryptography / Elliptic Curve Digital Signature Algorithm

    Institut für Integrierte Systeme Integrated Systems Laboratory ECC is Ready for RFID – A Proof in Silicon RFIDsec 08 Presentation

    Add to Reading List

    Source URL: events.iaik.tugraz.at

    Language: English - Date: 2008-07-17 01:42:00
    7Public-key cryptography / Cryptographic protocols / Secure communication / Cryptographic software / Double Ratchet Algorithm / DiffieHellman key exchange / WhatsApp / Digital signature / XTR / Elliptic curve DiffieHellman / Signal

    How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

    Add to Reading List

    Source URL: www.nds.rub.de

    Language: English - Date: 2016-05-24 15:16:00
    8Cryptography / Public-key cryptography / Elliptic curve cryptography / Computer networking / Named data networking / Key management / Digital signature / RSA / Elliptic Curve Digital Signature Algorithm / Secure Shell / Type-length-value / Digital Signature Algorithm

    Moderator-controlled Information Sharing by Identity-based Aggregate Signatures for Information Centric Networking Tohru Asami The University of Tokyo

    Add to Reading List

    Source URL: conferences2.sigcomm.org

    Language: English - Date: 2015-10-01 13:18:49
    9Cryptography / Cryptographic hash functions / Error detection and correction / SHA-1 / SHA-2 / MD5 / NIST hash function competition / SHA-3 / Elliptic curve only hash / Elliptic Curve Digital Signature Algorithm / Libgcrypt / FORK-256

    Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep

    Add to Reading List

    Source URL: www.hyperelliptic.org

    Language: English - Date: 2008-09-27 14:59:29
    10Cryptography / Key management / E-commerce / Public-key cryptography / Cryptocurrencies / Bitcoin / Elliptic Curve Digital Signature Algorithm / RSA / Electronic money / Key / Digital signature / Cryptographic hash function

    Hierarchical deterministic Bitcoin wallets that tolerate key leakage (Short paper) Gus Gutoski1 and Douglas Stebila2 1

    Add to Reading List

    Source URL: fc15.ifca.ai

    Language: English - Date: 2015-01-11 00:32:41
    UPDATE