Elliptic curve cryptography

Results: 465



#Item
1Edwards Curves and the ECM Factorisation Method Peter Birkner Eindhoven University of Technology  The 12th Workshop on Elliptic Curve Cryptography

Edwards Curves and the ECM Factorisation Method Peter Birkner Eindhoven University of Technology The 12th Workshop on Elliptic Curve Cryptography

Add to Reading List

Source URL: www.pbirkner.fastmail.fm

Language: English - Date: 2008-09-22 17:16:30
    2Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 based Processors Patrick Longa, and Catherine Gebotys Department of Electrical and Computer Engineering, University of Waterloo, Canada, {pl

    Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 based Processors Patrick Longa, and Catherine Gebotys Department of Electrical and Computer Engineering, University of Waterloo, Canada, {pl

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2010-06-09 13:30:54
      3Elliptic Curves over Q Peter Birkner Technische Universiteit Eindhoven DIAMANT Summer School on Elliptic and Hyperelliptic Curve Cryptography

      Elliptic Curves over Q Peter Birkner Technische Universiteit Eindhoven DIAMANT Summer School on Elliptic and Hyperelliptic Curve Cryptography

      Add to Reading List

      Source URL: www.pbirkner.fastmail.fm

      Language: English - Date: 2008-09-19 03:32:03
        4Crafting Certified Elliptic Curve Cryptography Implementations in Coq Andres Erbsen Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree o

        Crafting Certified Elliptic Curve Cryptography Implementations in Coq Andres Erbsen Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree o

        Add to Reading List

        Source URL: adam.chlipala.net

        Language: English - Date: 2018-02-11 06:46:49
          5Elliptic curve cryptography on FPGAs: How fast can we go with a single chip? Kimmo Järvinen Department of Information and Computer Science Aalto University, Finland

          Elliptic curve cryptography on FPGAs: How fast can we go with a single chip? Kimmo Järvinen Department of Information and Computer Science Aalto University, Finland

          Add to Reading List

          Source URL: users.ics.aalto.fi

          Language: English - Date: 2011-07-19 11:03:52
            6A gentle introduction to elliptic curve cryptography Craig Costello Tutorial at SPACE 2016 December 15, 2016 CRRao AIMSCS, Hyderabad, India

            A gentle introduction to elliptic curve cryptography Craig Costello Tutorial at SPACE 2016 December 15, 2016 CRRao AIMSCS, Hyderabad, India

            Add to Reading List

            Source URL: www.craigcostello.com.au

            Language: English - Date: 2016-12-16 02:30:21
              7Attacking Elliptic-Curve Cryptography Ruben Niederhagen April 15, 2010  Why cryptography?

              Attacking Elliptic-Curve Cryptography Ruben Niederhagen April 15, 2010 Why cryptography?

              Add to Reading List

              Source URL: www.polycephaly.org

              Language: English - Date: 2010-04-19 10:03:17
                8This is Chapter 7 by Gerhard Frey and Tanja Lange of the Handbook of Elliptic and Hyperelliptic Curve Cryptography, Henri Cohen, Christophe Doche, and Gerhard Frey, Editors, CRC PressCRC Press has granted the foll

                This is Chapter 7 by Gerhard Frey and Tanja Lange of the Handbook of Elliptic and Hyperelliptic Curve Cryptography, Henri Cohen, Christophe Doche, and Gerhard Frey, Editors, CRC PressCRC Press has granted the foll

                Add to Reading List

                Source URL: hyperelliptic.org

                Language: English - Date: 2014-03-13 14:22:38
                  9by @bascule  ELLIPTIC CURVE CRYPTOGRAPHY Public-key cryptography based on elliptic curves is gradually replacing RSA thanks to faster implementations and smaller key sizes.

                  by @bascule ELLIPTIC CURVE CRYPTOGRAPHY Public-key cryptography based on elliptic curves is gradually replacing RSA thanks to faster implementations and smaller key sizes.

                  Add to Reading List

                  Source URL: fails.org

                  Language: English - Date: 2015-10-01 12:32:52
                    10Standards for Efficient Cryptography  SEC 1: Elliptic Curve Cryptography Certicom Research Contact: Daniel R. L. Brown () May 21, 2009

                    Standards for Efficient Cryptography SEC 1: Elliptic Curve Cryptography Certicom Research Contact: Daniel R. L. Brown () May 21, 2009

                    Add to Reading List

                    Source URL: www.secg.org

                    Language: English - Date: 2015-01-29 09:45:12