Elliptic-curve cryptography

Results: 465



#Item
151Algebraic structures / Field theory / Group theory / Ring theory / Permutation group / Permutation / Group / Field / Elliptic curve cryptography / Abstract algebra / Algebra / Mathematics

Lecture 4: Finite Fields (PART 1) PART 1: Groups, Rings, and Fields Theoretical Underpinnings of Modern Cryptography Lecture Notes on “Computer and Network Security” by Avi Kak ()

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-02-18 01:10:16
152Cryptographic protocols / Elliptic curve Diffie–Hellman / Diffie–Hellman key exchange / SHA-1 / SHA-2 / Elliptic Curve DSA / Key derivation function / Key / CRYPTREC / Cryptography / Cryptographic hash functions / Key management

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Key Establishment Schemes —

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:17:39
153Finite fields / Number theory / Group theory / Diophantine geometry / Elliptic curve / Counting points on elliptic curves / Birch and Swinnerton-Dyer conjecture / Mordell–Weil theorem / Elliptic curve cryptography / Abstract algebra / Mathematics / Elliptic curves

Counting points on elliptic curves David Harvey University of New South Wales 6th December 2012, Australian National University

Add to Reading List

Source URL: web.maths.unsw.edu.au

Language: English - Date: 2012-12-04 18:47:26
154Daminozide / Elliptic curve cryptography / Key size / Computing / Telecommunications engineering / Technology / Sensors / Wireless sensor network

SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node 1 1 1,2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-20 09:02:17
155Diffie–Hellman key exchange / Key management / Elliptic curve Diffie–Hellman / Quantum key distribution / RSA / Key exchange / Key / SPEKE / Integrated Encryption Scheme / Cryptography / Cryptographic protocols / Public-key cryptography

CODING CONCEPTS TUTORIAL BEN EVERARD WHY DO THIS? • Understand advanced

Add to Reading List

Source URL: www.linuxvoice.com

Language: English - Date: 2015-01-08 10:21:45
156Cyberwarfare / Applied mathematics / Digital signature / RSA / ID-based encryption / Information security / Elliptic curve cryptography / Cryptography / Public-key cryptography / Security

1 BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems Attila A. Yavuz and Peng Ning Department of Computer Science

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:58
157Security / Applied mathematics / Signcryption / Digital signature / Cipher / Elliptic curve cryptography / ID-based encryption / Cryptography / Public-key cryptography / Cyberwarfare

1 Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks Attila Altay Yavuz and Peng Ning

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:12
158Theoretical computer science / Quantum cryptography / Quantum computer / Post-quantum cryptography / Digital signature / Quantum algorithm / Key size / Cryptographic primitive / Elliptic curve cryptography / Cryptography / Public-key cryptography / Key management

Evaluating Post-Quantum Asymmetric Cryptographic Algorithm Candidates

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 09:28:55
159NTRUSign / Lattice-based cryptography / NTRU / Homomorphic encryption / Digital signature / Lattice problem / RSA / Elliptic curve cryptography / Lattice / Cryptography / Post-quantum cryptography / Public-key cryptography

Practical Lattice-based Digital Signature Schemes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:42:22
160Key management / Elliptic curve Diffie–Hellman / Elliptic curve cryptography / NTRU / Kirkwood / Key / Cipher / Cryptography / Post-quantum cryptography / Public-key cryptography

Failure is not an Option: Standardization Issues for Post-Quantum Key Agreement

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 09:38:35
UPDATE