Elliptic-curve cryptography

Results: 465



#Item
191Numeral systems / Elliptic Curve DSA / Exponentiation / Logarithm / Radix / Precomputation / Elliptic curve cryptography / Exponentiation by squaring / Mathematics / Abstract algebra / Exponentials

Cryptology ePrint Archive, Report, http://eprint.iacr.org/ Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification Bodo M¨oller and Andy Rupp

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2008-05-19 15:51:37
192Electronic commerce / Cyberwarfare / Mathematics / Applied mathematics / Implicit certificate / Finite fields / Elliptic Curve DSA / Elliptic curve cryptography / Digital signature / Public-key cryptography / Cryptography / Key management

Security of ECQV-Certified ECDSA Against Passive Adversaries

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-03-09 14:11:31
193Cryptography / Mathematics / Elliptic curve cryptography / Linear algebra / Module theory / Pairing / Elliptic curve / Tate pairing / Curve / Abstract algebra / Elliptic curves / Algebra

Faster Pairing Computations on Curves with High-Degree Twists Craig Costello1 , Tanja Lange2 , and Michael Naehrig2 1 Information Security Institute

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-06-14 04:16:49
194Mathematics / Cryptography / Group theory / Finite fields / Weil pairing / Elliptic curve / Pairing / Supersingular elliptic curve / Tate pairing / Abstract algebra / Elliptic curves / Algebra

Comparing Implementation Efficiency of Ordinary and Squared Pairings Christine Abegail Antonio1 , Satoru 2 and Ken Nakamula3 Department of Mathematics, Tokyo Metropolitan University Minami-Osawa, Hachioji-shi Tokyo, Japa

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-07 19:51:10
195Group theory / W postcode area / Coil / W12 / Geography of England / Elliptic curve cryptography / Elliptic curves / London / Analytic number theory / Elliptic curve

Twisted Jacobi Intersections Curves Rongquan Feng1 , Menglong Nie1 , Hongfeng Wu2 1 LMAM, School of Mathematical Sciences, Peking University, Beijing, P.R. China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-04 06:04:06
196Elliptic curves / Finite fields / Number theory / Cryptography / Group theory / Weil pairing / Supersingular elliptic curve / Algebraic number field / Curve / Abstract algebra / Mathematics / Algebra

Constructing Brezing-Weng pairing friendly elliptic curves using elements in the cyclotomic field Ezekiel Justin Kachisa?1 , Edward F. Schaefer ??2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-14 05:53:33
197Key distribution / Wireless sensor network / ID-based encryption / Public-key cryptography / Key-agreement protocol / Pairing-based cryptography / Sensor node / Key / Elliptic curve cryptography / Cryptography / Key management / Cryptographic protocols

TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks Leonardo B. Oliveira UNICAMP, Brazil

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-01-07 17:26:25
198Lattice / Digital signature / Cryptography / Public-key cryptography / Elliptic Curve DSA

Proceedings of PKC ’05 (January 23–26, 2005, Les Diablerets, Switzerland) S. Vaudenay (Ed.), vol. ???? of Lecture Notes in Computer Science, pages ??–?? c IACR (http://www.iacr.org) and Springer-Verlag (http://www

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-11-19 06:18:26
199Fabless semiconductor companies / Reconfigurable computing / Xilinx / Field-programmable gate array / Elliptic curve cryptography / Power analysis / Multiplication algorithm / Multiplication / Side channel attack / Electronic engineering / Mathematics / Electronics

How Different Electrical Circuits of ECC Designs Influence the Shape of Power Traces measured on FPGA Thomas Basmer, Christian Wittke, Zoya Dyka, and Peter Langendoerfer System dept., IHP, Im Technologiepark 25,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-19 03:59:09
200Group theory / Finite fields / Computational hardness assumptions / Logarithms / Discrete logarithm / Diffie–Hellman problem / Baby-step giant-step / Elliptic curve / Diffie–Hellman key exchange / Abstract algebra / Cryptography / Mathematics

Chapter 10 Number-Theoretic Primitives Number theory is a source of several computational problems that serve as primitives in the design of cryptographic schemes. Asymmetric cryptography in particular relies on these pr

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:35:30
UPDATE