Elliptic-curve cryptography

Results: 465



#Item
221Elliptic curve cryptography / Elliptic curves

Infinity in Mathematics & Computer Science ∞ Lecture at QUANTANovemberCMS, Lucknow, India

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2007-11-19 11:02:50
222Claw-free permutation / MD5 / One-way function / Universal one-way hash function / SHA-1 / Provably secure cryptographic hash function / Elliptic curve only hash / Cryptographic hash functions / Cryptography / Hash function

An abridged version of this paper appears in Advances in Cryptology { Eurocrypt 97 Proceedings, Lecture Notes in Computer Science Vol. 1233, W. Fumy ed., Springer-Verlag, 1997. A New Paradigm for Collision-free Hashing:

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 1998-07-30 12:00:14
223Exponentials / Modular arithmetic / Binary operations / Computer arithmetic / Public-key cryptography / Modular exponentiation / Addition-chain exponentiation / Exponentiation / Elliptic curve cryptography / Mathematics / Cryptography / Abstract algebra

Two Exponentiation Algorithms Resistant to Cross-correlation Power Analysis and to Other Known Attacks Yaacov Belenky, Zeev Geyzel, Michael Kara-Ivanov, and Avraham Entelis NDS Technologies Israel Ltd., Shlomo haLevi Str

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-26 09:40:24
224Mathematical notation / Multiplication / Elliptic curve cryptography / Elliptic curves / Planar lamina / Doubling-oriented Doche–Icart–Kohel curve / Mathematics / Abstract algebra / Elementary arithmetic

PDF Document

Add to Reading List

Source URL: emedia.rmit.edu.au

Language: English - Date: 2012-11-21 21:52:54
225Finite fields / Group theory / Elliptic curves / Cryptography / Polynomials / Elliptic curve / Lenstra elliptic curve factorization / Division polynomials / Prime number / Abstract algebra / Mathematics / Algebra

Elliptic Curves in Algorithmic Number Theory and Cryptography Otto Forster §1 Applications in Algorithmic Number Theory In this section we describe briefly the use of elliptic curves over finite fields for

Add to Reading List

Source URL: www.mathematik.uni-muenchen.de

Language: English - Date: 2003-12-07 11:29:32
226Elliptic curve cryptography / BasicCard / Digital signature / IEEE P1363 / SHA-1 / Crypt / Integrated Encryption Scheme / Elliptic Curve DSA / Cryptography / Public-key cryptography / Cryptographic hash functions

Elliptic Curves in the BasicCard Tony Guilfoyle ZeitControl cardsystems GmbH e-mail: 14th February 2000

Add to Reading List

Source URL: www.basiccard.com

Language: English - Date: 2000-02-16 08:07:52
227Computer network security / Kerberos / Diffie–Hellman key exchange / Cipher suite / Elliptic curve Diffie–Hellman / Shared secret / Whitfield Diffie / Ticket Granting Ticket / Key exchange / Cryptography / Cryptographic protocols / Key management

draft-vanrein-krb5-kdh-00 - KRB5-KDH: Cryptographically binding Kerberos5 with Diffie-Hellman

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2015-04-26 16:01:52
228RSA / Fault injection / Cyberwarfare / Espionage / Mathematical sciences / Cryptography / Public-key cryptography / Elliptic curve cryptography

Protecting Elliptic Curve Cryptography Against Fault Injection Attacks Location. SEN group of the COMELEC department at Telecom ParisTech (37 rue Dareau, 75014, Paris). This internship can lead to a PhD thesis. Advisors.

Add to Reading List

Source URL: perso.telecom-paristech.fr

Language: English - Date: 2015-01-08 09:02:28
229Elliptic curve cryptography / Elliptic curves / Algebraic structures / Differential calculus / Linear differential equation / Maple / Algebra / Mathematics / Linear algebra

INTEGRATED ALGEBRA The University of the State of New York REGENTS HIGH SCHOOL EXAMINATION INTEGRATED ALGEBRA

Add to Reading List

Source URL: www.jmap.org

Language: English - Date: 2015-01-24 23:30:59
230Error detection and correction / Hash function / One-way compression function / Elliptic curve only hash / Cryptography / Cryptographic hash functions / Hashing

CS255: Cryptography and Computer Security Winter 2003 Assignment #2 Due: Wednesday, February 19th, 2003.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-02-14 22:08:35
UPDATE