Elliptic-curve cryptography

Results: 465



#Item
231Quantum cryptography / Quantum information science / Key management / Quantum computer / Quantum key distribution / Quantum algorithm / Public-key cryptography / Elliptic curve cryptography / Quantum information / Cryptography / Applied mathematics / Theoretical computer science

Quantum Safe Whitepaper 1 0 0

Add to Reading List

Source URL: docbox.etsi.org

Language: English - Date: 2014-10-04 16:44:20
232Elliptic curve Diffie–Hellman / Public-key cryptography / Diffie–Hellman problem / Cryptography / Cryptographic protocols / Diffie–Hellman key exchange

A quantum-safe circuit-extension handshake for Tor John Schanck1,2 , William Whyte1 , and Zhenfei Zhang1 1 Security Innovation, Wilmington, MA[removed]University of Waterloo, Waterloo, Canada

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-26 06:52:05
233Peer-to-peer computing / Digital signature / Threshold cryptosystem / RSA / Elliptic Curve DSA / Paillier cryptosystem / XTR / Homomorphic encryption / Digital Signature Algorithm / Cryptography / Public-key cryptography / Bitcoin

Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme Steven Goldfeder Princeton University [removed] Rosario Gennaro

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2015-03-08 09:13:05
234Cryptography / Lenstra elliptic curve factorization / Quadratic sieve / Integer factorization / Elliptic curve / Primality test / Prime number / Prime factor / Algebraic-group factorisation algorithm / Integer factorization algorithms / Abstract algebra / Mathematics

THE ELLIPTIC CURVE METHOD PAUL ZIMMERMANN The Elliptic Curve Method (ECM for short) was invented in 1985 by H. W. Lenstra, Jr[removed]It is suited to find small — say 9 to 30 digits — prime factors of large numbers. Am

Add to Reading List

Source URL: www.loria.fr

Language: English - Date: 2004-09-06 05:03:02
235Public-key cryptography / Elliptic curve Diffie–Hellman / Diffie–Hellman key exchange / YAK / Electronic money / Digital signature / Elliptic Curve DSA / MQV / Shared secret / Cryptography / Cryptographic protocols / Bitcoin

Authenticated Key Exchange over Bitcoin Patrick McCorry, Siamak F. Shahandashti, Dylan Clarke, Feng Hao Newcastle University, UK {patrick.mccorry,siamak.shahandashti,dylan.clarke,feng.hao}@ncl.ac.uk Abstract. Bitcoin is

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-03 08:37:15
236Elliptic curves / Group theory / Finite fields / Number theory / Cryptography / Elliptic divisibility sequence / Division polynomials / Hyperelliptic curve cryptography / Supersingular elliptic curve / Algebra / Abstract algebra / Mathematics

1 A Note on Scalar Multiplication Using Division Polynomials Binglong Chen, Chuangqiang Hu and Chang-An Zhao

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-25 10:20:16
237Electronic commerce / Elliptic curve cryptography / RSA / OpenSSL / Cryptanalysis / Key size / Cryptographic engineering / Microsoft CryptoAPI / Cryptography / Cryptographic software / Public-key cryptography

Crypto for developers[removed]Jean-Philippe Aumasson (@veorq) The training This training is about cryptography for non-cryptographers: how to make sure you

Add to Reading List

Source URL: 131002.net

Language: English - Date: 2013-08-17 18:32:50
238Cryptography / Elliptic curves / Finite fields / Group theory / Analytic number theory / Pairing / Elliptic curve cryptography / Elliptic curve / Weil pairing / Abstract algebra / Algebra / Mathematics

1 An Improvment of the Elliptic Net Algorithm Binglong Chen and Chang-An Zhao* Abstract In this paper we propose a modified Elliptic Net algorithm to compute pairings. By reducing the number of the

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-24 02:53:55
239Finite fields / Elliptic curves / Public-key cryptography / Elliptic curve / Cipher / Integrated Encryption Scheme / Index of cryptography articles / Cryptography / Abstract algebra / Elliptic curve cryptography

International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.1, January[removed]ENCRYPTION OF DATA USING ELLIPTIC CURVE OVER FINITE FIELDS D. Sravana Kumar1 1

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2012-02-09 20:01:10
240Doubling-oriented Doche–Icart–Kohel curve / Elliptic curve cryptography / Polynomial expansion

Instructions: Pick the letter which represents the correct answer for each problem. Calculators are not allowed[removed]equals: [2(sqrt(12^2))-(sqrt12)^2]/sqrt5

Add to Reading List

Source URL: unilearn.net.au

Language: English - Date: 2012-08-08 01:58:21
UPDATE