Elliptic-curve cryptography

Results: 465



#Item
311Group theory / Elliptic curve / Cipher / Prime number / RSA / Mathematical sciences / Science / Public-key cryptography / Mathematics / Cryptography

NEW YORK CITY COLLEGE OF TECHNOLOGY

Add to Reading List

Source URL: www.citytech.cuny.edu

Language: English - Date: 2014-07-01 12:42:33
312Mathematics / Boneh/Franklin scheme / Pairing / XTR / Supersingular elliptic curve / Elliptic curve / ID-based encryption / RSA / Weil pairing / Abstract algebra / Cryptography / Algebra

FAULT ATTACKS ON PAIRING-BASED PROTOCOLS REVISITED SANJIT CHATTERJEE, KORAY KARABINA, AND ALFRED MENEZES Abstract. Several papers have studied fault attacks on computing a pairing value e(P, Q), where P is a public point

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-06-20 19:35:34
313Elliptic curves / Cryptography / Group theory / Finite fields / Linear algebra / Elliptic curve cryptography / Pairing / Elliptic curve / Supersingular elliptic curve / Algebra / Abstract algebra / Mathematics

SUBMITTED TO JOURNAL OF 1 Software implementation of an Attribute-Based Encryption scheme

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-05-30 22:32:03
314Search algorithms / Error detection and correction / Hash function / Random oracle / Oracle machine / Preimage attack / Elliptic curve only hash / SWIFFT / Cryptography / Cryptographic hash functions / Hashing

X-Sieve: CMU Sieve 2.2 From: Joan DAEMEN To:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:10:52
315X.509 / Revocation list / PKCS / Key size / Digital signature / Self-signed certificate / Elliptic Curve DSA / Public key infrastructure / Certificate policy / Cryptography / Public-key cryptography / Key management

Common Policy Change Proposal Number: [removed]To: Federal PKI Policy Authority From:

Add to Reading List

Source URL: www.idmanagement.gov

Language: English - Date: 2014-02-28 13:27:36
316Isogeny / Dual abelian variety / Undeniable signature / Elliptic curve / Digital signature / Localization of a category / Designated verifier signature / Abstract algebra / Cryptography / Supersingular elliptic curve

Isogeny-based quantum-resistant undeniable signatures David Jao1 and Vladimir Soukharev2 1 Department of Combinatorics and Optimization

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-07-22 11:45:39
317Key size / National Security Agency / Cryptanalysis / Elliptic curve cryptography / Communications security / Public-key cryptography / Py / Key / NTRU / Cryptography / Key management / Stream ciphers

Microsoft PowerPoint - preneel_chinacrypt_aug14_v1.pptx

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2014-08-28 01:07:14
318NTRU / Digital signature / Cryptosystem / NSA Suite B Cryptography / Elliptic curve cryptography / Cryptography / Elliptic Curve DSA / IEEE P1363

Cryptographic Hash Workshop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:11:24
319Crypto++ / CyaSSL / Cryptographic software / Cryptography / Elliptic curve cryptography

RSA BSAFE Crypto-C ME 3.0 Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2008-12-02 00:00:00
320Algebraic curves / Elliptic curve cryptography / Elliptic curves / Analytic number theory / Elliptic curve / Group theory / Hyperelliptic curve / Curve / Projective space / Geometry / Abstract algebra / Algebraic geometry

Sage Reference Manual: Elliptic and Plane Curves Release 6.3 The Sage Development Team

Add to Reading List

Source URL: www.sagemath.org

Language: English - Date: 2014-11-16 14:58:21
UPDATE