Elliptic-curve cryptography

Results: 465



#Item
331Elliptic curve cryptography / Elliptic curves

EPA Region 3 RCRA Corrective Action Facility Former GM Baltimore Facility Site Plan June_2007

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2011-08-08 14:30:35
332Validity / Cryptography standards / Elliptic Curve DSA / Digital signature / Secure Shell / Validation / Verification and validation / FIPS 140-2 / Cryptography / Public-key cryptography / Pharmaceutical industry

The Elliptic Curve Digital Signature Algorithm Validation System (ECDSAVS) September 7, 2004 Lawrence E. Bassham III

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-01-05 00:00:00
333Cryptographic software / Elliptic Curve DSA / SHA / Key size / Cryptography standards / NSA Suite B Cryptography / SHA-2 / Cryptography / Cryptographic hash functions / SHA-1

Legend for Description Field for Historical FIPS[removed]ECDSA Signature Generation Component Last Update: [removed]NOTICE: The SP800-131A Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-01-08 12:26:15
334FIPS 201 / Standards / PKCS / Elliptic curve cryptography / Key / Digital signature / Smart card / Elliptic curve Diffie–Hellman / Cryptography / Public-key cryptography / Key management

Microsoft PowerPoint - Crypto_Activities_Presentation_2010.pptx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-07 13:31:10
335Diffie–Hellman key exchange / Public-key cryptography / Internet Key Exchange / Shared secret / Public key infrastructure / Elliptic curve Diffie–Hellman / MQV / Cryptography / Cryptographic protocols / Key-agreement protocol

Deniable Authenticated Key Establishment for Internet Protocols Colin Boyd1? and Wenbo Mao2?? and Kenneth G. Paterson3? ? ? 1 Information Security Research Centre, Queensland University of Technology,

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2004-04-22 14:15:54
336MQV / Key-agreement protocol / Diffie–Hellman key exchange / Perfect forward secrecy / Digital signature / Diffie–Hellman problem / Whitfield Diffie / Cryptography / Cryptographic protocols / Public-key cryptography

Cryptographic Schemes based on Elliptic Curve Pairings Sattam S. Al-Riyami Thesis submitted to the University of London for the degree of Doctor of Philosophy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2004-06-16 10:55:54
337Abstract algebra / RSA / General number field sieve / Quadratic sieve / Polynomial / Lenstra elliptic curve factorization / Prime number / Arjen Lenstra / Factorization / Cryptography / Mathematics / Integer factorization algorithms

Cryptanalysis of RSA Variants and Implicit Factorization Santanu Sarkar August 20, 2013

Add to Reading List

Source URL: math.nist.gov

Language: English - Date: 2013-08-20 11:29:07
338Finite fields / Elliptic curve cryptography / Elliptic curve / Curve / NSA Suite B Cryptography / NIST hash function competition / SHA-2 / Elliptic Curve DSA / Cryptography / Cryptographic hash functions / Mathematics

How to manipulate curve standards: a white paper for the black hat Daniel J. Bernstein1,2 , Tung Chou1 , Chitchanok Chuengsatiansup1 , Andreas H¨ ulsing1 , 1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-23 00:04:01
339Finite fields / Logarithms / Computational hardness assumptions / Group theory / Diffie–Hellman problem / Index calculus algorithm / Discrete logarithm / XTR / Elliptic curve cryptography / Abstract algebra / Cryptography / Mathematics

The Past, evolving Present and Future of Discrete Logarithm Antoine Joux, Andrew Odlyzko and Cécile Pierrot Abstract The first practical public key cryptosystem ever published, the Diffie-Hellman key exchange algorithm,

Add to Reading List

Source URL: www.dtc.umn.edu

Language: English - Date: 2014-06-04 21:00:21
340Cryptographic protocols / Electronic commerce / X.509 / NSA Suite B Cryptography / Elliptic curve cryptography / Elliptic Curve DSA / Revocation list / Public key certificate / Elliptic curve Diffie–Hellman / Cryptography / Public-key cryptography / Key management

Internet Engineering Task Force (IETF) Request for Comments: 5759 Category: Informational ISSN: [removed]J. Solinas

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2010-01-24 14:56:32
UPDATE