Elliptic-curve cryptography

Results: 465



#Item
381Elliptic curve cryptography / Elliptic curves / Analytic number theory / Algebraic curves / Elliptic curve / Group theory / Curve / Rational point / Rational function / Abstract algebra / Geometry / Algebraic geometry

Covering Collections and a Challenge Problem of Serre E. Victor Flynn*, Mathematical Institute, University of Oxford Joseph L. Wetherell†, Department of Mathematics, University of Southern California Abstract We answer

Add to Reading List

Source URL: people.maths.ox.ac.uk

Language: English - Date: 2006-07-08 18:57:36
382National Security Agency / Key management / Elliptic curve cryptography / Cryptanalysis / RSA / Key / RC4 / NSAKEY / NTRU / Cryptography / Public-key cryptography / Stream ciphers

Microsoft PowerPoint - preneel_postsnowden_2014v1.pptx

Add to Reading List

Source URL: secappdev.org

Language: English - Date: 2014-02-09 16:43:18
383Key management / Cryptographic protocols / Elliptic curve cryptography / Key size / IEEE P1363 / PKCS / Elliptic curve Diffie–Hellman / Elliptic Curve DSA / Diffie–Hellman key exchange / Cryptography / Cryptography standards / Public-key cryptography

Microsoft Word - medea03-v9.doc

Add to Reading List

Source URL: vega.dii.unisi.it

Language: English - Date: 2003-09-04 12:55:08
384NTRUEncrypt / NTRU / RSA / Elliptic curve cryptography / PKCS / NTRU Cryptosystems /  Inc. / NTRUSign / Cryptography / Post-quantum cryptography / Public-key cryptography

The NTRU Cryptosystem: Implementation and Comparative Analysis Semester Project ECE 646, Fall 2001 Professor Kris Gaj

Add to Reading List

Source URL: teal.gmu.edu

Language: English - Date: 2006-08-01 02:21:35
385Finite fields / Cryptographic protocols / Homomorphic encryption / Diffie–Hellman problem / Strong RSA assumption / RSA / Elliptic curve cryptography / Actor model / Eurocrypt / Cryptography / Public-key cryptography / Computational hardness assumptions

Victor Shoup Curriculum Vitae Feb. 6, 2014 Department of Computer Science Courant Institute of Mathematical Sciences New York University 251 Mercer Street

Add to Reading List

Source URL: www.shoup.net

Language: English - Date: 2014-02-06 21:21:47
386Elliptic Curve DSA / Elliptic curve cryptography / NSA Suite B Cryptography / Digital signature / Digital Signature Algorithm / Key / Elliptic curve / Implicit certificate / CRYPTREC / Cryptography / Public-key cryptography / Key management

Suite B Implementer’s Guide to FIPS[removed]ECDSA) February 3, [removed]

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2010-03-11 10:51:46
387Law / Research In Motion / S&P/TSX 60 Index / Term of patent / Patent / Economy of Canada / Elliptic curve cryptography / Reexamination / Civil law / Patent law / United States patent law / Intellectual property law

Serial No. _______________ Effective Date: ___________ Elliptic Curve Cryptography Patent License Agreement Between

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2009-01-15 13:07:34
388Cryptography / Group theory / Analytic number theory / Elliptic curve / Number theory / Abstract algebra / Mathematics / Finite fields

ON THE ASYMPTOTIC EFFECTIVENESS OF WEIL DESCENT ATTACKS KORAY KARABINA, ALFRED MENEZES, CARL POMERANCE, AND IGOR E. SHPARLINSKI Abstract. In this paper we investigate the asymptotic effectiveness of the Gaudry-Hess-Smart

Add to Reading List

Source URL: www.math.dartmouth.edu

Language: English - Date: 2010-01-26 20:32:00
389Elliptic curve cryptography / Computing / Mathematics / Embedded systems / Sensor node / Elliptic curve / Elliptic Curve DSA / Program optimization / Integrated Encryption Scheme / Finite fields / Wireless sensor network / Cryptography

TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks An Liu, Peng Ning Department of Computer Science North Carolina State University Raleigh, NC 27695

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:28:30
390Mathematics / Computing / Wireless sensor network / Elliptic Curve DSA / Sensor node / Integrated Encryption Scheme / Program optimization / Elliptic curve / Key size / Finite fields / Cryptography / Elliptic curve cryptography

TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks∗ An Liu Department of Computer Science NC State University, Raleigh, NC[removed]email: [removed]

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:10
UPDATE