Elliptic-curve cryptography

Results: 465



#Item
391Cryptography / Quadratic sieve / Quadratic residue / Prime number / Lenstra elliptic curve factorization / Factorization / Integer factorization / Primality certificate / Euclidean algorithm / Integer factorization algorithms / Mathematics / Number theory

SIAM J. COMPUT. (C[removed]Society for Industrial and Applied Mathematics Vol. 17, No. 2, April 1988

Add to Reading List

Source URL: www.math.dartmouth.edu

Language: English - Date: 2010-11-16 13:52:48
392Elliptic curve cryptography / Electronic commerce / RSA / Mathematics / Public-key cryptography / Finite fields / Cryptography

C:uments and SettingserDocuments Chips PDF Presentationsuesday_Conferencern.pdf

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2013-07-27 23:43:45
393Finite fields / Public-key cryptography / Cryptographic protocols / Hyperelliptic curve cryptography / Hyperelliptic curve / Elliptic curve cryptography / Diffie–Hellman key exchange / Diffie–Hellman problem / Abelian variety / Cryptography / Abstract algebra / Algebraic curves

The state-of-the-art in hyperelliptic curve cryptography Craig Costello Workshop on Curves and Applications

Add to Reading List

Source URL: www.mathtube.org

Language: English - Date: 2013-09-20 13:09:55
394Internet protocols / Secure communication / Electronic commerce / Transport Layer Security / Cipher suite / Advanced Encryption Standard / Transmission Control Protocol / Elliptic curve cryptography / CryptGenRandom / Cryptography / Pseudorandom number generators / Cryptographic protocols

On the Practical Exploitability of Dual EC in TLS Implementations Stephen Checkoway1, Matthew Fredrikson2, Ruben Niederhagen3, Matthew Green1, Tanja Lange3, Thomas Ristenpart2, Daniel J. Bernstein3, 4 Jake Maskiewicz5, a

Add to Reading List

Source URL: dualec.org

Language: English - Date: 2014-04-07 12:09:11
395Elliptic curves / Public-key cryptography / Elliptic curve cryptography / NTRU / Elliptic Curve DSA / Lattice problem / Counting points on elliptic curves / Hyperelliptic curve cryptography / Elliptic curve / Cryptography / Post-quantum cryptography / Finite fields

References [1] M. Agrawal, N. Kayal, and N. Saxena. PRIMES is in P. Ann. of Math. (2), 160(2):781–793, [removed]L. V. Ahlfors. Complex Analysis. McGraw-Hill Book Co., New York, third edition, 1978. An introduction to

Add to Reading List

Source URL: www.math.brown.edu

Language: English - Date: 2008-03-20 11:42:48
396Elliptic curve cryptography / X.509 / Certificate authority / Public key certificate / Cryptography / Public-key cryptography / Key management

Information Security Corporation

Add to Reading List

Source URL: www.infoseccorp.com

Language: English - Date: 2003-12-11 12:52:20
397Cryptographic protocols / Post-quantum cryptography / Elliptic curve cryptography / NTRU / Outline of cryptography / Cryptanalysis / Lattice-based cryptography / Alice and Bob / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / Finite fields

Preface The creation of public key cryptography by Diffie and Hellman in 1976 and the subsequent invention of the RSA public key cryptosystem by Rivest, Shamir, and Adleman in 1978 are watershed events in the long histor

Add to Reading List

Source URL: www.math.brown.edu

Language: English - Date: 2008-03-20 11:45:18
398Post-quantum cryptography / Quantum cryptography / Key size / Quantum computer / NTRU / Digital signature / Elliptic Curve DSA / Cipher / XTR / Cryptography / Public-key cryptography / Key management

Post-Quantum Cryptography Tanja Lange Technische Universiteit Eindhoven [removed] 17 December 2008

Add to Reading List

Source URL: hyperelliptic.org

Language: English - Date: 2009-01-22 19:45:07
399Computational science / Cryptography / Coding theory / Public-key cryptography / Factorization of polynomials over a finite field and irreducibility tests / Lenstra elliptic curve factorization / Mathematics / Euclidean algorithm / Finite fields

CS255: Introduction to Cryptography Winter 2014 Assignment #3: Solutions Answer 1.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-03-18 01:08:22
UPDATE