Elliptic-curve cryptography

Results: 465



#Item
411National Security Agency / NSA Suite B Cryptography / Elliptic curve cryptography / SHA-2 / SHA-1 / Advanced Encryption Standard / Key size / CRYPTREC / Cryptography / Cryptography standards / Cryptographic hash functions

Suite B Cryptography March 22, 2006 Elaine Barker

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-26 01:00:00
412Mathematics / Cryptography / Elliptic curve cryptography / SECG / Elliptic curve / Ellipse / Abstract algebra / Cryptography standards / Finite fields

S TANDARDS FOR E FFICIENT C RYPTOGRAPHY SEC 2: Recommended Elliptic Curve Domain Parameters

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2002-09-13 00:00:00
413Elliptic functions / Analytic number theory / Cryptography / Elliptic curves / Elliptic curve / Group theory / Weil pairing / Pairing / Modular form / Abstract algebra / Mathematical analysis / Algebra

The Weil pairing on elliptic curves over C Steven D. Galbraith September 13, 2005

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-09-13 08:23:20
414Cryptographic hash functions / Randomness / SHA-1 / FIPS 140-2 / Digital Signature Algorithm / Advanced Encryption Standard / Algorithm / Elliptic Curve DSA / Random number generation / Cryptography / Cryptography standards / Pseudorandom number generators

The Random Number Generator Validation System (RNGVS) January 31, 2005

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-01-05 00:00:00
415Integer sequences / Finite fields / Modular arithmetic / Group theory / Cryptography / Elliptic divisibility sequence / Elliptic curve / Division polynomials / Prime number / Abstract algebra / Mathematics / Algebra

Elliptic curves and related sequences Christine S. Swart

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2006-08-24 17:33:22
416Electronic commerce / Key management / RSA / Integer factorization / Digital signature / Key size / Strong RSA assumption / Elliptic curve cryptography / Random oracle / Cryptography / Public-key cryptography / Computational hardness assumptions

Evaluation of Security Level of Cryptography: ACE Signature Scheme Alfred Menezes, Minghua Qu, Doug Stinson, Yongge Wang

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-03 22:32:58
417ISO standards / Ubiquitous computing / Power analysis / Timing attack / Cryptanalysis / RSA / Smart card / Differential fault analysis / Elliptic curve cryptography / Cryptography / Espionage / Side channel attack

October[removed]Side channel attacks

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-03 22:32:58
418CRYPTREC / Internet protocols / Secure communication / Cryptographic protocols / NESSIE / Transport Layer Security / Hierocrypt / CIPHERUNICORN-A / Elliptic Curve DSA / Cryptography / Cryptography standards / Block ciphers

(2001 )

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-07 05:26:11
419Public-key cryptography / Diffie–Hellman key exchange / ElGamal encryption / Diffie–Hellman problem / Polynomial / RSA / Prime number / XTR / Elliptic curve Diffie–Hellman / Cryptography / Cryptographic protocols / Finite fields

In Advances in Cryptology—Asiacrypt’99, Vol[removed]of Lecture Notes in Computer Science, Springer-Verlag, 1999. pp[removed]Doing More with Fewer Bits

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2000-02-21 14:17:00
420Algebraic curves / Hyperelliptic curve cryptography / Euclidean algorithm / Ample line bundle / Divisor / Imaginary hyperelliptic curve / Hyperelliptic curve / Greatest common divisor / Elliptic curve / Abstract algebra / Algebraic geometry / Geometry

Fields Institute Communications Volume 00, 0000

Add to Reading List

Source URL: www.math.uwaterloo.ca

Language: English - Date: 2008-09-04 06:42:36
UPDATE