Elliptic-curve DiffieHellman

Results: 15



#Item
1Theta functions and applications in cryptography Fonctions thêta et applications en cryptographie Thèse d’informatique Damien Robert1 1

Theta functions and applications in cryptography Fonctions thêta et applications en cryptographie Thèse d’informatique Damien Robert1 1

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2014-08-03 16:15:38
2Algorithm and Implementation Optimisation of Cryptographic Computation over Elliptic Curves (F2m ) Jean-Marc ROBERT Team DALI/LIRMM, University of Perpignan, France  Perpignan, the 30th of may 2012

Algorithm and Implementation Optimisation of Cryptographic Computation over Elliptic Curves (F2m ) Jean-Marc ROBERT Team DALI/LIRMM, University of Perpignan, France Perpignan, the 30th of may 2012

Add to Reading List

Source URL: raim2012.u-bourgogne.fr

Language: English - Date: 2012-07-16 09:25:38
3How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

Add to Reading List

Source URL: www.ei.rub.de

Language: English - Date: 2016-05-24 15:16:00
4Network Working Group Request for Comments: 4492 Category: Informational S. Blake-Wilson SafeNet

Network Working Group Request for Comments: 4492 Category: Informational S. Blake-Wilson SafeNet

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2016-02-04 15:25:45
5Proceedings  - NN - Password Authenticated Key Agreement for Contactless Smart Cards

Proceedings - NN - Password Authenticated Key Agreement for Contactless Smart Cards

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:45:53
6Abelian varieties, Theta functions and cryptography MSR presentation Damien Robert1 1

Abelian varieties, Theta functions and cryptography MSR presentation Damien Robert1 1

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2013-11-15 16:58:00
7How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2016-05-24 15:16:00
8A Cross-Protocol Attack on the TLS Protocol Nikos Mavrogiannopoulos Frederik Vercauteren  Vesselin Velichkov

A Cross-Protocol Attack on the TLS Protocol Nikos Mavrogiannopoulos Frederik Vercauteren Vesselin Velichkov

Add to Reading List

Source URL: securewww.esat.kuleuven.be

Language: English
9Useful Stuff Benjamin Smith Context Algebraic Curves  Useful Stuff

Useful Stuff Benjamin Smith Context Algebraic Curves Useful Stuff

Add to Reading List

Source URL: ecc2011.loria.fr

Language: English - Date: 2011-09-30 12:40:05
10Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields

Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields

Add to Reading List

Source URL: 2010.eccworkshop.org

Language: English - Date: 2010-10-25 19:46:00