<--- Back to Details
First PageDocument Content
Cryptography / Elliptic curve cryptography / Elliptic-curve DiffieHellman / DiffieHellman key exchange / Cryptographic protocols / Alice and Bob / Computational hardness assumptions / Transport Layer Security / WolfSSH
Date: 2018-07-31 15:14:59
Cryptography
Elliptic curve cryptography
Elliptic-curve DiffieHellman
DiffieHellman key exchange
Cryptographic protocols
Alice and Bob
Computational hardness assumptions
Transport Layer Security
WolfSSH

In search of CurveSwap: Measuring elliptic curve implementations in the wild Luke Valenta∗ , Nick Sullivan† , Antonio Sanso‡ , Nadia Heninger∗ ∗ University

Add to Reading List

Source URL: www.seas.upenn.edu

Download Document from Source Website

File Size: 1,83 MB

Share Document on Facebook

Similar Documents

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

DocID: 1rsiG - View Document

Theta functions and applications in cryptography Fonctions thêta et applications en cryptographie Thèse d’informatique Damien Robert1 1

Theta functions and applications in cryptography Fonctions thêta et applications en cryptographie Thèse d’informatique Damien Robert1 1

DocID: 1ramq - View Document

Algorithm and Implementation Optimisation of Cryptographic Computation over Elliptic Curves (F2m ) Jean-Marc ROBERT Team DALI/LIRMM, University of Perpignan, France  Perpignan, the 30th of may 2012

Algorithm and Implementation Optimisation of Cryptographic Computation over Elliptic Curves (F2m ) Jean-Marc ROBERT Team DALI/LIRMM, University of Perpignan, France Perpignan, the 30th of may 2012

DocID: 1r4wa - View Document

Random Channel Hopping Schemes for Key Agreement in Wireless Networks Bin Zan Marco Gruteser

Random Channel Hopping Schemes for Key Agreement in Wireless Networks Bin Zan Marco Gruteser

DocID: 1r3wb - View Document

How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

DocID: 1qNCV - View Document