Hyperelliptic curve cryptography

Results: 62



#Item
1

Elliptic Curves over Q Peter Birkner Technische Universiteit Eindhoven DIAMANT Summer School on Elliptic and Hyperelliptic Curve Cryptography

Add to Reading List

Source URL: www.pbirkner.fastmail.fm

Language: English - Date: 2008-09-19 03:32:03
    2

    This is Chapter 7 by Gerhard Frey and Tanja Lange of the Handbook of Elliptic and Hyperelliptic Curve Cryptography, Henri Cohen, Christophe Doche, and Gerhard Frey, Editors, CRC PressCRC Press has granted the foll

    Add to Reading List

    Source URL: hyperelliptic.org

    Language: English - Date: 2014-03-13 14:22:38
      3

      Hyperelliptic Curves Peter Birkner Technische Universiteit Eindhoven DIAMANT Summer School on Elliptic and Hyperelliptic Curve Cryptography

      Add to Reading List

      Source URL: www.pbirkner.fastmail.fm

      Language: English - Date: 2008-09-19 03:32:20
        4

        This is the Table of Contents of the Handbook of Elliptic and Hyperelliptic Curve Cryptography, Henri Cohen, Christophe Doche, and Gerhard Frey, Editors, CRC PressCRC Press has granted the following specific permi

        Add to Reading List

        Source URL: hyperelliptic.org

        Language: English - Date: 2006-09-06 22:21:24
          5Hashing / Information retrieval / Cryptography / Information science / Search algorithms / Elliptic curves / Error detection and correction / Analytic number theory / Elliptic curve / Supersingular elliptic curve / Hash function / BonehLynnShacham

          Indifferentiable Hashing to Elliptic and Hyperelliptic Curves Mehdi Tibouchi NTT Secure Platform Laboratories ECC Workshop 2013, 2013–09–17

          Add to Reading List

          Source URL: www.cosic.esat.kuleuven.be

          Language: English - Date: 2013-10-09 09:45:18
          6Cryptography / Elliptic curve cryptography / Public-key cryptography / Pairing-based cryptography / Finite fields / Group theory / Hyperelliptic curve cryptography / Tate pairing / DiffieHellman key exchange / BonehLynnShacham / Elliptic curve / Abelian variety

          Theta functions and applications in cryptography Fonctions thêta et applications en cryptographie Thèse d’informatique Damien Robert1 1

          Add to Reading List

          Source URL: www.normalesup.org

          Language: English - Date: 2014-08-03 16:15:38
          7Elliptic curve cryptography / Public-key cryptography / Finite fields / Hyperelliptic curve cryptography / Hyperelliptic curve / Cryptography / Mathematics / Science and technology / Science

          MACISA — Mathematics applied to cryptology and information security in Africa — LIRIMA Meeting, Saint-Louis, Sénégal Damien Robert Équipe LFANT, Inria Bordeaux Sud-Ouest

          Add to Reading List

          Source URL: www.normalesup.org

          Language: English - Date: 2015-05-29 11:53:40
          8Geometry / Abstract algebra / Algebra / Algebraic curves / Elliptic curve cryptography / Public-key cryptography / Finite fields / Hyperelliptic curve / Elliptic curve / Cryptography / Curve

          MACISA — Mathematics applied to cryptology and information security in Africa — LIRIMA Evaluation Seminar, Paris Tony Ezome, Damien Robert Équipe LFANT, Inria Bordeaux Sud-Ouest

          Add to Reading List

          Source URL: www.normalesup.org

          Language: English - Date: 2014-10-04 12:30:49
          9Elliptic curve cryptography / Public-key cryptography / Pairing-based cryptography / Group theory / Binary operations / Hyperelliptic curve cryptography / Tate pairing / Elliptic curve / Abelian variety / Cryptography / DiffieHellman key exchange / BonehLynnShacham

          Abelian varieties, Theta functions and cryptography MSR presentation Damien Robert1 1

          Add to Reading List

          Source URL: www.normalesup.org

          Language: English - Date: 2013-11-15 16:58:00
          10Finite fields / Number theory / Elliptic curve cryptography / Group theory / Elliptic curves / Artin conductor / Symbol / Elliptic curve / Supersingular elliptic curve / Conductor

          Indifferentiable Deterministic Hashing to Elliptic and Hyperelliptic Curves Reza R. Farashahi1 , Pierre-Alain Fouque2 , Igor E. Shparlinski1 , Mehdi Tibouchi2 , and J. Felipe Voloch3 1

          Add to Reading List

          Source URL: www.ma.utexas.edu

          Language: English - Date: 2010-07-19 10:41:17
          UPDATE