<--- Back to Details
First PageDocument Content
Finite fields / Elliptic curves / Elliptic curve / Montgomery curve / Twisted Edwards curve / Curve / Edwards curve / XTR / Lenstra elliptic curve factorization / Abstract algebra / Cryptography / Elliptic curve cryptography
Date: 2015-06-15 16:32:44
Finite fields
Elliptic curves
Elliptic curve
Montgomery curve
Twisted Edwards curve
Curve
Edwards curve
XTR
Lenstra elliptic curve factorization
Abstract algebra
Cryptography
Elliptic curve cryptography

draft-irtf-cfrg-curves-02 - Elliptic Curves for Security

Add to Reading List

Source URL: tools.ietf.org

Download Document from Source Website

File Size: 46,10 KB

Share Document on Facebook

Similar Documents

The Next Bigly Thing : Plastic-To-Oil by Robert A. Nelson Many experts warn that we are on the down side of the

The Next Bigly Thing : Plastic-To-Oil by Robert A. Nelson Many experts warn that we are on the down side of the "Peak Oil" Bell Curve of supply:demand -- but we clever hominids shall probe ever deeper with mighty microwa

DocID: 1xVPR - View Document

Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbrenner, Hoang Le, Mohammed Khaleeluddin, Ramakrishna Bachimanchi George Mason University {kg

Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbrenner, Hoang Le, Mohammed Khaleeluddin, Ramakrishna Bachimanchi George Mason University {kg

DocID: 1xVNI - View Document

Hardware for Collision Search on Elliptic Curve over GF(2m) Philippe Bulens∗, Guerric Meurice de Dormale† and Jean-Jacques Quisquater UCL Crypto Group Universit´e Catholique de Louvain

Hardware for Collision Search on Elliptic Curve over GF(2m) Philippe Bulens∗, Guerric Meurice de Dormale† and Jean-Jacques Quisquater UCL Crypto Group Universit´e Catholique de Louvain

DocID: 1xVem - View Document

On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp

On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp

DocID: 1xUIc - View Document