Public-key cryptography

Results: 11378



#Item
781Cryptography / Abstract algebra / Algebra / Finite fields / Public-key cryptography / Computational hardness assumptions / Group theory / DiffieHellman key exchange / Index calculus algorithm / RSA / Discrete logarithm / Elliptic curve cryptography

E-th roots and static Diffie-Hellman using index calculus Antoine Joux1 Joint work with Reynald Lercier2 , David Naccache3 , Emmanuel Thome´ 4 Elliptic Curve Cryptography 2008

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2008-10-04 13:47:14
782Cryptography / Public-key cryptography / Key management / Key / Public key infrastructure / Elliptic curve cryptography / Digital signature / Smart grid / Meter data management / Symmetric-key algorithm / Computer security / Smart meter

Certicom AMI 7000 data sheet-front-rev10

Add to Reading List

Source URL: www.certicom.com

Language: English - Date: 2009-06-02 19:28:55
783Cryptography / Primary care / Child care / Social security in Australia / Health care / Public key certificate

State of Illinois Department of Human Services CHILD CARE TELEPHONE BILLING AGREEMENT Please complete this form and return to your Child Care Resource and Referral

Add to Reading List

Source URL: ccrs.illinois.edu

Language: English - Date: 2016-01-27 14:01:59
784

This is the full version0 of the extended abstract which appears in the 2011 International Conference on Theory and Practice in Public Key Cryptography PKC–9 march 2011, Taormina, Italy) D. Catalano, N. Fazio,

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2011-07-13 07:40:09
    785

    Post Quantum Cryptography: Implementing Alternative Public Key Schemes on Embedded Devices

    Add to Reading List

    Source URL: www.emsec.rub.de

    Language: English - Date: 2014-03-28 10:00:16
      786Cryptocurrencies / Cryptography / Alternative currencies / Public-key cryptography / Bitcoin / Digital currencies / CryptoNote / Digital signature / Ring signature / Zerocoin / Blockchain / Shadow

      CryptoNote v 2.0 Nicolas van Saberhagen October 17, 2013 1

      Add to Reading List

      Source URL: cryptonote.org

      Language: English
      787Abstract algebra / Algebra / Cryptography / Elliptic curves / Elliptic curve cryptography / Group theory / Finite fields / Public-key cryptography / Elliptic curve / Abelian variety / Complex multiplication / Index calculus algorithm

      Constructing abelian varieties for cryptographic use Peter Stevenhagen ECC, Utrecht September 22, 2008

      Add to Reading List

      Source URL: www.hyperelliptic.org

      Language: English - Date: 2008-10-05 20:16:07
      788

      Ruhr-University Bochum Post Quantum Cryptography on Embedded Devices: An Ecient Implementation of the McEliece Public Key Scheme based on

      Add to Reading List

      Source URL: www.emsec.rub.de

      Language: English - Date: 2012-10-11 02:29:54
        789Cryptography / Post-quantum cryptography / Lattice-based cryptography / Homeomorphisms / Homomorphic encryption / Public-key cryptography / Key-recovery attack / NTRU / RSA / Ciphertext indistinguishability / Ideal lattice cryptography

        Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes Massimo Chenal Qiang Tang

        Add to Reading List

        Source URL: isc2015.item.ntnu.no

        Language: English - Date: 2015-09-20 14:16:36
        790Cryptography / FIPS 201 / Standards / Computer access control / Authentication / Smart card / PIV / Public-key cryptography / Cryptographic key types / RSA Security

        Interfaces for Personal Identity Verification

        Add to Reading List

        Source URL: nvlpubs.nist.gov

        Language: English - Date: 2016-02-16 14:47:45
        UPDATE