Back to Results
First PageMeta Content
Internet protocols / Key management / Public-key cryptography / Cipher suite / Transport Layer Security / Elliptic curve cryptography / Key size / Secure Shell / Key / Cryptography / Secure communication / Cryptographic protocols


Speeding up Secure Web Transactions Using Elliptic Curve Cryptography Vipul Gupta, Douglas Stebila∗, Stephen Fung* , Sheueling Chang Shantz, Nils Gura, Hans Eberle Sun Microsystems, IncCasey Avenue
Add to Reading List

Document Date: 2004-11-17 13:32:42


Open Document

File Size: 306,99 KB

Share Result on Facebook

City

San Diego / Mountain View / /

Company

MasterCard International / Rainbow / Efficient Cryptography Group / the Sun / Wilson / Yahoo! / nCipher / AES / Sun Microsystems Laboratories / Amazon / Wells Fargo / Sun Microsystems Inc. / Merrill Lynch / Broadcom / Zona Research / RSA Laboratories / Apache Software Foundation / Acme Labs Software / Hans Eberle Sun Microsystems Inc. / Visa International / /

Country

United States / /

Currency

USD / pence / /

Event

FDA Phase / /

Facility

FIPS PUB / University of Waterloo / National Institute of Standards and Technology / /

IndustryTerm

client devices / sub-exponential algorithms / internet draft / secure web server / e-commerce transactions / web banking / purpose hardware / Internet Server Performance / on-line shoppers / public-key algorithms / secure web servers / wireless environments / secure web sites / record layer processing / cryptographic algorithms / regular web servers / Internet Protocol / retail sites / e - commerce / web server / faster symmetric-key algorithms / symmetric algorithms / web server performance / security protocols / real-world web traffic / security protocol / Internet security protocol / Web Transactions Using Elliptic Curve Cryptography Vipul Gupta / web servers / public-domain tool / shared master secret using public-key algorithms / banking / handshake protocol / overall processing time / 100Mb ethernet network / on-line transactions / web page requests / electronic commerce / all be attacked using sub-exponential algorithms / /

OperatingSystem

Solaris / /

Organization

U.S. government / American Bankers Association / Open Mobile Alliance / U.S. Securities and Exchange Commission / Mozilla Organization / National Institute of Standards and Technology / Internet Engineering Task Force / University of Waterloo / /

Person

Victor Miller / Nils Gura / Sumit Gupta / Neal Koblitz / G. Apostolopoulos / V / Stephen Fung / Douglas Stebila / /

Position

General / representative / /

Product

Solaris / Java Enterprise System / Sun Fire server / Sun Fire / OpenSSL / ECC-160 / SSL3 / World Wide Web / TLSv1 / /

ProgrammingLanguage

Java / HTML / /

ProvinceOrState

California / /

PublishedMedium

Journal of Cryptology / Mathematics of Computation / /

Technology

sub-exponential algorithms / secret using public-key algorithms / faster symmetric-key algorithms / Internet security protocol / mobile phones / security protocols / operating system / HTML / mobile devices / encryption / Cryptography / 3.0 protocol / Pollard-rho algorithm / TLS Protocol / Java / 0 Protocol / Record Layer protocol / Digital Signature / S/MIME / Hypertext Transfer Protocol / data encryption / private key / DSA algorithms / ECC technology / SSL / pdf / ethernet / application protocols / security protocol / public key / Internet Protocol / 1 Throughout The SSL protocol / SSL protocol / public-key algorithms / HTTP / caching / main protocol / Handshake protocol / web server / /

URL

http /

SocialTag