Back to Results
First PageMeta Content
Finite fields / Elliptic curves / Elliptic curve cryptography / Group theory / Elliptic curve / Lenstra elliptic curve factorization / Edwards curve / Key size / Discrete logarithm / Abstract algebra / Cryptography / Mathematics


Document Date: 2012-09-24 00:58:21


Open Document

File Size: 690,23 KB

Share Result on Facebook

City

New Delhi / New York / Portland / London / /

Company

Balanced Ternary 64 International Journal / Cambridge University Press / RSA Labs / Bernstein / Certicom Corp. / Intel Corporation / Pearson / International Journal / Microsoft / Q 60 International Journal / /

Country

United States / /

Currency

pence / /

/

Facility

University of Washington / Pearson Prentice Hall / /

IndustryTerm

real life cryptographic algorithms / elliptic curve scalar multiplication algorithms / public-key cryptographic systems / scalar multiplication algorithm / scalar multiplication algorithms / elliptic curve scalar multiplication algorithm / secure public-key encryption algorithms / ladder algorithm / storage ladder algorithm / triple-double-add algorithm / bank server / data encryption technology / triple based algorithm / optimized algorithm / i5 processor / real life cryptographic applications / cryptographic applications / cryptographic systems / cryptographic algorithms / conventional doubling-based algorithm / encryption algorithms / exchange encryption algorithm / Internet protocol / banking / optimized algorithms / encryption systems / e - commerce / Internet technology industry / binary double-add algorithm / Internet communications / /

MusicGroup

The Code / /

OperatingSystem

Windows 7 / /

Organization

University of Washington / Portland Youth Conservatory Orchestra of the Portland Youth Philharmonic / Cambridge University / National Security Agency / Intercultural Student Association / Nation Security Agency / Oregon Episcopal School / Foundation of Computer Science / NOVEL ELLIPTIC CURVE SCALAR MULTIPLICATION ALGORITHMS FOR FASTER AND SAFER PUBLIC-KEY CRYPTOSYSTEMS Vinay S. Iyengar Oregon Episcopal School / /

Person

Vinay S. Iyengar Oregon / Jesse Walker / Victor Miller / Vinay S. Iyengar / Neal Koblitz / Michael Kounavis / Bevin Daglen / /

Position

varsity tennis player / accomplished pianist / Senior Research Scientist / Principal Engineer / /

Product

Pentax K-x Digital Camera / Lenstra / /

ProgrammingLanguage

EC / C++ / /

ProvinceOrState

New York / /

PublishedMedium

Mathematics of Computation / Annals of Mathematics / /

Technology

PK encryption algorithms / This algorithm / real life cryptographic algorithms / Binary Double-Add storage ladder algorithm / ladder algorithm / bioinformatics / tripling-based algorithm / t-1 / regular BDA algorithm / Diffie-Hellman key exchange encryption algorithm / symmetric-key encryption / BDA algorithm / secure public-key encryption / conventional doubling-based algorithm / smartphone / 1 algorithm / 2012 Expansion algorithm / scalar multiplication algorithms / triple-double-add algorithm / i5 processor / private key / 5.2 ALGORITHM / secret key / specific cryptographic algorithms / 5 algorithms / Integer Size vs. Algorithm / BDA algorithms / encryption / Cryptography / draft 1 algorithm / storage ladder algorithm / Ternary Expansion algorithm / elliptic curve scalar multiplication algorithm / The Binary Double-Add algorithm / public key / data encryption technology / Internet protocol / key exchange algorithms / elliptic curve scalar multiplication algorithms / binary double-add algorithm / secure public-key encryption algorithms / triple based algorithm / second algorithm / scalar multiplication algorithm / /

URL

http /

SocialTag