Elliptic-curve cryptography

Results: 465



#Item
81Elliptic Nets in Cryptography Katherine Stange Elliptic Divisibility Sequences

Elliptic Nets in Cryptography Katherine Stange Elliptic Divisibility Sequences

Add to Reading List

Source URL: mathsci.ucd.ie

Language: English - Date: 2007-09-14 09:56:21
82Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers Andres Molina-Markham, George Danezis† , Kevin Fu, Prashant Shenoy, and David Irwin University of Massachusetts Amherst †

Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers Andres Molina-Markham, George Danezis† , Kevin Fu, Prashant Shenoy, and David Irwin University of Massachusetts Amherst †

Add to Reading List

Source URL: www.ecs.umass.edu

Language: English - Date: 2014-08-13 10:33:20
83EdDSA signatures and Ed25519 Peter Schwabe Joint work with Daniel J. Bernstein, Niels Duif, Tanja Lange, and Bo-Yin Yang March 20, 2012

EdDSA signatures and Ed25519 Peter Schwabe Joint work with Daniel J. Bernstein, Niels Duif, Tanja Lange, and Bo-Yin Yang March 20, 2012

Add to Reading List

Source URL: caramba.loria.fr

Language: English - Date: 2016-06-13 15:37:33
84From now on: non-binary field k; non-square d 2 k. ( ) = f(x; y ) 2 k  k :

From now on: non-binary field k; non-square d 2 k. ( ) = f(x; y ) 2 k  k :

Add to Reading List

Source URL: mathsci.ucd.ie

Language: English - Date: 2007-09-14 09:56:21
85Cover and Decomposition Attacks on Elliptic Curves Vanessa VITSE Joint work with Antoine JOUX Universit´ e de Versailles Saint-Quentin, Laboratoire PRiSM

Cover and Decomposition Attacks on Elliptic Curves Vanessa VITSE Joint work with Antoine JOUX Universit´ e de Versailles Saint-Quentin, Laboratoire PRiSM

Add to Reading List

Source URL: ecc2011.loria.fr

Language: English - Date: 2011-09-30 12:40:06
86Efficient Prime-Field Arithmetic for Elliptic Curve Cryptography on Wireless Sensor Nodes Yang Zhang Johann Großschadl ¨

Efficient Prime-Field Arithmetic for Elliptic Curve Cryptography on Wireless Sensor Nodes Yang Zhang Johann Großschadl ¨

Add to Reading List

Source URL: www.cryptolux.org

Language: English - Date: 2013-09-17 06:26:54
    87A Cross-Protocol Attack on the TLS Protocol Nikos Mavrogiannopoulos Frederik Vercauteren  Vesselin Velichkov

    A Cross-Protocol Attack on the TLS Protocol Nikos Mavrogiannopoulos Frederik Vercauteren Vesselin Velichkov

    Add to Reading List

    Source URL: securewww.esat.kuleuven.be

    Language: English
    88Isogenies and endomorphism rings of elliptic curves ECC Summer School Damien Robert Microsoft ResearchNancy)

    Isogenies and endomorphism rings of elliptic curves ECC Summer School Damien Robert Microsoft ResearchNancy)

    Add to Reading List

    Source URL: ecc2011.loria.fr

    Language: English - Date: 2011-09-30 12:40:05
    89Useful Stuff Benjamin Smith Context Algebraic Curves  Useful Stuff

    Useful Stuff Benjamin Smith Context Algebraic Curves Useful Stuff

    Add to Reading List

    Source URL: ecc2011.loria.fr

    Language: English - Date: 2011-09-30 12:40:05
    90Introduction to Elliptic Curve Cryptography ECC Summer School KU Leuven, Belgium  September 11, 2013

    Introduction to Elliptic Curve Cryptography ECC Summer School KU Leuven, Belgium September 11, 2013

    Add to Reading List

    Source URL: www.cosic.esat.kuleuven.be

    Language: English - Date: 2013-09-23 05:41:56