Search

Your search keyword '"Elliptic Curve Digital Signature Algorithm"' showing total 49 results

Search Constraints

Start Over You searched for: Descriptor "Elliptic Curve Digital Signature Algorithm" Remove constraint Descriptor: "Elliptic Curve Digital Signature Algorithm" Publisher acm Remove constraint Publisher: acm
49 results on '"Elliptic Curve Digital Signature Algorithm"'

Search Results

1. Efficient Online-friendly Two-Party ECDSA Signature

2. The Exact Security of BIP32 Wallets

3. An efficient multi-signature wallet in blockchain using bloom filter

4. Verifiable Timed Signatures Made Practical

5. UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts

6. WI is Almost Enough: Contingent Payment All Over Again

7. Improving the Performance of Blockchain Based Digital Contract Using Niederreiter Method

8. A Group Authentication Scheme with Privacy-preserving for D2D Communications in 5G HetNets

9. A Lightweight D2D Authentication Scheme against Free-riding Attacks in 5G Cellular Network

10. SeCon-NG

11. Healthcare Center IoT Edge Gateway Based on Containerized Microservices

12. Hardware-Backed Heist

13. A Formal Treatment of Deterministic Wallets

14. NDN-ABS

15. Post-Quantum Cryptography in Embedded Systems

16. MUSCLE

17. Fast Multiparty Threshold ECDSA with Fast Trustless Setup

18. Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody

19. On the Security of the PKCS#1 v1.5 Signature Scheme

20. Hash-based signatures for the internet of things

21. A Subliminal Channel in EdDSA

22. Applications of elliptic curve cryptography

23. Performance Comparison between Broadcast Authentication Methods for Vehicular Networks

24. Amplifying side channels through performance degradation

25. On the Provable Security of (EC)DSA Signatures

26. Attacking OpenSSL Implementation of ECDSA with a Few Signatures

27. ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels

28. Efficient and Secure Implementation of Elliptic Curve Scalar Multiplication Against Power Analysis Attacks

29. A Cautionary Note

30. Mind Your Nonces Moving

31. Synthesis of Fault Attacks on Cryptographic Implementations

32. Beyond ECDSA and RSA

33. Hardware/Software Co-Design of Elliptic-Curve Cryptography for Resource-Constrained Applications

34. Implementation of SHA-1 and ECDSA for vehicular ad-hoc network using NS-3

35. ECvisual

36. Fault attack to the elliptic curve digital signature algorithm with multiple bit faults

37. Elliptic curve for data protection

38. Flooding-resilient broadcast authentication for VANETs

39. Elliptic curve cryptography

40. FPGA implementation of binary edwards curve usingternary representation

41. A new variant vision on ECDSA

42. A GF(p) elliptic curve group operator resistant against side channel attacks

43. Pre-authentication filters

44. Comparison of innovative signature algorithms for WSNs

45. Side-channel resistant system-level design flow for public-key cryptography

46. Multi-segment GF (2 m ) multiplication and its application to elliptic curve cryptography

47. Signcryption based on elliptic curve and its multi-party schemes

48. An FPGA implementation of an elliptic curve processor GF(2 m )

49. Generic implementations of elliptic curve cryptography using partial reduction

Catalog

Books, media, physical & digital resources