Suggested Topics within your search.
Cryptology 58 Data encryption (Computer science) 58 Computer security 51 Systems and Data Security 51 Computer Communication Networks 34 Computer communication systems 34 Computer science 28 more ...
Cryptology 58 Data encryption (Computer science) 58 Computer security 51 Systems and Data Security 51 Computer Communication Networks 34 Computer communication systems 34 Computer science 28 more ...
1
2
Table of Contents: ';
“...1 Non-triviality of Arithmetic Invariants -- 2 Elliptic Curves and Modular Forms -- 3 Invariants...”
Get full text
Get full text
3
by Berger, Laurent., Berger, Laurent., Böckle, Gebhard., Dembélé, Lassina., Dimitrov, Mladen., Dokchitser, Tim., Voight, John.
Published 2013
Table of Contents: ';
“... -- Explicit Methods for Hilbert Modular Forms -- Part III: Elliptic Curves -- Notes on the Parity Conjecture....”Published 2013
Get full text
4
Published 2016
Table of Contents: ';
“...-CM elliptic curves -- 9. M.Kim: Diophantine geometry and non-abelian reciprocity laws I -- 10. G...”Get full text
5
Published 2008
Table of Contents: ';
“... Equation -- Elliptic Curves Cryptology and Generalizations -- Abelian Varieties with Prescribed Embedding...”Get full text
6
Table of Contents: ';
“..., Inversion, and Division -- 7 Mathematical Fundamentals II: Abstract Algebra -- 8 Elliptic-Curve Basics -- 9...”
Get full text
Get full text
7
Published 2016
Table of Contents: ';
“...Elliptic curves -- Applications -- Irreducible polynomials.-Applications to cryptography -- Boolean...”Get full text
8
Published 2020
Table of Contents: ';
“...Best Papers -- Cybersecurity -- Credentials -- Elliptic Curves -- Payment Systems -- Privacy...”Get full text
9
Published 2017
Table of Contents: ';
“...Pairing-based Protocols -- Quantum Algorithms -- Elliptic Curves -- Block Chains -- Multi-Party...”Get full text
10
Published 2016
Table of Contents: ';
“...Digital signatures -- Public-key cryptography -- Block cipher cryptanalysis.-Elliptic curve...”Get full text
11
Published 2020
Table of Contents: ';
“... -- Privacy -- Security -- IoT architectures -- Elliptic curves -- Mobil critical communications. ....”Get full text
12
Published 2017
Table of Contents: ';
“... encryption.-Leakage-resilient -- Post-quantum cryptography -- Commitment and protocol -- Elliptic curves...”Get full text
13
Fundamentals of Cryptography Introducing Mathematical and Algorithmic Foundations / by Duncan Buell.
Table of Contents: ';
“... -- 7. Elliptic Curves -- 8. Mathematics, Computing, and Arithmetic -- 9. Modern Symmetric Ciphers — DES...”Get full text
14
Published 2015
Table of Contents: ';
“...System Security -- Stream Cipher -- Analysis -- Key Exchange Protocol -- Elliptic Curve...”Get full text
15
Published 2013
Table of Contents: ';
“... implementations and fault attacks -- Efficient and secure implementations -- Elliptic curve cryptography...”Get full text
16
Table of Contents: ';
“... and RSA -- Combinatorics, Probability and Information Theory -- Elliptic Curves and Cryptography...”
Get full text
Get full text
17
Published 2014
Table of Contents: ';
“...Payment Systems -- Case Studies -- Cloud and Virtualization -- Elliptic Curve Cryptography...”Get full text
18
Published 2017
Table of Contents: ';
“... security -- Malware detection -- Privacy -- Authentication -- Elliptic curve cryptography....”Get full text
19
Published 2017
Table of Contents: ';
“... security -- Malware detection -- Privacy -- Authentication -- Elliptic curve cryptography....”Get full text
20
Published 2016
Table of Contents: ';
“...Hash function -- Signature schemes -- Symmetric ciphers -- Elliptic curve and cryptographic...”Get full text