DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» EdDSA
EdDSA
Post-Quantum Cryptography
Secure Authentication Protocol for Internet of Things Achraf Fayad
Alternative Elliptic Curve Representations
Security Analysis of the Signal Protocol Student: Bc
Multi-Party Encrypted Messaging Protocol Design Document, Release 0.3-2-Ge104946
Practical Fault Attack Against the Ed25519 and Eddsa Signature Schemes
(Not) to Design and Implement Post-Quantum Cryptography
Subliminal Channels in High-Speed Signatures
PDF Hosted at the Radboud Repository of the Radboud University Nijmegen
Analysis of Key Management in Matrix
Transitioning the Use of Cryptographic Algorithms and Key Lengths
User Manual V.1.3 (“NTRU Release”) 1 What Is Goldbug?
How to Design a Trustworthy Ipsec VPN Device Employing Nested Tunnels?
Section 5 Public Key Crypto Topics: RSA, ECC, Cas Administrivia
(Not) to Design and Implement Post-Quantum Cryptography
Making the Case for Elliptic Curves in DNSSEC
Eddsa for More Curves Daniel J
CRYPTREC Review of Eddsa CRYPTREC EX-3003-2020
Top View
Linphone Instant Message Encryption V2.0 (Lime V2.0)
NIST Status Update on Elliptic Curves and Post-Quantum Crypto
A Formal Security Analysis of the Signal Messaging Protocol Extended Version, November 2017†
Post-Quantum Authentication in TLS 1.3: a Performance Study
Python PKCS#11 Documentation
Draft FIPS 186-5, Digital Signature Standard (DSS)
TCG Algorithm Registry Family “2.0”
Security 101 Image Attribution: Randall Munroe ELCA For
View the Index
Elliptic Curve Cryptography: Theory for Eddsa
The Xeddsa and Vxeddsa Signature Schemes
Lattice-Based Fault Attacks on Deterministic Signature Schemes of ECDSA and Eddsa
Batch Verification of Eddsa Signatures
Eddsa Signatures and Ed25519
Signal Protocol
Attacking Deterministic Signature Schemes Using Fault Attacks
Taming the Many Eddsas
Development and Benchmarking of New Hardware Architectures for Emerging Cryptographic Transformations
Layered Network Protocols for Secure Communications in the Internet of Things
A Survey of Microarchitectural Side-Channel Vulnerabilities, Attacks and Defenses in Cryptography
Blockchain Is the Promising Technology in the Next Decade With
A Performance Evaluation of Post-Quantum Cryptography in the Signal Protocol En Prestandautvärdering Av Kvantsäkert Krypto I Signal- Protokollet
Fault Attacks on the Elliptic Curve Elgamal Cryptosystem
PKCS #11 Base Specification Version
Ingen Lysbildetittel CETA Workshop–November 2011-Need For
An Ed25519 Case Study
Eddsa for Baby Jubjub Elliptic Curve with Mimc-7 Hash
Short-Lived Forward-Secure Delegation for TLS∗
Is There a Case to Prefer Ed25519 Over ECDSA P-256 for DNSSEC? J.J
Non-Interactive Half-Aggregation of Eddsa and Variants of Schnorr Signatures
The Provable Security of Ed25519: Theory and Practice
Bouncy Castle FIPS Java API)
Subliminal Channels in High-Speed Signatures
Eddsa Signatures and Ed25519
A Formal Security Analysis of the Signal Messaging Protocol Extended Version, July 2019†
Multi-User Schnorr Security, Revisited
SECURE MESSAGING PLATFORM to Encrypt Messages
Post-Quantum TLS Without Handshake Signatures Full Version, August 26, 2020
Network Working Group BE Carpenter Internet-Draft Univ. of Auckland
The Libgcrypt Reference Manual Version 1.9.0 18 January 2021
Draft NIST SP 800-131A Rev. 2, Transitioning the Use Of
Network Working Group BE Carpenter Internet-Draft Univ. of Auckland
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols
The ISP Column DNSSEC with Eddsa
Comments Received on Draft FIPS 186-5: Digital Signature Standards (DSS) (January 29, 2020 Deadline) Updated 3/19/2021
Security on the Line: Modern Curve-Based Cryptography Copyright C 2019 Joost Renes ISBN: 978–94–6323–695–9 Typeset Using LATEX
High-Speed High-Security Signatures
Eddsa Over Galois Field GF( ) for Multimedia Data
Post-Quantum Cryptography
Nettle Manual for the Nettle Library Version 3.4