Description: Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. The use of elliptic curves in cryptography was suggested independently by Neal Koblitzand Victor S. Miller in 1985.
Elliptic curves are also used in several integer factorization algorithms that have applications in cryptography
To Search:
File list (Check if you may need any files):
rosing_src_ecc_code
...................\examples
...................\........\combined_math
...................\........\.............\onb_integer
...................\........\.............\...........\bigint.c
...................\........\.............\...........\bigint.h
...................\........\.............\...........\DSA.c
...................\........\.............\...........\DSA.example
...................\........\.............\...........\eliptic.c
...................\........\.............\...........\eliptic.h
...................\........\.............\...........\field2n.h
...................\........\.............\...........\int_functions.c
...................\........\.............\...........\Massey-Omura.c
...................\........\.............\...........\Massey-Omura.example
...................\........\.............\...........\MQV.c
...................\........\.............\...........\MQV.example
...................\........\.............\...........\Nyberg-Rueppel.c
...................\........\.............\...........\Nyberg-Rueppel.example
...................\........\.............\...........\onb.c
...................\........\.............\...........\onb.list
...................\........\.............\...........\onb_integer.c
...................\........\.............\...........\protocols.h
...................\........\.............\...........\protocols1.c
...................\........\.............\...........\read.me
...................\........\.............\...........\sha.c
...................\........\.............\opt_hash
...................\........\.............\........\eliptic.c
...................\........\.............\........\eliptic.h
...................\........\.............\........\field2n.h
...................\........\.............\........\Mask_gen_func.c
...................\........\.............\........\onb.c
...................\........\.............\........\onb_ECES.example
...................\........\.............\........\protocols1.c
...................\........\.............\........\sha.c
...................\........\.............\poly_hash
...................\........\.............\.........\eliptic.h
...................\........\.............\.........\eliptic_poly.c
...................\........\.............\.........\field2n.h
...................\........\.............\.........\Mask_gen_func.c
...................\........\.............\.........\poly.h
...................\........\.............\.........\polymain.c
...................\........\.............\.........\poly_ECES.example
...................\........\.............\.........\poly_func.c
...................\........\.............\.........\poly_protocol.c
...................\........\.............\.........\sha.c
...................\........\.............\poly_integer
...................\........\.............\............\bigint.c
...................\........\.............\............\bigint.h
...................\........\.............\............\DSA.c
...................\........\.............\............\DSA.example
...................\........\.............\............\eliptic.h
...................\........\.............\............\eliptic_poly.c
...................\........\.............\............\field2n.h
...................\........\.............\............\int_functions.c
...................\........\.............\............\Massey-Omura.c
...................\........\.............\............\Massey-Omura.example
...................\........\.............\............\MQV.c
...................\........\.............\............\MQV.example
...................\........\.............\............\Nyberg-Rueppel.example
...................\........\.............\............\poly.h
...................\........\.............\............\polymain.c
...................\........\.............\............\poly_func.c
...................\........\.............\............\poly_integer.c
...................\........\.............\............\poly_NR.c
...