Statements (58)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:XMPP_Extension_Protocol
|
gptkbp:bfsLayer |
4
|
gptkbp:bfsParent |
gptkb:Gnu_PG_1.4.79
|
gptkbp:based_on |
mathematical properties of elliptic curves
|
https://www.w3.org/2000/01/rdf-schema#label |
ECC algorithm
|
gptkbp:is_considered |
secure against classical computers
|
gptkbp:is_effective_against |
RSA algorithm
|
gptkbp:is_implemented_in |
gptkb:TLS/_SSL_protocols
cryptographic protocols |
gptkbp:is_part_of |
post-quantum cryptography discussions
|
gptkbp:is_standardized_by |
gptkb:NIST
|
gptkbp:is_supported_by |
various programming libraries
|
gptkbp:is_used_by |
gptkb:Bitcoin
|
gptkbp:is_used_for |
encryption
|
gptkbp:is_used_in |
gptkb:Magic:_The_Gathering_set
gptkb:smartphone gptkb:software_framework cloud security data encryption at rest data encryption in transit financial transactions identity management systems identity verification secure communications access control systems authentication systems secure data sharing secure online transactions smart contracts data integrity checks multi-signature wallets digital certificates network security solutions secure remote access digital rights management secure email mobile payment systems secure web applications e-commerce security biometric systems secure cloud storage secure messaging applications secure voting systems endpoint security solutions secure online banking data loss prevention solutions secure file storage enterprise security solutions secure software updates Io T security secure AP Is VP Ns |
gptkbp:is_utilized_in |
digital signatures
|
gptkbp:is_vulnerable_to |
quantum attacks
|
gptkbp:offers |
smaller key sizes for equivalent security
|
gptkbp:proposed_by |
Victor Miller and Neal Koblitz
|
gptkbp:provides |
gptkb:XMPP_Extension_Protocol
|
gptkbp:uses |
gptkb:Mathematician
|