Properties (66)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Cryptography
|
gptkbp:basedOn |
Finite fields
Mathematical properties of elliptic curves |
gptkbp:designedBy |
gptkb:Victor_S._Miller
Neil Koblitz |
gptkbp:energyEfficiency |
RSA for equivalent security levels
|
https://www.w3.org/2000/01/rdf-schema#label |
Elliptic Curve Cryptography
|
gptkbp:is_part_of |
Post-quantum cryptography research
|
gptkbp:is_recognized_for |
Cryptographic libraries
|
gptkbp:is_supported_by |
Various programming languages
|
gptkbp:is_used_in |
gptkb:Transport_Layer_Security_(TLS)
Data encryption Two-factor authentication Cryptographic protocols Blockchain technology Bitcoin Secure communications Secure Socket Layer (SSL) Access control systems Data integrity verification IoT security Secure remote access Virtual private networks (VPNs) Identity verification Secure data sharing Secure online transactions Secure content distribution Secure data transmission Secure email Secure voting systems Wireless security protocols Cryptographic tokens Electronic signatures Key exchange protocols Secure file storage Secure access to cloud services Secure digital identities Secure software distribution Secure software updates Secure messaging apps Secure network protocols Secure online banking Secure online communications Secure online shopping Secure application programming interfaces (APIs) Secure authentication mechanisms Secure cloud computing Secure digital asset management Secure electronic transactions Secure online communications protocols Secure online data sharing Secure online data storage Secure online gaming Secure online identity verification Secure online privacy protection Secure peer-to-peer transactions Mobile_payments Digital_wallets Digital_signatures Digital_certificates Secure_digital_rights_management_(DRM) |
gptkbp:offers |
Shorter key lengths
|
gptkbp:provides |
Public key cryptography
|
gptkbp:skills |
Quantum_attacks
|
gptkbp:standardFeatures |
NIST
|
gptkbp:uses |
Elliptic curves
|