A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Guide to Elliptic Curve Cryptography
Guide to Elliptic Curve Cryptography
New directions in cryptography
IEEE Transactions on Information Theory
Handbook of Elliptic and Hyperelliptic Curve Cryptography, Second Edition
Handbook of Elliptic and Hyperelliptic Curve Cryptography, Second Edition
Hi-index | 0.00 |
The past 10 years have been witness to a sea change in the availability and distribution of high security cryptography for broad civilian applications. In this paper, we give a brief history of cryptography support in Windows and describe the upcoming architectural changes, including support for ECC, forthcoming in Windows Vista.