Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revisionBoth sides next revision | ||
public:research:main [2024-01-18 15:49] – [Security of cryptographic implementations] xjancar | public:research:main [2024-01-18 15:50] – [Randomness statistical testing of TRNG and PRNG] xjancar | ||
---|---|---|---|
Line 125: | Line 125: | ||
We also develop tools and libraries helping open-source developers to create open, faster, and more secure JavaCard applets. | We also develop tools and libraries helping open-source developers to create open, faster, and more secure JavaCard applets. | ||
- | <button collapse=" | + | < |
- | < | + | <button icon=" |
< | < | ||
Line 181: | Line 181: | ||
In the past, we were systematically analyzing standardized elliptic curves. Lately, we have been mainly focusing on ECC with respect to side-channel attacks and the involvement of elliptic curves in the Bitcoin protocol. | In the past, we were systematically analyzing standardized elliptic curves. Lately, we have been mainly focusing on ECC with respect to side-channel attacks and the involvement of elliptic curves in the Bitcoin protocol. | ||
- | <button collapse=" | + | < |
< | < | ||
Line 229: | Line 229: | ||
- | <button collapse=" | + | < |
< | < | ||