Elliptic Curves: How The National Security Agency Hacked Our E-mail
Item
- Description
- Elliptic Curves will be explored from a mathematical perspective as well as from a cryptographic perspective, where they have important applications to modern information security. We will address what elliptic curves are, explore integer and rational solutions to elliptic curves, and explain how the National Security Agency hacked our e-mail. A computer program written in Octave will be used throughout to elucidate these concepts.
- Joseph Witkowski
- Contributor
- Keene State College
- Creator
- Kegan Landfair
- Date
- 2015-04-11
- Identifier
- http://hdl.handle.net/20.500.12088/7624
- Abstract
- Elliptic Curves will be explored from a mathematical perspective as well as from a cryptographic perspective, where they have important applications to modern information security. We will address what elliptic curves are, explore integer and rational solutions to elliptic curves, and explain how the National Security Agency hacked our e-mail. A computer program written in Octave will be used throughout to elucidate these concepts.
- Language
- en_US
- Subject
- Computer Sciences
- Mathematics
- Type
- Presentation
- Rights
- http://rightsstatements.org/vocab/InC/1.0/
- Item sets
- AEC 2015 Sciences
- Site pages
- Sciences
Position: 4240 (45 views)