Elliptic Curves: How The National Security Agency Hacked Our E-mail
Item
Title
Elliptic Curves: How The National Security Agency Hacked Our E-mail
Description
Elliptic Curves will be explored from a mathematical perspective as well as from a cryptographic perspective, where they have important applications to modern information security. We will address what elliptic curves are, explore integer and rational solutions to elliptic curves, and explain how the National Security Agency hacked our e-mail. A computer program written in Octave will be used throughout to elucidate these concepts.
Joseph Witkowski
Contributor
Keene State College
Creator
Kegan Landfair
Date
2015-04-11
Identifier
http://hdl.handle.net/20.500.12088/7624
Abstract
Elliptic Curves will be explored from a mathematical perspective as well as from a cryptographic perspective, where they have important applications to modern information security. We will address what elliptic curves are, explore integer and rational solutions to elliptic curves, and explain how the National Security Agency hacked our e-mail. A computer program written in Octave will be used throughout to elucidate these concepts.
Language
en_US
Subject
Computer Sciences
Mathematics
Type
Presentation
Rights
http://rightsstatements.org/vocab/InC/1.0/