{"guid":"import-75dd511530fcb882b6","title":"Aspects of Elliptic Curve Cryptography","subtitle":null,"slug":"078_Aspects_of_Elliptic_Curve_Cryptography","link":"http://www.ccc.de/congress/2004/fahrplan/event/78.en.html","description":"The talk will give an introduction to elliptic curve cryptography and explain some recent developments regarding attacks on the discrete logarithm problem on elliptic curves. In practice, elliptic curve cryptography can for example be employed in the TLS/SSL and IPsec protocols. It is well suited for use in constraint devices such as smart cards.\n","original_language":"eng","persons":[],"tags":["21c3"," Science"],"view_count":63,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:18:22.994+02:00","length":3533,"duration":3533,"thumb_url":"https://static.media.ccc.de/media/congress/2004/078 Aspects of Elliptic Curve Cryptography.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/078 Aspects of Elliptic Curve Cryptography_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-75dd511530fcb882b6-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-75dd511530fcb882b6-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/078_Aspects_of_Elliptic_Curve_Cryptography","url":"https://api.media.ccc.de/public/events/import-75dd511530fcb882b6","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":3},{"event_id":814,"event_guid":"import-52afc66c4fe5654a0d","weight":2},{"event_id":815,"event_guid":"import-e3bf427a6d2ffaa0a2","weight":2},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":2},{"event_id":837,"event_guid":"import-36a3b6a2ff3909dcad","weight":2},{"event_id":842,"event_guid":"import-c767cd58e7116fb747","weight":4},{"event_id":854,"event_guid":"import-61f9360e56315a6d0d","weight":2},{"event_id":863,"event_guid":"import-5a4a8c1099b9cb88ee","weight":4},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":2}],"recordings":[{"size":54,"length":3533,"mime_type":"audio/mpeg","language":"eng","filename":"078 Aspects of Elliptic Curve Cryptography.mp3","state":"downloaded","folder":"audio","high_quality":true,"width":496,"height":368,"updated_at":"2014-05-10T15:26:33.437+02:00","recording_url":"https://cdn.media.ccc.de/congress/2004/audio/078 Aspects of Elliptic Curve Cryptography.mp3","url":"https://api.media.ccc.de/public/recordings/1468","event_url":"https://api.media.ccc.de/public/events/import-75dd511530fcb882b6","conference_url":"https://api.media.ccc.de/public/conferences/21c3"},{"size":54,"length":3533,"mime_type":"video/mp4","language":"eng","filename":"078 Aspects of Elliptic Curve Cryptography.mp4","state":"downloaded","folder":"video","high_quality":true,"width":496,"height":368,"updated_at":"2016-01-27T11:03:14.133+01:00","recording_url":"https://cdn.media.ccc.de/congress/2004/video/078 Aspects of Elliptic Curve Cryptography.mp4","url":"https://api.media.ccc.de/public/recordings/1467","event_url":"https://api.media.ccc.de/public/events/import-75dd511530fcb882b6","conference_url":"https://api.media.ccc.de/public/conferences/21c3"}]}