Certicom

Certicom

Certicom Corp. (tsx|CIC) is a cryptography company founded in 1985 by Gordon Agnew [cite web |title=Technology Transfer Partners of University of Waterloo |publisher=University of Waterloo web site |url=http://www.ece.uwaterloo.ca/Partnership/CurrentPartners/TechnologyTransfer/ |accessdate=2007-03-19 ] and Scott Vanstone.

The Certicom intellectual property portfolio includes over 350 patents and patents pending worldwide that cover key aspects of elliptic curve cryptography (ECC): software optimizations, efficient hardware implementations, methods to enhance the security, and various cryptographic protocols.Fact|date=February 2007

The National Security Agency (NSA) has licensed 26 of Certicom's ECC patents as a way of clearing the way for the implementation of elliptic curves to protect US and allied government information. [ [http://www.nsa.gov/ia/industry/crypto_elliptic_curve.cfm The Case for Elliptic Curve Cryptography ] ]

Certicom's current customers include General Dynamics, Motorola, Oracle, Research In Motion and Unisys.Fact|date=February 2007

ee also

* SECG
* ECC patents

References

External links

* [http://www.certicom.com/index.php Certicom website]


Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать курсовую

Look at other dictionaries:

  • Certicom — est une entreprise de sécurité informatique qui se spécialise dans la cryptographie sur les courbes elliptiques. Elle a été fondée en 1985 par Scott Vanstone et Gordon Agnew à partir de l Université de Waterloo. Son siège social est à Mississauga …   Wikipédia en Français

  • ECC patents — Patent related uncertainty around elliptic curve cryptography (ECC), or ECC patents, is one of the main factors limiting its wide acceptance. For example, the OpenSSL team accepted an ECC patch only in 2005 (in OpenSSL version 0.9.8), despite the …   Wikipedia

  • Research In Motion — Limited Type Public Traded as TSX: RIM NASDAQ:  …   Wikipedia

  • Discrete logarithm records — are the best results achieved to date in solving the discrete logarithm problem, which is the problem of finding solutions x to the equation gx = h given elements g and h of a finite cyclic group G. The difficulty of this problem… …   Wikipedia

  • Avaya Application Server 5300 — Avaya Aura AS5300 The Avaya Aura Application Server 5300 or Avaya Aura AS5300 in telecommunication and computer networking is a secure Unified Communications (UC) system designed and manufactured by Avaya. The system provides integrated IP… …   Wikipedia

  • Elliptic curve cryptography — (ECC) is an approach to public key cryptography based on the algebraic structure of elliptic curves over finite fields. The use of elliptic curves in cryptography was suggested independently by Neal Koblitz[1] and Victor S. Miller[2] in 1985.… …   Wikipedia

  • Criptografía de curva elíptica — Saltar a navegación, búsqueda La Criptografía de Curva Elíptica (CCE) es una variante de la criptografía asimétrica o de clave pública basada en las matemáticas de las curvas elípticas. Sus autores argumentan que la CCE puede ser más rápida y… …   Wikipedia Español

  • SECG — In cryptography, the Standards for Efficient Cryptography Group (SECG) is an international consortium founded by Certicom in 1998. The group exists to develop commercial standards for efficient and interoperable cryptography based on elliptic… …   Wikipedia

  • Implicit Certificates — are a variant of public key certificate, such that a public key can be reconstructed from any implicit certificate, and is said then to be implicitly verified, in the sense that the only party who can know the associated private key is the party… …   Wikipedia

  • Comparison of TLS Implementations — The Transport Layer Security (TLS) protocol provide the ability to secure communications across networks. There are several TLS implementations which are free and open source software and sometimes choosing between the available implementations… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”