Results 91 to 100 of about 2,272,026 (278)

EECDH to prevent MITM attack in cloud computing

open access: yesDigital Communications and Networks, 2019
Cloud computing has reached the peak of Gartner hype cycle, and now the focus of the whole telecom industry is the ability to scale data storage with minimal investment. But data privacy and communication issues will occur with the increment of the cloud
Shajina Anand, Varalakshmi Perumal
doaj   +1 more source

ALGEBRAIC AND PRACTICAL ASPECTS OF THE IMPLEMENTATION OF THE NEURAL NETWORK THRESHOLD SECRET SHARING SCHEME

open access: yesНаука. Инновации. Технологии, 2022
In the article is developing new theoretical approaches to the construction of the concept of active security on the points of an elliptic curve, which are based on the new scheme of perfect secret sharing on the points of an elliptic curve, permit the ...
Nikolay Ivanovich Chervyakov   +4 more
doaj  

On Isogenis of Elliptic curves

open access: yesGlasnik matematički, 2000
The necessary and sufficient conditions for elliptic curves over number field to be isogenous over two different quadratic extensions are done.
openaire   +4 more sources

Periods of elliptic surfaces with $p_g=q=1$

open access: yesForum of Mathematics, Sigma
We prove that the period mapping is dominant for elliptic surfaces over an elliptic curve with $12$ nodal fibers, and that its degree is larger than $1$ . This settles the final case of infinitesimal Torelli for a generic elliptic surface.
Philip Engel   +2 more
doaj   +1 more source

Phase-Image-Encryption-Based Elliptic Curve and Double-Random-Phase Encoding

open access: yesEngineering Proceedings
In this paper, we proposed an enhanced asymmetric cryptosystem scheme for image encryption using a combination of Elliptic Curve and Fourier transformations. Our proposed encryption and decryption process is highly secure with a smaller key size compared
Arabind Kumar, Sanjay Yadav, Tarul Garg
doaj   +1 more source

Home - About - Disclaimer - Privacy