Secure ECDSA SRAM-PUF Based on Universal Single/Double Scalar Multiplication Architecture
Physically unclonable functions (PUFs) are crucial for enhancing cybersecurity by providing unique, intrinsic identifiers for electronic devices, thus ensuring their authenticity and preventing unauthorized cloning.
Jingqi Zhang +8 more
doaj +1 more source
Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems. [PDF]
Tidrea A, Korodi A, Silea I.
europepmc +1 more source
An elementary proof of the Riemann hypothesis for an elliptic curve over a finite field [PDF]
Horst G. Zimmer
openalex +1 more source
Computing the cardinality of CM elliptic curves using torsion points
Let E be an elliptic curve having complex multiplication by a given quadratic order of an imaginary quadratic field K. The field of definition of E is the ring class field Omega of the order.
Morain, F.
core +2 more sources
Biased 2×2 periodic Aztec diamond and an elliptic curve. [PDF]
Borodin A, Duits M.
europepmc +1 more source
Two-Descent for Elliptic Curves in Characteristic Two [PDF]
Kenneth Kramer
openalex +1 more source
Lightweight Authentication Mechanism for Industrial IoT Environment Combining Elliptic Curve Cryptography and Trusted Token. [PDF]
Yang YS +5 more
europepmc +1 more source
Elliptic Curve-Based Query Authentication Protocol for IoT Devices Aided by Blockchain. [PDF]
Nita SL, Mihailescu MI.
europepmc +1 more source
Hyperbolicity of surfaces modulo rational and elliptic curves [PDF]
Caroline Grant
openalex +1 more source

