Results 11 to 20 of about 136,439 (162)
Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols
Kleptography is the study of pilfering secure data secretly and subliminally. The concept of inserting backdoors was introduced two decades ago by Young and Yung. However, still it is a serious threat for modern cryptography.
Anum Sajjad+5 more
doaj +1 more source
Elliptic curve cryptography includes symmetric key cryptography systems that base their security on mathematical problems of elliptic curves. There are several ways that can be used to define the elliptic curve equation that depends on the infinite field
Juhari Juhari, Mohamad Febry Andrean
doaj +1 more source
Fault attacks have been proved for efficiently breaking hardware‐based elliptic curve cryptosystems. One way for fighting against fault attacks is to design the core multiplier circuit of elliptic curve cryptosystem with concurrent error detection ...
Che Wun Chiou+6 more
doaj +1 more source
Twisted Edwards Elliptic Curves for Zero-Knowledge Circuits
Circuit-based zero-knowledge proofs have arose as a solution to the implementation of privacy in blockchain applications, and to current scalability problems that blockchains suffer from.
Marta Bellés-Muñoz+4 more
doaj +1 more source
Combined small subgroups and side-channel attack on elliptic curves with cofactor divisible by 2m [PDF]
Nowadays, alternative models of elliptic curves like Montgomery, Edwards, twisted Edwards, Hessian, twisted Hessian, Huff’s curves and many others are very popular and many people use them in cryptosystems which are based on elliptic curve cryptography ...
Michał Wrońska
doaj +1 more source
Legendre elliptic curves over finite fields [PDF]
We show that every elliptic curve over a finite field of odd characteristic whose number of rational points is divisible by 4 is isogenous to an elliptic curve in Legendre form, with the sole exception of a minimal respectively maximal elliptic curve. We
Auer, Roland, Top, Jaap
core +3 more sources
The positive integral points on the elliptic curve 𝒚𝟐=𝟕𝒑𝒙(𝒙𝟐+𝟖) [PDF]
The integral point of elliptic curve is a very important problem in both elementary number theory and analytic number theory. In recent years, scholars have paid great attention to solving the problem of positive integer points on elliptic curve 𝑦2 = 𝑘 ...
Xiancun Du, Zhao Jianhong, Yang Lixing
doaj +1 more source
Application of mathematical optimization in elliptic curve arithmetic
Currently, a lot of standardized elliptic curve cryptographic algorithms are widely used. Due to the constantly increasing execution speed demands, implementation optimization problem become actual.
Alexander Igorevich Skripko+1 more
doaj +1 more source
Secure Elliptic Curve Crypto-Processor for Real-Time IoT Applications
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low latencies are required, along with security requirements to protect the large number of attack surfaces to which IoT devices are exposed.
Stefano Di Matteo+5 more
doaj +1 more source
Quantum resource estimates for computing elliptic curve discrete logarithms [PDF]
We give precise quantum resource estimates for Shor's algorithm to compute discrete logarithms on elliptic curves over prime fields. The estimates are derived from a simulation of a Toffoli gate network for controlled elliptic curve point addition ...
A Joux+32 more
core +2 more sources