Results 11 to 20 of about 2,185,432 (340)
Elliptic curve cryptography includes symmetric key cryptography systems that base their security on mathematical problems of elliptic curves. There are several ways that can be used to define the elliptic curve equation that depends on the infinite field
Juhari Juhari, Mohamad Febry Andrean
doaj +1 more source
Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols
Kleptography is the study of pilfering secure data secretly and subliminally. The concept of inserting backdoors was introduced two decades ago by Young and Yung. However, still it is a serious threat for modern cryptography.
Anum Sajjad +5 more
doaj +1 more source
Comparative Study of Digital Signature Standards Based on Discrete Logarithm [PDF]
As Chinese state encryption administration is seeking the next generation of Digital Signature Standard(DSS),this paper analyzes and compares seven DSS listed in ISO/IEC 14888-3 and SM2 which are based on Discrete Logarithm Problem(DLP) or Elliptic Curve
FENG Zeyu,GONG Boru,ZHAO Yunlei
doaj +1 more source
Speeding-Up Elliptic Curve Cryptography Algorithms
In recent decades there has been an increasing interest in Elliptic curve cryptography (ECC) and, especially, the Elliptic Curve Digital Signature Algorithm (ECDSA) in practice.
Diana Maimuţ, Alexandru Cristian Matei
doaj +1 more source
Cryptanalysis and improvement of an elliptic curve based signcryption scheme for firewalls. [PDF]
Zia M, Ali R.
europepmc +3 more sources
Elliptic curve and k-Fibonacci-like sequence
In this paper, we will introduce a modified k-Fibonacci-like sequence defined on an elliptic curve and prove Binet’s formula for this sequence. Moreover, we give a new encryption scheme using this sequence.
Zakariae Cheddour +2 more
doaj +1 more source
Combined small subgroups and side-channel attack on elliptic curves with cofactor divisible by 2m [PDF]
Nowadays, alternative models of elliptic curves like Montgomery, Edwards, twisted Edwards, Hessian, twisted Hessian, Huff’s curves and many others are very popular and many people use them in cryptosystems which are based on elliptic curve cryptography ...
Michał Wrońska
doaj +1 more source
Fault attacks have been proved for efficiently breaking hardware‐based elliptic curve cryptosystems. One way for fighting against fault attacks is to design the core multiplier circuit of elliptic curve cryptosystem with concurrent error detection ...
Che Wun Chiou +6 more
doaj +1 more source
Twisted Edwards Elliptic Curves for Zero-Knowledge Circuits
Circuit-based zero-knowledge proofs have arose as a solution to the implementation of privacy in blockchain applications, and to current scalability problems that blockchains suffer from.
Marta Bellés-Muñoz +4 more
doaj +1 more source
Application of mathematical optimization in elliptic curve arithmetic
Currently, a lot of standardized elliptic curve cryptographic algorithms are widely used. Due to the constantly increasing execution speed demands, implementation optimization problem become actual.
Alexander Igorevich Skripko +1 more
doaj +1 more source

