Results 201 to 210 of about 2,272,026 (278)
An authorizable and preprocessable data transmission scheme based on elliptic curves. [PDF]
Zhu Z +5 more
europepmc +1 more source
Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms [PDF]
We give precise quantum resource estimates for Shor's algorithm to compute discrete logarithms on elliptic curves over prime fields. The estimates are derived from a simulation of a Toffoli gate network for controlled elliptic curve point addition ...
M. Rötteler +3 more
semanticscholar +4 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Improved quantum circuits for elliptic curve discrete logarithms
IACR Cryptology ePrint Archive, 2020We present improved quantum circuits for elliptic curve scalar multiplication, the most costly component in Shor's algorithm to compute discrete logarithms in elliptic curve groups.
Thomas Häner +4 more
semanticscholar +1 more source
Elliptic Curve Cryptography Point Multiplication Core for Hardware Security Module
IEEE transactions on computers, 2020In today's technology, a sheer number of Internet of Things applications use hardware security modules for secure communications. The widely used algorithms in security modules, for example, digital signatures and key agreement, are based upon elliptic ...
Mohamad Ali Mehrabi +2 more
semanticscholar +1 more source
High-performance Implementation of Elliptic Curve Cryptography Using Vector Instructions
ACM Transactions on Mathematical Software, 2019Elliptic curve cryptosystems are considered an efficient alternative to conventional systems such as DSA and RSA. Recently, Montgomery and Edwards elliptic curves have been used to implement cryptosystems.
Armando Faz-Hernández +2 more
semanticscholar +1 more source
Elliptic Curve Cryptosystems [PDF]
This paper deals with an implementation of Elliptic Curve Cryptosystem. Cryptography (or cryptology) from Greek word kryptos, "hidden, secret"; and graph, "writing" is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryp- tography include ATM
Dr.K.V.Durgaprasad Dr.K.V.Durgaprasad +1 more
openaire +1 more source
Journal of Econometrics, 1989
A family of elliptic Lorenz curves is proposed for fitting grouped income data. The associated distribution and density functions are displayed together with the Gini indices. Estimation procedures are discussed. Comparisons are made with alternative models using Australian 1967--68 income data.
JoséA. Villaseñor, Barry C. Arnold
openaire +3 more sources
A family of elliptic Lorenz curves is proposed for fitting grouped income data. The associated distribution and density functions are displayed together with the Gini indices. Estimation procedures are discussed. Comparisons are made with alternative models using Australian 1967--68 income data.
JoséA. Villaseñor, Barry C. Arnold
openaire +3 more sources
2020
Elliptic-curve cryptography (ECC) represents a public-key cryptography approach. It is based on the algebraic structure of elliptic curves over finite fields. ECC can be used in cryptography applications and primitives, such as key agreement, digital signature, and pseudo-random generators.
Marius Iulian Mihailescu +1 more
openaire +2 more sources
Elliptic-curve cryptography (ECC) represents a public-key cryptography approach. It is based on the algebraic structure of elliptic curves over finite fields. ECC can be used in cryptography applications and primitives, such as key agreement, digital signature, and pseudo-random generators.
Marius Iulian Mihailescu +1 more
openaire +2 more sources

