Results 271 to 280 of about 19,915 (293)
Elliptic Curve Cryptosystems [PDF]
This paper deals with an implementation of Elliptic Curve Cryptosystem. Cryptography (or cryptology) from Greek word kryptos, "hidden, secret"; and graph, "writing" is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryp- tography include ATM
Dr.K.V.Durgaprasad Dr.K.V.Durgaprasad+1 more
openaire +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
American Journal of Mathematics, 1931
Zwei ebene Kurven heißen perspektiv, wenn zwischen den Punkten der ersten und den Tangenten der zweiten eine \((1,1)\)-Korrespondenz derart hergestellt werden kann, daß jede Tangente der zweiten durch den entsprechenden Punkt der ersten läuft. So sind z. B.
openaire +3 more sources
Zwei ebene Kurven heißen perspektiv, wenn zwischen den Punkten der ersten und den Tangenten der zweiten eine \((1,1)\)-Korrespondenz derart hergestellt werden kann, daß jede Tangente der zweiten durch den entsprechenden Punkt der ersten läuft. So sind z. B.
openaire +3 more sources
2005
Elliptic curves constitute one of the main topics of this book. They have been proposed for applications in cryptography due to their fast group law and because so far no subexponential attack on their discrete logarithm problem (cf. Section 1.5) is known. We deal with security issues in later chapters and concentrate on the group arithmetic here.
Tanja Lange, Christophe Doche
openaire +2 more sources
Elliptic curves constitute one of the main topics of this book. They have been proposed for applications in cryptography due to their fast group law and because so far no subexponential attack on their discrete logarithm problem (cf. Section 1.5) is known. We deal with security issues in later chapters and concentrate on the group arithmetic here.
Tanja Lange, Christophe Doche
openaire +2 more sources
Computers & Graphics, 1994
Abstract The escape time behavior of a function associated with elliptic curves is studied via Julia sets and composite Mandelbrot sets. The Mandelbrot sets are composite in the sense that two critical points are followed.
Clifford A. Reiter+2 more
openaire +2 more sources
Abstract The escape time behavior of a function associated with elliptic curves is studied via Julia sets and composite Mandelbrot sets. The Mandelbrot sets are composite in the sense that two critical points are followed.
Clifford A. Reiter+2 more
openaire +2 more sources
Supersymmetric elliptic curves
Functional Analysis and Its Applications, 1987The note in question follows the line of Yu. Manin's book on supergeometry [\textit{Yu. I. Manin}, ``Gauge fields and complex geometry'' (Moskva 1984; Zbl 0576.53002)]. The supersymmetric (SUSY) structure is considered to be a reasonable supergeometric analog of the complex structure. A curve is a supermanifold of the dimension (1\(| 1)\).
openaire +3 more sources
Elliptic Curve Cryptography Engineering
Proceedings of the IEEE, 2006In recent years, elliptic curve cryptography (ECC) has gained widespread exposure and acceptance, and has already been included in many security standards. Engineering of ECC is a complex, interdisciplinary research field encompassing such fields as mathematics, computer science, and electrical engineering.
CILARDO, Alessandro+3 more
openaire +4 more sources
On the density of elliptic curves
Compositio Mathematica, 2001zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +3 more sources
2002
Describes in two pages the history of ECM, how it works at high level, improvements to the method, and some applications.
openaire +2 more sources
Describes in two pages the history of ECM, how it works at high level, improvements to the method, and some applications.
openaire +2 more sources
On Isogenis of Elliptic curves
Glasnik matematički, 2000The necessary and sufficient conditions for elliptic curves over number field to be isogenous over two different quadratic extensions are done.
openaire +2 more sources