Results 21 to 30 of about 2,185,432 (340)
The positive integral points on the elliptic curve 𝒚𝟐=𝟕𝒑𝒙(𝒙𝟐+𝟖) [PDF]
The integral point of elliptic curve is a very important problem in both elementary number theory and analytic number theory. In recent years, scholars have paid great attention to solving the problem of positive integer points on elliptic curve 𝑦2 = 𝑘 ...
Xiancun Du, Zhao Jianhong, Yang Lixing
doaj +1 more source
A detailed study is made of super elliptic curves, namely super Riemann surfaces of genus one considered as algebraic varieties, particularly their relation with their Picard groups. This is the simplest setting in which to study the geometric consequences of the fact that certain cohomology groups of super Riemann surfaces are not freely generated ...
openaire +2 more sources
Compact elliptic curve representations
Let y2 = x3 + ax + b be an elliptic curve over 𝔽p, p being a prime number greater than 3, and consider a, b ∈ [1, p]. In this paper, we study elliptic curve isomorphisms, with a view towards reduction in the size of elliptic curves coefficients. We first
Ciet Mathieu +2 more
doaj +1 more source
An Image Encryption Method Based on Elliptic Curve Elgamal Encryption and Chaotic Systems
Due to the potential security problem about key management and distribution for the symmetric image encryption schemes, a novel asymmetric image encryption method is proposed in this paper, which is based on the elliptic curve ElGamal (EC-ElGamal ...
Yuling Luo +3 more
semanticscholar +1 more source
Nonlinearities in Elliptic Curve Authentication
In order to construct the border solutions for nonsupersingular elliptic curve equations, some common used models need to be adapted from linear treated cases for use in particular nonlinear cases.
Ramzi Alsaedi +2 more
doaj +1 more source
Fast and simple constant-time hashing to the BLS12-381 elliptic curve
Pairing-friendly elliptic curves in the Barreto-Lynn-Scott family are seeing a resurgence in popularity because of the recent result of Kim and Barbulescu that improves attacks against other pairing-friendly curve families.
R. Wahby, D. Boneh
semanticscholar +1 more source
On tea, donuts and non-commutative geometry [PDF]
As many will agree, it feels good to complement a cup of tea by a donut or two. This sweet relationship is also a guiding principle of non-commutative geometry known as Serre Theorem.
Igor V. Nikolaev
doaj
TWO-FACTOR AUTHENTICATION PROTOCOL IN ACCESS CONTROL SYSTEMS
Background. To ensure the protection of the biometric access control system used in unsecured communication channels, it is necessary to exclude the storage and transfer, transfer of biometric data as well as sequences generated on their basis. The paper
Ірина Стрелковська +2 more
doaj +1 more source
Multi-Functional Resource-Constrained Elliptic Curve Cryptographic Processor
With the rising data evolution, the demand for secured communications over networks is rising immensely. Elliptic Curve Cryptography (ECC) provides an attractive solution to fulfill the requirements of modern network applications.
Binh Kieu Do-Nguyen +4 more
doaj +1 more source
Methods for using elliptic curves in cryptography [PDF]
Elliptic Curve Cryptography (ECC), a significant modern cryptography, is more secure and robust than most others due to its construction using an elliptic curve and the application of mathematical operations for encryption and key generation. Furthermore,
Obukhov Vadim +4 more
doaj +1 more source

