Results 21 to 30 of about 145,858 (328)

Compact elliptic curve representations

open access: yesJournal of Mathematical Cryptology, 2011
Let y2 = x3 + ax + b be an elliptic curve over 𝔽p, p being a prime number greater than 3, and consider a, b ∈ [1, p]. In this paper, we study elliptic curve isomorphisms, with a view towards reduction in the size of elliptic curves coefficients. We first
Ciet Mathieu   +2 more
doaj   +1 more source

Secure Elliptic Curve Crypto-Processor for Real-Time IoT Applications

open access: yesEnergies, 2021
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low latencies are required, along with security requirements to protect the large number of attack surfaces to which IoT devices are exposed.
Stefano Di Matteo   +5 more
doaj   +1 more source

Torsion points with multiplicatively dependent coordinates on elliptic curves

open access: yes, 2020
In this paper, we study the finiteness problem of torsion points on an elliptic curve whose coordinates satisfy some multiplicative dependence relations.
Barroero, Fabrizio, Sha, Min
core   +1 more source

Nonlinearities in Elliptic Curve Authentication

open access: yesEntropy, 2014
In order to construct the border solutions for nonsupersingular elliptic curve equations, some common used models need to be adapted from linear treated cases for use in particular nonlinear cases.
Ramzi Alsaedi   +2 more
doaj   +1 more source

Regulators of rank one quadratic twists [PDF]

open access: yes, 2008
We investigate the regulators of elliptic curves with rank 1 in some families of quadratic twists of a fixed elliptic curve. In particular, we formulate some conjectures on the average size of these regulators.
Delaunay, Christophe   +1 more
core   +6 more sources

On the de Rham and p-adic realizations of the Elliptic Polylogarithm for CM elliptic curves [PDF]

open access: yes, 2008
In this paper, we give an explicit description of the de Rham and p-adic polylogarithms for elliptic curves using the Kronecker theta function. We prove in particular that when the elliptic curve has complex multiplication and good reduction at p, then ...
Bannai, Kenichi   +2 more
core   +2 more sources

Super elliptic curves [PDF]

open access: yesJournal of Geometry and Physics, 1995
A detailed study is made of super elliptic curves, namely super Riemann surfaces of genus one considered as algebraic varieties, particularly their relation with their Picard groups. This is the simplest setting in which to study the geometric consequences of the fact that certain cohomology groups of super Riemann surfaces are not freely generated ...
openaire   +2 more sources

On tea, donuts and non-commutative geometry [PDF]

open access: yesSurveys in Mathematics and its Applications, 2018
As many will agree, it feels good to complement a cup of tea by a donut or two. This sweet relationship is also a guiding principle of non-commutative geometry known as Serre Theorem.
Igor V. Nikolaev
doaj  

TWO-FACTOR AUTHENTICATION PROTOCOL IN ACCESS CONTROL SYSTEMS

open access: yesInformation and Telecommunication Sciences, 2023
Background. To ensure the protection of the biometric access control system used in unsecured communication channels, it is necessary to exclude the storage and transfer, transfer of biometric data as well as sequences generated on their basis. The paper
Ірина Стрелковська   +2 more
doaj   +1 more source

Multi-Functional Resource-Constrained Elliptic Curve Cryptographic Processor

open access: yesIEEE Access, 2023
With the rising data evolution, the demand for secured communications over networks is rising immensely. Elliptic Curve Cryptography (ECC) provides an attractive solution to fulfill the requirements of modern network applications.
Binh Kieu Do-Nguyen   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy