Results 21 to 30 of about 135,614 (263)

Compact elliptic curve representations

open access: yesJournal of Mathematical Cryptology, 2011
Let y2 = x3 + ax + b be an elliptic curve over 𝔽p, p being a prime number greater than 3, and consider a, b ∈ [1, p]. In this paper, we study elliptic curve isomorphisms, with a view towards reduction in the size of elliptic curves coefficients. We first
Ciet Mathieu   +2 more
doaj   +1 more source

Nonlinearities in Elliptic Curve Authentication

open access: yesEntropy, 2014
In order to construct the border solutions for nonsupersingular elliptic curve equations, some common used models need to be adapted from linear treated cases for use in particular nonlinear cases.
Ramzi Alsaedi   +2 more
doaj   +1 more source

A Las Vegas algorithm to solve the elliptic curve discrete logarithm problem [PDF]

open access: yes, 2018
In this paper, we describe a new Las Vegas algorithm to solve the elliptic curve discrete logarithm problem. The algorithm depends on a property of the group of rational points of an elliptic curve and is thus not a generic algorithm.
Mahalanobis, Ayan, Mallick, Vivek
core   +2 more sources

A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY

open access: yesElectrica, 2006
As the importance of information increases, many various methods are being used for keeping this information and trasfering confidently. One of these methods is cryptographic algorithms.
M.Ali AYDIN, G.Zeynep AYDIN
doaj   +2 more sources

On tea, donuts and non-commutative geometry [PDF]

open access: yesSurveys in Mathematics and its Applications, 2018
As many will agree, it feels good to complement a cup of tea by a donut or two. This sweet relationship is also a guiding principle of non-commutative geometry known as Serre Theorem.
Igor V. Nikolaev
doaj  

Elliptic nets and elliptic curves

open access: yes, 2010
An elliptic divisibility sequence is an integer recurrence sequence associated to an elliptic curve over the rationals together with a rational point on that curve.
Ayad   +5 more
core   +1 more source

TWO-FACTOR AUTHENTICATION PROTOCOL IN ACCESS CONTROL SYSTEMS

open access: yesInformation and Telecommunication Sciences, 2023
Background. To ensure the protection of the biometric access control system used in unsecured communication channels, it is necessary to exclude the storage and transfer, transfer of biometric data as well as sequences generated on their basis. The paper
Ірина Стрелковська   +2 more
doaj   +1 more source

Multi-Functional Resource-Constrained Elliptic Curve Cryptographic Processor

open access: yesIEEE Access, 2023
With the rising data evolution, the demand for secured communications over networks is rising immensely. Elliptic Curve Cryptography (ECC) provides an attractive solution to fulfill the requirements of modern network applications.
Binh Kieu Do-Nguyen   +4 more
doaj   +1 more source

Lam\'e polynomials, hyperelliptic reductions and Lam\'e band structure

open access: yes, 2004
The band structure of the Lam\'e equation, viewed as a one-dimensional Schr\"odinger equation with a periodic potential, is studied. At integer values of the degree parameter l, the dispersion relation is reduced to the l=1 dispersion relation, and a ...
Arscott F.M   +11 more
core   +1 more source

Torsion points with multiplicatively dependent coordinates on elliptic curves

open access: yes, 2020
In this paper, we study the finiteness problem of torsion points on an elliptic curve whose coordinates satisfy some multiplicative dependence relations.
Barroero, Fabrizio, Sha, Min
core   +1 more source

Home - About - Disclaimer - Privacy