Results 21 to 30 of about 135,614 (263)
Compact elliptic curve representations
Let y2 = x3 + ax + b be an elliptic curve over 𝔽p, p being a prime number greater than 3, and consider a, b ∈ [1, p]. In this paper, we study elliptic curve isomorphisms, with a view towards reduction in the size of elliptic curves coefficients. We first
Ciet Mathieu +2 more
doaj +1 more source
Nonlinearities in Elliptic Curve Authentication
In order to construct the border solutions for nonsupersingular elliptic curve equations, some common used models need to be adapted from linear treated cases for use in particular nonlinear cases.
Ramzi Alsaedi +2 more
doaj +1 more source
A Las Vegas algorithm to solve the elliptic curve discrete logarithm problem [PDF]
In this paper, we describe a new Las Vegas algorithm to solve the elliptic curve discrete logarithm problem. The algorithm depends on a property of the group of rational points of an elliptic curve and is thus not a generic algorithm.
Mahalanobis, Ayan, Mallick, Vivek
core +2 more sources
A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY
As the importance of information increases, many various methods are being used for keeping this information and trasfering confidently. One of these methods is cryptographic algorithms.
M.Ali AYDIN, G.Zeynep AYDIN
doaj +2 more sources
On tea, donuts and non-commutative geometry [PDF]
As many will agree, it feels good to complement a cup of tea by a donut or two. This sweet relationship is also a guiding principle of non-commutative geometry known as Serre Theorem.
Igor V. Nikolaev
doaj
Elliptic nets and elliptic curves
An elliptic divisibility sequence is an integer recurrence sequence associated to an elliptic curve over the rationals together with a rational point on that curve.
Ayad +5 more
core +1 more source
TWO-FACTOR AUTHENTICATION PROTOCOL IN ACCESS CONTROL SYSTEMS
Background. To ensure the protection of the biometric access control system used in unsecured communication channels, it is necessary to exclude the storage and transfer, transfer of biometric data as well as sequences generated on their basis. The paper
Ірина Стрелковська +2 more
doaj +1 more source
Multi-Functional Resource-Constrained Elliptic Curve Cryptographic Processor
With the rising data evolution, the demand for secured communications over networks is rising immensely. Elliptic Curve Cryptography (ECC) provides an attractive solution to fulfill the requirements of modern network applications.
Binh Kieu Do-Nguyen +4 more
doaj +1 more source
Lam\'e polynomials, hyperelliptic reductions and Lam\'e band structure
The band structure of the Lam\'e equation, viewed as a one-dimensional Schr\"odinger equation with a periodic potential, is studied. At integer values of the degree parameter l, the dispersion relation is reduced to the l=1 dispersion relation, and a ...
Arscott F.M +11 more
core +1 more source
Torsion points with multiplicatively dependent coordinates on elliptic curves
In this paper, we study the finiteness problem of torsion points on an elliptic curve whose coordinates satisfy some multiplicative dependence relations.
Barroero, Fabrizio, Sha, Min
core +1 more source

