Results 301 to 310 of about 2,214,189 (355)

Area-Time-Efficient Secure Comb Scalar Multiplication Architecture Based on Recoding. [PDF]

open access: yesMicromachines (Basel)
Zhang Z   +6 more
europepmc   +1 more source

The mirror Clemens-Schmid sequence. [PDF]

open access: yesEur J Math
Doran CF, Thompson A.
europepmc   +1 more source

Improved quantum circuits for elliptic curve discrete logarithms

IACR Cryptology ePrint Archive, 2020
We present improved quantum circuits for elliptic curve scalar multiplication, the most costly component in Shor's algorithm to compute discrete logarithms in elliptic curve groups.
Thomas Häner   +4 more
semanticscholar   +1 more source

Elliptic Curve Cryptography Point Multiplication Core for Hardware Security Module

IEEE transactions on computers, 2020
In today's technology, a sheer number of Internet of Things applications use hardware security modules for secure communications. The widely used algorithms in security modules, for example, digital signatures and key agreement, are based upon elliptic ...
Mohamad Ali Mehrabi   +2 more
semanticscholar   +1 more source

High-performance Implementation of Elliptic Curve Cryptography Using Vector Instructions

ACM Transactions on Mathematical Software, 2019
Elliptic curve cryptosystems are considered an efficient alternative to conventional systems such as DSA and RSA. Recently, Montgomery and Edwards elliptic curves have been used to implement cryptosystems.
Armando Faz-Hernández   +2 more
semanticscholar   +1 more source

Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms

International Conference on the Theory and Application of Cryptology and Information Security, 2017
We give precise quantum resource estimates for Shor's algorithm to compute discrete logarithms on elliptic curves over prime fields. The estimates are derived from a simulation of a Toffoli gate network for controlled elliptic curve point addition ...
M. Rötteler   +3 more
semanticscholar   +1 more source

Elliptic Curve Cryptosystems [PDF]

open access: possibleIndian Journal of Applied Research, 2011
This paper deals with an implementation of Elliptic Curve Cryptosystem. Cryptography (or cryptology) from Greek word kryptos, "hidden, secret"; and graph, "writing" is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryp- tography include ATM
Dr.K.V.Durgaprasad Dr.K.V.Durgaprasad   +1 more
openaire   +1 more source

Home - About - Disclaimer - Privacy