Results 301 to 310 of about 2,214,189 (355)
Area-Time-Efficient Secure Comb Scalar Multiplication Architecture Based on Recoding. [PDF]
Zhang Z+6 more
europepmc +1 more source
A secure transaction and smart contract architecture for internet of vehicles. [PDF]
Lin HY.
europepmc +1 more source
Modeling and simulation of blood flow in unhealthy elliptic arteries with computational fluid dynamics approach. [PDF]
Wahab A, Asjad MI, Riaz MB, Haider JA.
europepmc +1 more source
An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs. [PDF]
Sudhakar T, Praveen R, Natarajan V.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Improved quantum circuits for elliptic curve discrete logarithms
IACR Cryptology ePrint Archive, 2020We present improved quantum circuits for elliptic curve scalar multiplication, the most costly component in Shor's algorithm to compute discrete logarithms in elliptic curve groups.
Thomas Häner+4 more
semanticscholar +1 more source
Elliptic Curve Cryptography Point Multiplication Core for Hardware Security Module
IEEE transactions on computers, 2020In today's technology, a sheer number of Internet of Things applications use hardware security modules for secure communications. The widely used algorithms in security modules, for example, digital signatures and key agreement, are based upon elliptic ...
Mohamad Ali Mehrabi+2 more
semanticscholar +1 more source
High-performance Implementation of Elliptic Curve Cryptography Using Vector Instructions
ACM Transactions on Mathematical Software, 2019Elliptic curve cryptosystems are considered an efficient alternative to conventional systems such as DSA and RSA. Recently, Montgomery and Edwards elliptic curves have been used to implement cryptosystems.
Armando Faz-Hernández+2 more
semanticscholar +1 more source
Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms
International Conference on the Theory and Application of Cryptology and Information Security, 2017We give precise quantum resource estimates for Shor's algorithm to compute discrete logarithms on elliptic curves over prime fields. The estimates are derived from a simulation of a Toffoli gate network for controlled elliptic curve point addition ...
M. Rötteler+3 more
semanticscholar +1 more source
Elliptic Curve Cryptosystems [PDF]
This paper deals with an implementation of Elliptic Curve Cryptosystem. Cryptography (or cryptology) from Greek word kryptos, "hidden, secret"; and graph, "writing" is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryp- tography include ATM
Dr.K.V.Durgaprasad Dr.K.V.Durgaprasad+1 more
openaire +1 more source