Results 321 to 330 of about 2,214,189 (355)
Some of the next articles are maybe not open access.
2005
Elliptic curves constitute one of the main topics of this book. They have been proposed for applications in cryptography due to their fast group law and because so far no subexponential attack on their discrete logarithm problem (cf. Section 1.5) is known. We deal with security issues in later chapters and concentrate on the group arithmetic here.
Tanja Lange, Christophe Doche
openaire +2 more sources
Elliptic curves constitute one of the main topics of this book. They have been proposed for applications in cryptography due to their fast group law and because so far no subexponential attack on their discrete logarithm problem (cf. Section 1.5) is known. We deal with security issues in later chapters and concentrate on the group arithmetic here.
Tanja Lange, Christophe Doche
openaire +2 more sources
Elliptic Curve Cryptography Engineering
Proceedings of the IEEE, 2006In recent years, elliptic curve cryptography (ECC) has gained widespread exposure and acceptance, and has already been included in many security standards. Engineering of ECC is a complex, interdisciplinary research field encompassing such fields as mathematics, computer science, and electrical engineering.
CILARDO, Alessandro+3 more
openaire +4 more sources
A Survey on Elliptic Curve Cryptography
, 2015: Elliptic curve cryptography (ECC) is the most efficient public key encryption scheme based on elliptic curve concepts that can be used to create faster, smaller, and efficient cryptographic keys.
K. Mehta, Dharmesh G. Patel
semanticscholar +1 more source
Implementation of elliptic curve digital signature algorithm (ECDSA)
Global Summit on Computer & Information Technology, 2014The elliptic curve cryptosystems are paid more and more attention because its key string is shorter and its security is better than other public cryptosystems. The digital signature system based on elliptic curve (ECDSA) is one of the main stream digital
Abdessalem Abidi+2 more
semanticscholar +1 more source
IEEE Transactions on Circuits and Systems Part 1: Regular Papers, 2014
Recently, considerable research has been performed in cryptography and security to optimize the area, power, timing, and energy needed for the point multiplication operations over binary elliptic curves.
R. Azarderakhsh+2 more
semanticscholar +1 more source
Recently, considerable research has been performed in cryptography and security to optimize the area, power, timing, and energy needed for the point multiplication operations over binary elliptic curves.
R. Azarderakhsh+2 more
semanticscholar +1 more source
Efficient Elliptic Curve Point Multiplication Using Digit-Serial Binary Field Operations
IEEE transactions on industrial electronics (1982. Print), 2013This paper details the design of a new high-speed point multiplier for elliptic curve cryptography using either field-programmable gate array or application-specified integrated circuit technology.
G. Sutter, J. Deschamps, J. Imaña
semanticscholar +1 more source
Request for Comments, 2013
This document defines a deterministic digital signature generation procedure. Such signatures are compatible with standard Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures and can be processed ...
T. Pornin
semanticscholar +1 more source
This document defines a deterministic digital signature generation procedure. Such signatures are compatible with standard Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures and can be processed ...
T. Pornin
semanticscholar +1 more source
Holomorphic Triples on Elliptic Curves
Results in Mathematics, 2007Here we study the α-stability for holomorphic triples over curves of genus g = 1. We provide necessary and sufficient conditions for the moduli space of α-stable triples to be non-empy and, in these cases, we show that it is smooth and irreducible.
PASOTTI, Stefano, PRANTIL F.
openaire +4 more sources
2002
Describes in two pages the history of ECM, how it works at high level, improvements to the method, and some applications.
openaire +6 more sources
Describes in two pages the history of ECM, how it works at high level, improvements to the method, and some applications.
openaire +6 more sources
The State of Elliptic Curve Cryptography
Des. Codes Cryptogr., 2000N. Koblitz, A. Menezes, S. Vanstone
semanticscholar +1 more source