Results 321 to 330 of about 2,214,189 (355)
Some of the next articles are maybe not open access.

Arithmetic of Elliptic Curves

2005
Elliptic curves constitute one of the main topics of this book. They have been proposed for applications in cryptography due to their fast group law and because so far no subexponential attack on their discrete logarithm problem (cf. Section 1.5) is known. We deal with security issues in later chapters and concentrate on the group arithmetic here.
Tanja Lange, Christophe Doche
openaire   +2 more sources

Elliptic Curve Cryptography Engineering

Proceedings of the IEEE, 2006
In recent years, elliptic curve cryptography (ECC) has gained widespread exposure and acceptance, and has already been included in many security standards. Engineering of ECC is a complex, interdisciplinary research field encompassing such fields as mathematics, computer science, and electrical engineering.
CILARDO, Alessandro   +3 more
openaire   +4 more sources

A Survey on Elliptic Curve Cryptography

, 2015
: Elliptic curve cryptography (ECC) is the most efficient public key encryption scheme based on elliptic curve concepts that can be used to create faster, smaller, and efficient cryptographic keys.
K. Mehta, Dharmesh G. Patel
semanticscholar   +1 more source

Implementation of elliptic curve digital signature algorithm (ECDSA)

Global Summit on Computer & Information Technology, 2014
The elliptic curve cryptosystems are paid more and more attention because its key string is shorter and its security is better than other public cryptosystems. The digital signature system based on elliptic curve (ECDSA) is one of the main stream digital
Abdessalem Abidi   +2 more
semanticscholar   +1 more source

Efficient Algorithm and Architecture for Elliptic Curve Cryptography for Extremely Constrained Secure Applications

IEEE Transactions on Circuits and Systems Part 1: Regular Papers, 2014
Recently, considerable research has been performed in cryptography and security to optimize the area, power, timing, and energy needed for the point multiplication operations over binary elliptic curves.
R. Azarderakhsh   +2 more
semanticscholar   +1 more source

Efficient Elliptic Curve Point Multiplication Using Digit-Serial Binary Field Operations

IEEE transactions on industrial electronics (1982. Print), 2013
This paper details the design of a new high-speed point multiplier for elliptic curve cryptography using either field-programmable gate array or application-specified integrated circuit technology.
G. Sutter, J. Deschamps, J. Imaña
semanticscholar   +1 more source

Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)

Request for Comments, 2013
This document defines a deterministic digital signature generation procedure. Such signatures are compatible with standard Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures and can be processed ...
T. Pornin
semanticscholar   +1 more source

Holomorphic Triples on Elliptic Curves

Results in Mathematics, 2007
Here we study the α-stability for holomorphic triples over curves of genus g = 1. We provide necessary and sufficient conditions for the moduli space of α-stable triples to be non-empy and, in these cases, we show that it is smooth and irreducible.
PASOTTI, Stefano, PRANTIL F.
openaire   +4 more sources

The Elliptic Curve Method

2002
Describes in two pages the history of ECM, how it works at high level, improvements to the method, and some applications.
openaire   +6 more sources

The State of Elliptic Curve Cryptography

Des. Codes Cryptogr., 2000
N. Koblitz, A. Menezes, S. Vanstone
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy