Results 61 to 70 of about 14,447 (145)

An efficient method to generate elliptic curves

open access: yesTongxin xuebao, 2001
In this paper, an efficient method to generate elliptic curves for public key cryptosystems based on discrete logarithm problem is presented. Usually, to resist possible attacks, such as MOV reduction, public key cryptosystems based on elliptic curve E ...
ZHOU Chang-ying1   +2 more
doaj   +2 more sources

EFFICIENCY AND EFFECTIVENESS ANALYSIS OVER ECC-BASED DIRECT AND INDIRECT AUTHENTICATION PROTOCOLS: AN EXTENSIVE COMPARATIVE STUDY [PDF]

open access: yesICTACT Journal on Communication Technology, 2012
Elliptic curve cryptography finds enormous applications because of its security offering using the remarkable property of elliptic curve. The Elliptic curve cryptography finds enormous applications in almost all the emerging areas.
K. Thilagavathi, P.G.Rajeswari
doaj  

Huff’s Model for Elliptic Curves [PDF]

open access: yes, 2010
This paper revisits a model for elliptic curves over ℚ introduced by Huff in 1948 to study a diophantine problem. Huff’s model readily extends over fields of odd characteristic. Every elliptic curve over such a field and containing a copy of ℤ/4ℤ ×ℤ/2ℤ is birationally equivalent to a Huff curve over the original field.
Joye, Marc   +2 more
openaire   +3 more sources

Elliptic Curve Cryptography with Machine Learning

open access: yesCryptography
Elliptic Curve Cryptography (ECC) is a technology based on the arithmetic of elliptic curves used to build strong and efficient cryptosystems and infrastructures. Several ECC systems, such as the Diffie–Hellman key exchange and the Elliptic Curve Digital
Jihane Jebrane   +3 more
doaj   +1 more source

Elliptic curves and spin

open access: yes
It is interesting to recall that, in connexion with a lecture by Prof. R. Fueter at the 1932 Zurich Congress, Hilbert asserted that the theory of complex multiplication of elliptic modular functions which forms a powerful link between number theory and analysis, is not only the most beautiful part of mathematics but also of all science.
Koymans, Peter, Uttenthal, Peter Vang
openaire   +3 more sources

Elliptic curves on Abelian varieties [PDF]

open access: yesIllinois Journal of Mathematics, 2015
Given a principally polarized abelian variety $(A, )$, we give a characterization of all elliptic curves that lie on $A$ in terms of intersection numbers of divisor classes in its N ron-Severi group.
openaire   +4 more sources

Design System of the High Order Elliptic Gear Pair Pitch Curve based on the SolidWorks

open access: yesJixie chuandong, 2017
In order to improve the problem of design calculation complex and manufacturing difficulty of non- circular gear pair,taking the high order elliptic non- circular gears as the research object,according to the principle of non- circular gear meshing,the ...
Yan Zhaochao   +3 more
doaj  

Secure ECDSA SRAM-PUF Based on Universal Single/Double Scalar Multiplication Architecture

open access: yesMicromachines
Physically unclonable functions (PUFs) are crucial for enhancing cybersecurity by providing unique, intrinsic identifiers for electronic devices, thus ensuring their authenticity and preventing unauthorized cloning.
Jingqi Zhang   +8 more
doaj   +1 more source

Home - About - Disclaimer - Privacy