Results 1 to 10 of about 21,677 (136)

ELLIPTIC CURVE CRYPTOGRAPHY [PDF]

open access: yesScience-based technologies, 2014
In the present day, security is essential for sending and receiving information. There are always stories about bank accounts being hacked, credit card numbers being stolen, and secret information being decoded.
O. O. Meleshko, O. O. Kovalskiy
openaire   +3 more sources

Compiler Assisted Elliptic Curve Cryptography [PDF]

open access: yes, 2007
Although cryptographic software implementation is often performed by expert programmers, the range of performance and security driven options, as well as more mundane software engineering issues, still make it a challenge. The use of domain specific language and compiler techniques to assist in description and optimisation of cryptographic software is ...
Barbosa, Manuel B M   +2 more
openaire   +5 more sources

Elliptic curve cryptography [PDF]

open access: yesUbiquity, 2008
This paper describes the Elliptic Curve Cryptography algorithm and its suitability for smart cards.
Vivek Kapoor   +2 more
  +4 more sources

Efficient Unified Arithmetic for Hardware Cryptography [PDF]

open access: yes, 2008
The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF(q), where q = pk and p is a prime integer, have several applications in cryptography, such as RSA algorithm, Diffie-Hellman key exchange algorithm [1 ...
Koc, Cetin Kaya   +3 more
core   +2 more sources

Implementasi Dan Pengukuran Kinerja Operasi Aritmatika Finite Field Berbasis Polinomial Biner [PDF]

open access: yes, 2015
Cryptography is one of the security techniques that secure information confidentiality and information integrity while electronic transaction processing.
Rahardjo, B. (Budi)   +1 more
core   +2 more sources

I2PA : An Efficient ABC for IoT [PDF]

open access: yes, 2019
Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preserving and lightweight cryptography.
Ciss, Abdoul Aziz   +2 more
core   +3 more sources

Efficient algorithms for pairing-based cryptosystems [PDF]

open access: yes, 2002
We describe fast new algorithms to implement recent cryptosystems based on the Tate pairing. In particular, our techniques improve pairing evaluation speed by a factor of about 55 compared to previously known methods in characteristic 3, and attain ...
A. Joux   +13 more
core   +5 more sources

Crypto-test-lab for security validation of ECC co-processor test infrastructure [PDF]

open access: yes, 2018
© 20xx IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting /republishing this material for advertising or promotional purposes, creating new ...
Lupón Roses, Emilio   +2 more
core   +1 more source

Isogeny volcanoes

open access: yes, 2013
The remarkable structure and computationally explicit form of isogeny graphs of elliptic curves over a finite field has made them an important tool for computational number theorists and practitioners of elliptic curve cryptography. This expository paper
Sutherland, Andrew V.
core   +1 more source

Isogeny-based post-quantum key exchange protocols [PDF]

open access: yes, 2020
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH), a post-quantum key exchange protocol which security lies on the isogeny-finding problem between supersingular elliptic curves.
Sorinas Capdevila, Ernest
core  

Home - About - Disclaimer - Privacy