Results 101 to 110 of about 21,677 (136)
Some of the next articles are maybe not open access.
Elliptic Curves in Cryptography
1999In the past few years elliptic curve cryptography has moved from a fringe activity to a major challenger to the dominant RSA/DSA systems. Elliptic curves offer major advances on older systems such as increased speed, less memory and smaller key sizes. As digital signatures become more and more important in the commercial world the use of elliptic curve-
Blake, I F, Seroussi, G, Smart, N P
openaire +1 more source
2018
Just the same as DLP, ECDLP (Elliptic Curve Discrete Logarithm Problem) is also hard to solve, so it is natural to think about designing cryptographic system based on ECDLP. In this chapter we shall first discuss the Elliptic Curve Discrete Logarithm Problem (ECDLP) and the classical solutions to ECDLP, then we shall present some popular and useful ...
openaire +1 more source
Just the same as DLP, ECDLP (Elliptic Curve Discrete Logarithm Problem) is also hard to solve, so it is natural to think about designing cryptographic system based on ECDLP. In this chapter we shall first discuss the Elliptic Curve Discrete Logarithm Problem (ECDLP) and the classical solutions to ECDLP, then we shall present some popular and useful ...
openaire +1 more source
Elliptic curve cryptography in Java
2015 IEEE International Conference on Intelligence and Security Informatics (ISI), 2015The strength of public key cryptography utilizing Elliptic Curves relies on the difficulty of computing discrete logarithms in a finite field. Other public key cryptographic algorithms, such as RSA, rely on the difficulty of integer factorization.
openaire +1 more source
Elliptic Curves and Cryptography
2003In the earlier cryptography articles, we have seen classical cryptosystems, various public-key cryptosystems and many primality tests. In this article we shall see how elliptic curves are used in cryptography. When public-key cryptography was introduced to the research community by Diffe and Hellman in 1976 [4], it represented an exciting innovation in
openaire +1 more source
ECC — Elliptic Curves Cryptography
2010Wie versprochen, mochte ich nach dem Gruppengesetz elliptischer Kurven nun die hervorstechendste Anwendung elliptischer Kurven in der Praxis vorstellen: Die Verwendung in der Kryptographie. Insbesondere gehe ich dabei auf Schlusselaustausch. asymmetrische Ver- und Entschlusselung sowie Signierung mit Hilfe von elliptischen Kurven ein.
openaire +1 more source
Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography
Future Generation Computer Systems, 2020Huaqun Wang, De-biao He
exaly
Lightweight elliptic curve cryptography accelerator for internet of things applications
Ad Hoc Networks, 2020Carlos Andres Lara-Nino +1 more
exaly

