Results 121 to 128 of about 19,096 (128)
Some of the next articles are maybe not open access.
Elliptic Curves in Cryptography
1999In the past few years elliptic curve cryptography has moved from a fringe activity to a major challenger to the dominant RSA/DSA systems. Elliptic curves offer major advances on older systems such as increased speed, less memory and smaller key sizes. As digital signatures become more and more important in the commercial world the use of elliptic curve-
Blake, I F, Seroussi, G, Smart, N P
openaire +1 more source
Cryptography based on elliptic curves
2014A plane curve X over the field F is the set of points ( x, y ) in the plane F 2 that are the zeros of some fixed irreducible bivariate polynomial p(x, y ) over F . If one can define a pairwise operation ( x, y ) + ( x ′, y ′) taking any two points ( x, y ) and ( x ′, y ′) of the curve into a third point of the curve so as to form an ...
openaire +2 more sources
Proceedings of the 1st annual conference on Information security curriculum development, 2004
The use of Java in developing commercial Internet applications is growing very rapidly. A major requirement for e-commerce applications is the provision of security. In this work we consider Elliptic Curve Cryptography (ECC) because of the high level of security it provides with small key sizes.
openaire +2 more sources
The use of Java in developing commercial Internet applications is growing very rapidly. A major requirement for e-commerce applications is the provision of security. In this work we consider Elliptic Curve Cryptography (ECC) because of the high level of security it provides with small key sizes.
openaire +2 more sources
Elliptic and Hyperelliptic Curve Cryptography
2009Nigel Boston, Matthew Darnall
openaire +2 more sources