Results 151 to 160 of about 177,129 (337)
A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography. [PDF]
Chen Y, Chen J.
europepmc +1 more source
Smart-Card Implementation of Elliptic Curve Cryptography and DPA-Type Attacks [PDF]
Marc Jóye
openalex +1 more source
Decrypting the Link Between Elliptic Primes and Twin Primes [PDF]
From Caesar’s cipher to Germany’s enigma machine to modern day cryptosytems, cryptography spans throughout history. Methods of encryption have evolved over hundreds of years and continue to evolve as computational efficiency increases.
Babinkostova, Liljana, (Mentor)+8 more
core +1 more source
On cycles of pairing-friendly elliptic curves [PDF]
A cycle of elliptic curves is a list of elliptic curves over finite fields such that the number of points on one curve is equal to the size of the field of definition of the next, in a cyclic way. We study cycles of elliptic curves in which every curve is pairing-friendly.
arxiv
Abstract Measurement error (ME) in geometric morphometrics has been the subject of countless articles, but none specific to the effect of time lags on landmark digitization error. Yet, especially for visiting scientists working on museum collections, it is not uncommon to collect data in multiple rounds, with interruptions of weeks or years. To explore
Andrea Cardini
wiley +1 more source
Implementing Elliptic Curve Cryptography [PDF]
Properties like short keys and efficient algorithms make elliptic curve cryptography (ECC) more and more interesting for future oriented applications. In this paper we give a short overview of the basics of ECC. Thereby we show where programmers can gain possible speed-ups and what parts are crucial.
openaire +1 more source
A fair E-cash scheme based on elliptic curve cryptography [PDF]
Changji Wang, Jianping Wu, Duan Haixin
openalex +1 more source
Abstract Hybodontiformes was a diverse, successful, and important group of shark‐like chondrichthyans known from a variety of ecosystems. Some representatives of the order had a wide palaeogeographic distribution, as is the case with Priohybodus arambourgi. With a multicuspidate crown, P. arambourgi was the first hybodontiform to develop fully serrated
Estevan Eltink+5 more
wiley +1 more source
Error analysis and detection procedures for elliptic curve cryptography
In this paper, a fault detection scheme is introduced with the ability to perform with increased protection and reliability of the Elliptic Curve Cryptography (ECC) in realistic environments at a competitive price point.
Naglaa F. Saudy+2 more
doaj
Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET. [PDF]
Shukla M, Joshi BK, Singh U.
europepmc +1 more source