Results 11 to 20 of about 177,129 (337)

Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography [PDF]

open access: yesCybernetics and Information Technologies, 2021
Short Weierstrass elliptic curves with underlying hard Elliptic Curve Discrete Logarithm Problem (ECDLP) are widely used in cryptographic applications. A notion of security called Elliptic Curve Cryptography (ECC) security is also suggested in literature
Abhishek Kunal   +1 more
doaj   +2 more sources

Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography [PDF]

open access: yesCybernetics and Information Technologies, 2021
The survey presents the evolution of Short Weierstrass elliptic curves after their introduction in cryptography. Subsequently, this evolution resulted in the establishment of present elliptic curve computational standards.
Abhishek Kunal   +1 more
doaj   +2 more sources

A Decentralized Signcryption Scheme Based on CFL [PDF]

open access: yesSensors
The rapid advancement of quantum computing technology poses a significant threat to conventional public key cryptographic infrastructure. The SM2 (state key cryptography algorithm no.
Leyi Shi, Mengting Liu
doaj   +2 more sources

The Graphs for Elliptic Curve Cryptography [PDF]

open access: yes, 2019
The scalar multiplication on elliptic curves defined over finite fields is a core operation in elliptic curve cryptography (ECC). Several different methods are used for computing this operation. One of them, the binary method, is applied depending on the
Ajeena, Ruma Kareem K.
openaire   +5 more sources

Sistem Kriptografi Klasik Dengan Memanfaatkan Orde Dari Grup Titik Pada Kurva Eliptik Bentuk Montgomery [PDF]

open access: yes, 2023
Elliptic curve cryptography is one of the application fields of algebra and number theory concepts. One form of elliptic curve cryptography is Montgomery elliptic curve cryptography.
Fahmi, Muhammad Firdhausi   +1 more
core   +2 more sources

Speeding-Up Elliptic Curve Cryptography Algorithms

open access: yesMathematics, 2022
In recent decades there has been an increasing interest in Elliptic curve cryptography (ECC) and, especially, the Elliptic Curve Digital Signature Algorithm (ECDSA) in practice.
Diana Maimuţ, Alexandru Cristian Matei
doaj   +1 more source

Arithmetic for Cryptography based on Elliptic Curves

open access: green, 2007
Dans cette thèse, nous nous intéressons au problème de l'implantation de la multiplication de point par un scalaire sur les courbes elliptiques définies sur des corps premiers. Nous abordons ce problème aussi bien au niveau des algorithmes de multiplication de points, que de l'arithmétique de la courbe ou du corps sous-jacent. L'originalité des travaux
Nicolas Méloni
openaire   +4 more sources

Design a cryptosystem using elliptic curves cryptography and Vigenère symmetry key [PDF]

open access: yes, 2023
In this paper describes the basic idea of elliptic curve cryptography (ECC) as well as Vigenère symmetry key. Elliptic curve arithmetic can be used to develop elliptic curve coding schemes, including key exchange, encryption, and digital signature.
Do, Le Phe   +4 more
core   +4 more sources

Elliptic curve cryptography [PDF]

open access: yesUbiquity, 2008
This paper describes the Elliptic Curve Cryptography algorithm and its suitability for smart cards.
Vivek Kapoor   +2 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy