Results 11 to 20 of about 4,746 (306)

Elliptic curve cryptography [PDF]

open access: yesUbiquity, 2008
This paper describes the Elliptic Curve Cryptography algorithm and its suitability for smart cards.
Vivek Kapoor   +2 more
openaire   +4 more sources

Fully distributed certificate authority based on polynomial over elliptic curve for MANET [PDF]

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2014
A mobile ad hoc network (MANET) is a wireless communication network, which does not rely on any centralized management or a pre-existing infrastructure. Various certificate authorities (CAs) distributed over the network, each with a periodically updated ...
Ahmad Alomari
doaj   +1 more source

The review on elliptic curves as cryptographic pairing groups [PDF]

open access: yesMathematics and Computational Sciences, 2021
Elliptic curve is a set of two variable points on polynomials of degree 3 over a field acted by an addition operation that forms a group structure. The motivation of this study is the mathematics behind that elliptic curve to the applicability within a ...
E Khamseh
doaj   +1 more source

THEORETICAL ASSUMPTIONS FOR AN INTRODUCTION TO ELLIPTIC CURVE CRYPTOGRAPHY

open access: yesSTED Journal, 2023
Understanding elliptic curves contributed to solving mathematical problems in number theory that had been unsolved for centuries. Elliptic curves were also used in solving one of the millennial problems, which is Fermat's last theorem.
Ognjen Milivojević, Boris Damjanović
doaj   +1 more source

ELLIPTIC-CURVE CRYPTOGRAPHY (ECC) AND ARGON2 ALGORITHM IN PHP USING OPENSSL AND SODIUM LIBRARIES

open access: yesInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, 2020
This paper presents the elliptic-curve cryptography (ECC) and Argon2 algorithm in PHP using OpenSSL and Sodium cryptographic libraries. The vital part of this thesis presents an analysis of the efficiency of elliptic-curve cryptography (ECC) and the ...
Mariusz Duka
doaj   +1 more source

Twisted Edwards Elliptic Curves for Zero-Knowledge Circuits

open access: yesMathematics, 2021
Circuit-based zero-knowledge proofs have arose as a solution to the implementation of privacy in blockchain applications, and to current scalability problems that blockchains suffer from.
Marta Bellés-Muñoz   +4 more
doaj   +1 more source

Attribute-Based Blind Signature Scheme Based on Elliptic Curve Cryptography

open access: yesIEEE Access, 2022
Blind signature is a special digital signature that allows the signer to sign a document without knowing its content. However, in many situations, multiple people need to blindly sign messages.
Rui Ma, Linyue Du
doaj   +1 more source

Generalized Fibonacci Sequences for Elliptic Curve Cryptography

open access: yesMathematics, 2023
The Fibonacci sequence is a well-known sequence of numbers with numerous applications in mathematics, computer science, and other fields. In recent years, there has been growing interest in studying Fibonacci-like sequences on elliptic curves.
Zakariae Cheddour   +2 more
doaj   +1 more source

Methods for using elliptic curves in cryptography [PDF]

open access: yesE3S Web of Conferences
Elliptic Curve Cryptography (ECC), a significant modern cryptography, is more secure and robust than most others due to its construction using an elliptic curve and the application of mathematical operations for encryption and key generation. Furthermore,
Obukhov Vadim   +4 more
doaj   +1 more source

Hyper-and-elliptic-curve cryptography [PDF]

open access: yesLMS Journal of Computation and Mathematics, 2014
AbstractThis paper introduces ‘hyper-and-elliptic-curve cryptography’, in which a single high-security group supports fast genus-2-hyperelliptic-curve formulas for variable-base-point single-scalar multiplication (for example, Diffie–Hellman shared-secret computation) and at the same time supports fast elliptic-curve formulas for fixed-base-point ...
Tanja Lange, Daniel J. Bernstein
openaire   +3 more sources

Home - About - Disclaimer - Privacy