Results 11 to 20 of about 24,925 (334)
Elliptic Curve Cryptography [PDF]
In the present day, security is essential for sending and receiving information. There are always stories about bank accounts being hacked, credit card numbers being stolen, and secret information being decoded.
Pratt, Kerrie
core +3 more sources
Implementasi dan Pengukuran Kinerja Operasi Aritmatika Finite Field Berbasis Polinomial Biner [PDF]
Cryptography is one of the security techniques that secure information confidentiality and information integrity while electronic transaction processing.
Wenny Franciska Senjaya, Budi Rahardjo
doaj +4 more sources
Compiler assisted elliptic curve cryptography [PDF]
Although cryptographic software implementation is often performed by expert programmers, the range of performance and secu- rity driven options, as well as more mundane software engineering issues, still make it a challenge.
Barbosa, Manuel, Moss, Andrew, Page, D.
core +4 more sources
Elliptic curve cryptography [PDF]
This paper describes the Elliptic Curve Cryptography algorithm and its suitability for smart cards.
Vivek Kapoor +2 more
+4 more sources
Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography
The survey presents the evolution of Short Weierstrass elliptic curves after their introduction in cryptography. Subsequently, this evolution resulted in the establishment of present elliptic curve computational standards.
Abhishek Kunal +1 more
doaj +1 more source
The review on elliptic curves as cryptographic pairing groups [PDF]
Elliptic curve is a set of two variable points on polynomials of degree 3 over a field acted by an addition operation that forms a group structure. The motivation of this study is the mathematics behind that elliptic curve to the applicability within a ...
E Khamseh
doaj +1 more source
Fully distributed certificate authority based on polynomial over elliptic curve for MANET [PDF]
A mobile ad hoc network (MANET) is a wireless communication network, which does not rely on any centralized management or a pre-existing infrastructure. Various certificate authorities (CAs) distributed over the network, each with a periodically updated ...
Ahmad Alomari
doaj +1 more source
THEORETICAL ASSUMPTIONS FOR AN INTRODUCTION TO ELLIPTIC CURVE CRYPTOGRAPHY
Understanding elliptic curves contributed to solving mathematical problems in number theory that had been unsolved for centuries. Elliptic curves were also used in solving one of the millennial problems, which is Fermat's last theorem.
Ognjen Milivojević, Boris Damjanović
doaj +1 more source
ELLIPTIC-CURVE CRYPTOGRAPHY (ECC) AND ARGON2 ALGORITHM IN PHP USING OPENSSL AND SODIUM LIBRARIES
This paper presents the elliptic-curve cryptography (ECC) and Argon2 algorithm in PHP using OpenSSL and Sodium cryptographic libraries. The vital part of this thesis presents an analysis of the efficiency of elliptic-curve cryptography (ECC) and the ...
Mariusz Duka
doaj +1 more source
Twisted Edwards Elliptic Curves for Zero-Knowledge Circuits
Circuit-based zero-knowledge proofs have arose as a solution to the implementation of privacy in blockchain applications, and to current scalability problems that blockchains suffer from.
Marta Bellés-Muñoz +4 more
doaj +1 more source

