Results 271 to 280 of about 4,746 (306)
Some of the next articles are maybe not open access.

Elliptic Curves and Cryptography

2003
In the earlier cryptography articles, we have seen classical cryptosystems, various public-key cryptosystems and many primality tests. In this article we shall see how elliptic curves are used in cryptography. When public-key cryptography was introduced to the research community by Diffe and Hellman in 1976 [4], it represented an exciting innovation in
openaire   +2 more sources

Elliptic Curve Cryptography

2018
Just the same as DLP, ECDLP (Elliptic Curve Discrete Logarithm Problem) is also hard to solve, so it is natural to think about designing cryptographic system based on ECDLP. In this chapter we shall first discuss the Elliptic Curve Discrete Logarithm Problem (ECDLP) and the classical solutions to ECDLP, then we shall present some popular and useful ...
openaire   +2 more sources

Supersingular Elliptic Curves in Cryptography

2007
I will survey the checkered history of supersingular elliptic curves in cryptography, from their first consideration in the seminal papers of Koblitz and Miller, to their rejection after the discovery of the Weil and Tate pairing attacks on the discrete logarithm problem for these curves, and concluding with their resurrection alongside the discovery ...
openaire   +2 more sources

Elliptic Curve Cryptography on WISPs

2013
In this chapter, the authors explore the feasibility of Elliptic Curve Cryptography (ECC) on Wireless Identification and Sensing Platforms (WISPs). ECC is a public-key based cryptographic primitive that has been widely adopted in embedded systems and Wireless Sensor Networks (WSNs).
Michael Hutter   +3 more
openaire   +1 more source

An Introduction to Elliptic Curve Cryptography

2012
This chapter presents an introduction to elliptic curve cryptography. Elliptic curves provide an important source of finite abelian groups in which cryptographic schemes relying on the hardness of the discrete logarithm problem (DLP) can be implemented.
openaire   +2 more sources

ECC — Elliptic Curves Cryptography [PDF]

open access: possible, 2010
Wie versprochen, mochte ich nach dem Gruppengesetz elliptischer Kurven nun die hervorstechendste Anwendung elliptischer Kurven in der Praxis vorstellen: Die Verwendung in der Kryptographie. Insbesondere gehe ich dabei auf Schlusselaustausch. asymmetrische Ver- und Entschlusselung sowie Signierung mit Hilfe von elliptischen Kurven ein.
openaire   +1 more source

Cryptography based on elliptic curves

2014
A plane curve X over the field F is the set of points ( x, y ) in the plane F 2 that are the zeros of some fixed irreducible bivariate polynomial p(x, y ) over F . If one can define a pairwise operation ( x, y ) + ( x ′, y ′) taking any two points ( x, y ) and ( x ′, y ′) of the curve into a third point of the curve so as to form an ...
openaire   +2 more sources

Overview of elliptic curve cryptography

1998
In this article, we look at the elliptic curve cryptography, which is believed to be one of the most promising candidates for the next generation cryptographic tool. The following issues are addressed here; 1. Discrete Logarithm Problem in finite fields 2. Elliptic Curve Discrete Logs 3.
Kiyomichi Araki   +2 more
openaire   +2 more sources

Elliptic Curves in Cryptography

1999
In the past few years elliptic curve cryptography has moved from a fringe activity to a major challenger to the dominant RSA/DSA systems. Elliptic curves offer major advances on older systems such as increased speed, less memory and smaller key sizes. As digital signatures become more and more important in the commercial world the use of elliptic curve-
Blake, I F, Seroussi, G, Smart, N P
openaire   +1 more source

Elliptic curve cryptography

Proceedings of the 1st annual conference on Information security curriculum development, 2004
The use of Java in developing commercial Internet applications is growing very rapidly. A major requirement for e-commerce applications is the provision of security. In this work we consider Elliptic Curve Cryptography (ECC) because of the high level of security it provides with small key sizes.
openaire   +2 more sources

Home - About - Disclaimer - Privacy