Results 291 to 300 of about 24,925 (334)
Some of the next articles are maybe not open access.

Elliptic Curve Cryptography

2010
Elliptic curve cryptography, in essence, entails using the group of points on an elliptic curve as the underlying number system for public key cryptography. There are two main reasons for using elliptic curves as a basis for public key cryptosystems.
openaire   +1 more source

Pairing-Based Cryptography on Elliptic Curves

Mathematics in Computer Science, 2018
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Miret, Josep M.   +2 more
openaire   +2 more sources

The State of Elliptic Curve Cryptography

Designs, Codes and Cryptography, 2000
This paper surveys the elliptic curve cryptography that is based on the discrete logarithm problem. Compared to their counterparts in groups of integers, elliptic curves usually provide smaller keys and lower computational complexities. The paper gives a brief overview of elliptic curves, discusses the elliptic curve discrete logarithm problem and ...
Koblitz, Neal   +2 more
openaire   +1 more source

Applications of elliptic curve cryptography

Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017
Elliptic curve cryptography (ECC) is a relatively newer form of public key cryptography that provides more security per bit than other forms of cryptography still being used today. We explore the mathematical structure and operations of elliptic curves and how those properties make curves suitable tools for cryptography.
R. Harkanson, Y. Kim
openaire   +1 more source

Elliptic Curves and Cryptography

2014
The subject of elliptic curves encompasses a vast amount of mathematics. Our aim in this section is to summarize just enough of the basic theory for cryptographic applications. For additional reading, there are a number of survey articles and books devoted to elliptic curve cryptography [14, 68, 81, 135], and many others that describe the number ...
Jeffrey Hoffstein   +2 more
openaire   +1 more source

Elliptic Curve Cryptography

International Conference on Statistics, Applied Mathematics, and Computing Science (CSAMCS 2021), 2022
openaire   +2 more sources

Elliptic Curves in Cryptography

1999
In the past few years elliptic curve cryptography has moved from a fringe activity to a major challenger to the dominant RSA/DSA systems. Elliptic curves offer major advances on older systems such as increased speed, less memory and smaller key sizes. As digital signatures become more and more important in the commercial world the use of elliptic curve-
Blake, I F, Seroussi, G, Smart, N P
openaire   +1 more source

Elliptic Curve Cryptography

2018
Just the same as DLP, ECDLP (Elliptic Curve Discrete Logarithm Problem) is also hard to solve, so it is natural to think about designing cryptographic system based on ECDLP. In this chapter we shall first discuss the Elliptic Curve Discrete Logarithm Problem (ECDLP) and the classical solutions to ECDLP, then we shall present some popular and useful ...
openaire   +1 more source

Elliptic curve cryptography in Java

2015 IEEE International Conference on Intelligence and Security Informatics (ISI), 2015
The strength of public key cryptography utilizing Elliptic Curves relies on the difficulty of computing discrete logarithms in a finite field. Other public key cryptographic algorithms, such as RSA, rely on the difficulty of integer factorization.
openaire   +1 more source

Elliptic Curve Cryptography

2006
Darrel Hankerson, Alfred Menezes
openaire   +2 more sources

Home - About - Disclaimer - Privacy