Results 11 to 20 of about 12,362 (163)

A Las Vegas algorithm to solve the elliptic curve discrete logarithm problem [PDF]

open access: yes, 2018
In this paper, we describe a new Las Vegas algorithm to solve the elliptic curve discrete logarithm problem. The algorithm depends on a property of the group of rational points of an elliptic curve and is thus not a generic algorithm.
Mahalanobis, Ayan, Mallick, Vivek
core   +2 more sources

Fully distributed certificate authority based on polynomial over elliptic curve for MANET [PDF]

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2014
A mobile ad hoc network (MANET) is a wireless communication network, which does not rely on any centralized management or a pre-existing infrastructure. Various certificate authorities (CAs) distributed over the network, each with a periodically updated ...
Ahmad Alomari
doaj   +1 more source

Generalized Fibonacci Sequences for Elliptic Curve Cryptography

open access: yesMathematics, 2023
The Fibonacci sequence is a well-known sequence of numbers with numerous applications in mathematics, computer science, and other fields. In recent years, there has been growing interest in studying Fibonacci-like sequences on elliptic curves.
Zakariae Cheddour   +2 more
doaj   +1 more source

Implications of the Arithmetic Ratio of Prime Numbers for RSA Security

open access: yesInternational Journal of Applied Mathematics and Computer Science, 2023
The most commonly used public key cryptographic algorithms are based on the difficulty in solving mathematical problems such as the integer factorization problem (IFP), the discrete logarithm problem (DLP) and the elliptic curve discrete logarithm ...
Ivanov Andrey, Stoianov Nikolai
doaj   +1 more source

Smart Contract E-Voting Protocol with Linkable Ring Signcryption [PDF]

open access: yesJisuanji gongcheng, 2022
Compared with traditional voting methods, electronic voting is more economical but is not open, nontransparent, and too centralized.Blockchain technology has broad application prospects and has been applied to electronic voting protocols.However ...
WANG Jiechang, ZHANG Ping, GAO Yuan, LIU Yuling
doaj   +1 more source

A NEW PROPOSED METHOD FOR SOLVING AN ELLIPTIC CURVE DISCRETE LOGARITHM PROBLEM

open access: yesJournal of Kufa for Mathematics and Computer, 2012
In this work, we present a new approach for solving Elliptic Curve Discrete Logarithm Problem. This method provides a new access to the field of attacking methods the Elliptic Curve Cryptosystems.
Ammar Ali Neamah
doaj   +1 more source

An Efficient Double Parameter Elliptic Curve Digital Signature Algorithm for Blockchain

open access: yesIEEE Access, 2021
The classic Elliptic curve digital Signature Algorithm (ECDSA) uses one inversion operation in the process of signature and verification, which greatly reduces the efficiency of digital signatures.
Shuang-Gen Liu, Wan-Qi Chen, Jia-Lu Liu
doaj   +1 more source

The order elliptic curves over finite fields of characteristic two using the Schoof algorithm [PDF]

open access: yes, 2007
The elliptic curve cryptosystem is a popular cryptosystem. Its safety depends on the difficulty of the elliptic curve discrete logarithm problem (ECDLP). From the viewpoint of ECDLP, it is very interesting to determine the order of elliptic curves.
Imura, Keigo   +2 more
core   +1 more source

A secure and efficient certificateless content extraction signature with privacy protection.

open access: yesPLoS ONE, 2021
Efficiency and privacy are the key aspects in content extraction signatures. In this study, we proposed a Secure and Efficient and Certificateless Content Extraction Signature with Privacy Protection (SECCESPP) in which scalar multiplication of elliptic ...
Can Zhao   +4 more
doaj   +2 more sources

Attribute-Based Blind Signature Scheme Based on Elliptic Curve Cryptography

open access: yesIEEE Access, 2022
Blind signature is a special digital signature that allows the signer to sign a document without knowing its content. However, in many situations, multiple people need to blindly sign messages.
Rui Ma, Linyue Du
doaj   +1 more source

Home - About - Disclaimer - Privacy