Results 31 to 40 of about 12,362 (163)

Constructing elliptic curves of prime order [PDF]

open access: yes, 2007
We present a very efficient algorithm to construct an elliptic curve E and a finite field F such that the order of the point group E(F) is a given prime number N.
Broker, Reinier, Stevenhagen, Peter
core   +3 more sources

Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials

open access: yesIEEE Access, 2018
Most of the existing blind proxy re-signature schemes are designed based on the traditional public key cryptosystems, whose security relies on the hardness of big integer factoring, discrete logarithm, elliptic curve discrete logarithm, and so on ...
Li Huixian   +3 more
doaj   +1 more source

An ontological morphological phylogenetic framework for living and extinct ray‐finned fishes (Actinopterygii)

open access: yesThe Anatomical Record, EarlyView.
Abstract The ray‐finned fishes include one out of every two species of living vertebrates on Earth and have an abundant fossil record stretching 380 million years into the past. The division of systematic knowledge of ray‐finned fishes between paleontologists working on extinct animals and neontologists studying extant species has obscured the ...
Jack Stack
wiley   +1 more source

The ElGamal cryptosystem over circulant matrices [PDF]

open access: yes, 2011
In this paper we study extensively the discrete logarithm problem in the group of non-singular circulant matrices. The emphasis of this study was to find the exact parameters for the group of circulant matrices for a secure implementation.
Mahalanobis, Ayan
core   +3 more sources

The cranial, mandibular, and hyoid anatomy of softshell turtles (Trionychidae): A revised character list for phylogenetic analysis

open access: yesThe Anatomical Record, EarlyView.
Abstract Softshell turtles (Pan‐Trionychidae) are an early branching clade of hidden‐necked turtles (Cryptodira) with a rich fossil record extending back to the Early Cretaceous. The evolutionary history of softshell turtles is still unresolved because of their conservative morphology combined with high levels of polymorphism related to morphological ...
Léa C. Girard, Walter G. Joyce
wiley   +1 more source

A SECURE KEY AGREEMENT PROTOCOL [PDF]

open access: yes, 2001
In this paper we propose a secure protocol for an authenticated key agreement based on the Diffie-Hellman key agreement, which works in an elliptic curve group We prove that our protocol meets the security attributes under the assumption that the ...
Constantin Popescu
core  

Discrete Logarithms in Generalized Jacobians [PDF]

open access: yes, 2006
D\'ech\`ene has proposed generalized Jacobians as a source of groups for public-key cryptosystems based on the hardness of the Discrete Logarithm Problem (DLP).
Galbraith, S. D., Smith, B. A.
core   +4 more sources

Ellipsoid‐Based Interval‐Type Uncertainty Model Updating Based on Riemannian Manifold and Gaussian Process Model

open access: yesInternational Journal of Mechanical System Dynamics, EarlyView.
ABSTRACT Modern engineering systems require advanced uncertainty‐aware model updating methods that address parameter correlations beyond conventional interval analysis. This paper proposes a novel framework integrating Riemannian manifold theory with Gaussian Process Regression (GPR) for systems governed by Symmetric Positive‐Definite (SPD) matrix ...
Yanhe Tao   +3 more
wiley   +1 more source

Isogenies of Elliptic Curves: A Computational Approach [PDF]

open access: yes, 2009
Isogenies, the mappings of elliptic curves, have become a useful tool in cryptology. These mathematical objects have been proposed for use in computing pairings, constructing hash functions and random number generators, and analyzing the reducibility of ...
Shumow, Daniel
core   +2 more sources

TWO-FACTOR AUTHENTICATION PROTOCOL IN ACCESS CONTROL SYSTEMS

open access: yesInformation and Telecommunication Sciences, 2023
Background. To ensure the protection of the biometric access control system used in unsecured communication channels, it is necessary to exclude the storage and transfer, transfer of biometric data as well as sequences generated on their basis. The paper
Ірина Стрелковська   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy