Results 31 to 40 of about 12,362 (163)
Constructing elliptic curves of prime order [PDF]
We present a very efficient algorithm to construct an elliptic curve E and a finite field F such that the order of the point group E(F) is a given prime number N.
Broker, Reinier, Stevenhagen, Peter
core +3 more sources
Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials
Most of the existing blind proxy re-signature schemes are designed based on the traditional public key cryptosystems, whose security relies on the hardness of big integer factoring, discrete logarithm, elliptic curve discrete logarithm, and so on ...
Li Huixian +3 more
doaj +1 more source
Abstract The ray‐finned fishes include one out of every two species of living vertebrates on Earth and have an abundant fossil record stretching 380 million years into the past. The division of systematic knowledge of ray‐finned fishes between paleontologists working on extinct animals and neontologists studying extant species has obscured the ...
Jack Stack
wiley +1 more source
The ElGamal cryptosystem over circulant matrices [PDF]
In this paper we study extensively the discrete logarithm problem in the group of non-singular circulant matrices. The emphasis of this study was to find the exact parameters for the group of circulant matrices for a secure implementation.
Mahalanobis, Ayan
core +3 more sources
Abstract Softshell turtles (Pan‐Trionychidae) are an early branching clade of hidden‐necked turtles (Cryptodira) with a rich fossil record extending back to the Early Cretaceous. The evolutionary history of softshell turtles is still unresolved because of their conservative morphology combined with high levels of polymorphism related to morphological ...
Léa C. Girard, Walter G. Joyce
wiley +1 more source
A SECURE KEY AGREEMENT PROTOCOL [PDF]
In this paper we propose a secure protocol for an authenticated key agreement based on the Diffie-Hellman key agreement, which works in an elliptic curve group We prove that our protocol meets the security attributes under the assumption that the ...
Constantin Popescu
core
Discrete Logarithms in Generalized Jacobians [PDF]
D\'ech\`ene has proposed generalized Jacobians as a source of groups for public-key cryptosystems based on the hardness of the Discrete Logarithm Problem (DLP).
Galbraith, S. D., Smith, B. A.
core +4 more sources
ABSTRACT Modern engineering systems require advanced uncertainty‐aware model updating methods that address parameter correlations beyond conventional interval analysis. This paper proposes a novel framework integrating Riemannian manifold theory with Gaussian Process Regression (GPR) for systems governed by Symmetric Positive‐Definite (SPD) matrix ...
Yanhe Tao +3 more
wiley +1 more source
Isogenies of Elliptic Curves: A Computational Approach [PDF]
Isogenies, the mappings of elliptic curves, have become a useful tool in cryptology. These mathematical objects have been proposed for use in computing pairings, constructing hash functions and random number generators, and analyzing the reducibility of ...
Shumow, Daniel
core +2 more sources
TWO-FACTOR AUTHENTICATION PROTOCOL IN ACCESS CONTROL SYSTEMS
Background. To ensure the protection of the biometric access control system used in unsecured communication channels, it is necessary to exclude the storage and transfer, transfer of biometric data as well as sequences generated on their basis. The paper
Ірина Стрелковська +2 more
doaj +1 more source

