Results 141 to 150 of about 4,167 (184)

Area-Time-Efficient Secure Comb Scalar Multiplication Architecture Based on Recoding. [PDF]

open access: yesMicromachines (Basel)
Zhang Z   +6 more
europepmc   +1 more source
Some of the next articles are maybe not open access.

Related searches:

An efficient self-certified multi-proxy signature scheme based on elliptic curve discrete logarithm problem

Journal of Discrete Mathematical Sciences and Cryptography, 2020
Multi-proxy signature schemes (MPSS) allow n proxy signers to generate a valid signature on behalf of the original signer. A new efficient self-certified MPSS with message recovery based on the Elliptic Curve Discrete Logarithm Problem (i.e., ECDLP) is ...
N. Tahat   +3 more
semanticscholar   +1 more source

Base of exponent representation matters - more efficient reduction of discrete logarithm problem and elliptic curve discrete logarithm problem to the QUBO problem

Quantum information & computation
This paper presents further improvements in the transformation of the Discrete Logarithm Problem (DLP) and Elliptic Curve Discrete Logarithm Problem (ECDLP) over prime fields to the Quadratic Unconstrained Binary Optimization (QUBO) problem.
Michał Wroński, Lukasz Dzierzkowski
semanticscholar   +1 more source

Index Calculus Method for Solving Elliptic Curve Discrete Logarithm Problem Using Quantum Annealing

International Conference on Conceptual Structures, 2021
Michał Wroński
semanticscholar   +1 more source

Extending Elliptic Curve Cryptography for Quantum Readiness

International Conference on Public Key Infrastructure and its Applications
Elliptic curve cryptography (ECC) is used for au-thentication, secret sharing, key encryption, and applications such as public key infrastructure (PKI) and transport layer security (TLS). A suitably higher-order elliptic curve is cryptographically secure
Kunal Abhishek
semanticscholar   +1 more source

Secure Multiparty Computation over Elliptic Curve Cryptography

Mikailalsys Journal of Advanced Engineering International
This study proposes a secure mobile voting system that integrates elliptic curve cryptography (ECC) with secure multiparty computation (SMPC) to guarantee vote confidentiality, integrity, and verifiability. Designed to enable scalable, privacy-preserving
Domven L.   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy