Results 1 to 10 of about 117,996 (268)

Super Elliptic Curves [PDF]

open access: yesJournal of Geometry and Physics, 1993
A detailed study is made of super elliptic curves, namely super Riemann surfaces of genus one considered as algebraic varieties, particularly their relation with their Picard groups.
Alvarez-Gaumé   +36 more
core   +4 more sources

Security analysis of elliptic curves with embedding degree 1 proposed in PLOS ONE 2016. [PDF]

open access: yesPLoS ONE, 2019
Wang et al. proposed a method for obtaining elliptic curves with embedding degree 1 for securing critical infrastructures, and presented several elliptic curves generated by their method with torsion points of 160 bits and 189 bits orders.
Tadanori Teruya
doaj   +2 more sources

Elliptic Curves [PDF]

open access: yes, 2018
Elliptic curves have found widespread use in number theory and applications thereof, such as cryptography. In this paper we will first examine the basic theory of elliptic curves and then look specifically at how they can be used to construct cryptographic
Estep, Samuel
core   +3 more sources

Cryptographically Strong Elliptic Curves of Prime Order [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2021
The purpose of this paper is to generate cryptographically strong elliptic curves over prime fields Fp, where p is a Mersenne prime, one of the special primes or a random prime. We search for elliptic curves which orders are also prime numbers.
Marcin Barański   +2 more
doaj   +1 more source

The review on elliptic curves as cryptographic pairing groups [PDF]

open access: yesMathematics and Computational Sciences, 2021
Elliptic curve is a set of two variable points on polynomials of degree 3 over a field acted by an addition operation that forms a group structure. The motivation of this study is the mathematics behind that elliptic curve to the applicability within a ...
E Khamseh
doaj   +1 more source

THEORETICAL ASSUMPTIONS FOR AN INTRODUCTION TO ELLIPTIC CURVE CRYPTOGRAPHY

open access: yesSTED Journal, 2023
Understanding elliptic curves contributed to solving mathematical problems in number theory that had been unsolved for centuries. Elliptic curves were also used in solving one of the millennial problems, which is Fermat's last theorem.
Ognjen Milivojević, Boris Damjanović
doaj   +1 more source

How to Compute an Isogeny on the Extended Jacobi Quartic Curves? [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2022
Computing isogenies between elliptic curves is a significant part of post-quantum cryptography with many practical applications (for example, in SIDH, SIKE, B-SIDH, or CSIDH algorithms).
Łukasz Dzierzkowski, Michał Wroński
doaj   +1 more source

Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography

open access: yesCybernetics and Information Technologies, 2021
Short Weierstrass elliptic curves with underlying hard Elliptic Curve Discrete Logarithm Problem (ECDLP) are widely used in cryptographic applications. A notion of security called Elliptic Curve Cryptography (ECC) security is also suggested in literature
Abhishek Kunal   +1 more
doaj   +1 more source

ELLIPTIC CURVES PUBLIC KEY TRAITOR TRACING SCHEME [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2008
In this paper we use the elliptic curves system in the Public Key Traitor Tracing Scheme. The Elliptic Curve points form Abelian group that used in the Public Key Traitor Tracing Scheme.
Ali M. Sagheer
doaj   +1 more source

Combined small subgroups and side-channel attack on elliptic curves with cofactor divisible by 2m [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2019
Nowadays, alternative models of elliptic curves like Montgomery, Edwards, twisted Edwards, Hessian, twisted Hessian, Huff’s curves and many others are very popular and many people use them in cryptosystems which are based on elliptic curve cryptography ...
Michał Wrońska
doaj   +1 more source

Home - About - Disclaimer - Privacy