Results 61 to 70 of about 124 (95)
Elliptic Curve Cryptography and Point Counting Algorithms [PDF]
Hailiza Kamarulhaili, Liew Khang Jie
core +1 more source
The order elliptic curves over finite fields of characteristic two using the Schoof algorithm
The elliptic curve cryptosystem is a popular cryptosystem. Its safety depends on the difficulty of the elliptic curve discrete logarithm problem (ECDLP). From the viewpoint of ECDLP, it is very interesting to determine the order of elliptic curves.
openaire
Elliptic curves have a rich mathematical history dating back to Diophantus (c. 250 C.E.), who used a form of these cubic equations to find right triangles of integer area with rational sides. In more recent times the deep mathematics of elliptic curves
McGee, John J.
core
Large-Scale Integer And Polynomial Computations : Efficient Implementation And Applications [PDF]
Amberker, B B
core
Symbolic method in the Schoof's algorithm
Głównym tematem pracy jest przedstawienie algorytmu Schoofa w kontekście szczególnych przypadków krzywej eliptycznej nad ciałem skończonym. Praca została podzielona na trzy rozdziały.
Asienkiewicz, Hubert
core
Dynamic projective coordinate system for elliptic curve crytography [PDF]
Al-Gahtani, Theeb Ayedh
core +3 more sources
New applications of elliptic curves and function fields in cryptography [PDF]
Zuccherato, Robert
core
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2021
Security and efficiency for resource constrained devices using lightweight cryptography techniques is still a problem. It is important to make these devices secure from the intruders and communicate with them securely. Elliptic Curve Cryptography (ECC) comes out to be a major contender to solve this problem as it provides the security using smaller key
Ansh Tyagi +2 more
openaire +1 more source
Security and efficiency for resource constrained devices using lightweight cryptography techniques is still a problem. It is important to make these devices secure from the intruders and communicate with them securely. Elliptic Curve Cryptography (ECC) comes out to be a major contender to solve this problem as it provides the security using smaller key
Ansh Tyagi +2 more
openaire +1 more source
Parameters for secure elliptic curve cryptosystem -improvements on Schoof s algorithm
1998The security of elliptic curve cryptosystem depends on the choice of an elliptic curve on which cryptographic operations are performed. Schoof's algorithm is used to define a secure elliptic curve, as it can compute the number of rational points on a randomly selected elliptic curve defined over a finite field.
Tetsuya Izu +3 more
openaire +1 more source

