Journal articles on the topic 'Cryptography, elliptic curve, compiler theory'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cryptography, elliptic curve, compiler theory.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Sanjeewa, R., and B. A. K. Welihinda. "Elliptic Curve Cryptography and Coding Theory." International Journal of Multidisciplinary Studies 3, no. 2 (January 28, 2017): 99. http://dx.doi.org/10.4038/ijms.v3i2.12.
Full textBernstein, Daniel J., and Tanja Lange. "Hyper-and-elliptic-curve cryptography." LMS Journal of Computation and Mathematics 17, A (2014): 181–202. http://dx.doi.org/10.1112/s1461157014000394.
Full textRabah, Kefa. "Theory and Implementation of Elliptic Curve Cryptography." Journal of Applied Sciences 5, no. 4 (March 15, 2005): 604–33. http://dx.doi.org/10.3923/jas.2005.604.633.
Full textCui, Chao, Yun Zhao, Yong Xiao, Weibin Lin, and Di Xu. "A Hardware-Efficient Elliptic Curve Cryptographic Architecture over GF (p)." Mathematical Problems in Engineering 2021 (May 18, 2021): 1–7. http://dx.doi.org/10.1155/2021/8883614.
Full textPrabakaran, B., T. R. Sumithira, and V. Nagaraj. "Smart Grid Communication Under Elliptic Curve Cryptography." Intelligent Automation & Soft Computing 36, no. 2 (2023): 2333–47. http://dx.doi.org/10.32604/iasc.2023.029725.
Full textAljamaly, Karrar Taher R., and Ruma Kareem K. Ajeena. "The elliptic scalar multiplication graph and its application in elliptic curve cryptography." Journal of Discrete Mathematical Sciences and Cryptography 24, no. 6 (August 18, 2021): 1793–807. http://dx.doi.org/10.1080/09720529.2021.1932896.
Full textReddy, P. Vasudeva, and M. Padmavathamma. "An authenticated key exchange protocol in elliptic curve cryptography." Journal of Discrete Mathematical Sciences and Cryptography 10, no. 5 (October 2007): 697–705. http://dx.doi.org/10.1080/09720529.2007.10698150.
Full textKumari, Adesh, M. Yahya Abbasi, Vinod Kumar, and Akber Ali Khan. "A secure user authentication protocol using elliptic curve cryptography." Journal of Discrete Mathematical Sciences and Cryptography 22, no. 4 (May 19, 2019): 521–30. http://dx.doi.org/10.1080/09720529.2019.1637155.
Full textKoblitz, Ann Hibner, Neal Koblitz, and Alfred Menezes. "Elliptic curve cryptography: The serpentine course of a paradigm shift." Journal of Number Theory 131, no. 5 (May 2011): 781–814. http://dx.doi.org/10.1016/j.jnt.2009.01.006.
Full textSudharson, K., and S. Arun. "Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm." Intelligent Automation & Soft Computing 34, no. 3 (2022): 1769–84. http://dx.doi.org/10.32604/iasc.2022.026483.
Full textJungeblut, T., C. Puttmann, R. Dreesen, M. Porrmann, M. Thies, U. Rückert, and U. Kastens. "Resource efficiency of hardware extensions of a 4-issue VLIW processor for elliptic curve cryptography." Advances in Radio Science 8 (December 22, 2010): 295–305. http://dx.doi.org/10.5194/ars-8-295-2010.
Full textAranha, Diego, Ricardo Dahab, Julio López, and Leonardo Oliveira. "Efficient implementation of elliptic curve cryptography in wireless sensors." Advances in Mathematics of Communications 4, no. 2 (May 2010): 169–87. http://dx.doi.org/10.3934/amc.2010.4.169.
Full textKumari, Arpana, and Vivek Kapoor. "Competing secure text encryption in intranet using elliptic curve cryptography." Journal of Discrete Mathematical Sciences and Cryptography 23, no. 2 (February 17, 2020): 631–41. http://dx.doi.org/10.1080/09720529.2020.1729509.
Full textKonstantinou, Elisavet, and Aristides Kontogeorgis. "Ramanujan’s class invariants and their use in elliptic curve cryptography." Computers & Mathematics with Applications 59, no. 8 (April 2010): 2901–17. http://dx.doi.org/10.1016/j.camwa.2010.02.008.
Full textMehrabi, Mohamad Ali, Christophe Doche, and Alireza Jolfaei. "Elliptic Curve Cryptography Point Multiplication Core for Hardware Security Module." IEEE Transactions on Computers 69, no. 11 (November 1, 2020): 1707–18. http://dx.doi.org/10.1109/tc.2020.3013266.
Full textPote, Santoshi, Virendra Sule, and B. K. Lande. "Elliptic curve cryptography arithmetic in terms of one variable polynomial division." Journal of Discrete Mathematical Sciences and Cryptography 23, no. 8 (March 5, 2020): 1545–71. http://dx.doi.org/10.1080/09720529.2019.1702754.
Full textV. Rajesh, Kannan. "On-demand based wireless with hybrid cryptography in MANET." i-manager’s Journal on Wireless Communication Networks 10, no. 2 (2022): 8. http://dx.doi.org/10.26634/jwcn.10.2.18937.
Full textJao, David, Stephen D. Miller, and Ramarathnam Venkatesan. "Expander graphs based on GRH with an application to elliptic curve cryptography." Journal of Number Theory 129, no. 6 (June 2009): 1491–504. http://dx.doi.org/10.1016/j.jnt.2008.11.006.
Full textHakuta, Keisuke. "Metrics on the Sets of Nonsupersingular Elliptic Curves in Simplified Weierstrass Form over Finite Fields of Characteristic Two." International Journal of Mathematics and Mathematical Sciences 2015 (2015): 1–5. http://dx.doi.org/10.1155/2015/597849.
Full textHafizul Islam, SK, Mohammad Sabzinejad Farash, G. P. Biswas, Muhammad Khurram Khan, and Mohammad S. Obaidat. "A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography." International Journal of Computer Mathematics 94, no. 1 (September 28, 2015): 39–55. http://dx.doi.org/10.1080/00207160.2015.1088148.
Full textTossavainen, Timo. "Cryptography based on algebraic perpendicularities." Mathematical Gazette 107, no. 568 (February 16, 2023): 65–69. http://dx.doi.org/10.1017/mag.2023.8.
Full textKieu-Do-Nguyen, Binh, Cuong Pham-Quoc, Ngoc-Thinh Tran, Cong-Kha Pham, and Trong-Thuc Hoang. "Low-Cost Area-Efficient FPGA-Based Multi-Functional ECDSA/EdDSA." Cryptography 6, no. 2 (May 10, 2022): 25. http://dx.doi.org/10.3390/cryptography6020025.
Full textDimitrov, Vassil, Laurent Imbert, and Pradeep K. Mishra. "The double-base number system and its application to elliptic curve cryptography." Mathematics of Computation 77, no. 262 (December 11, 2007): 1075–105. http://dx.doi.org/10.1090/s0025-5718-07-02048-0.
Full textCarita, Sa'aadah Sajjana, and Evie Sri Wahyuni. "Modifikasi Tanda Tangan Digital Pada Skema Esign Berbasis Kurva Eliptik." Jurnal Ilmiah SINUS 20, no. 2 (July 19, 2022): 33. http://dx.doi.org/10.30646/sinus.v20i2.625.
Full textIslam, SK Hafizul, and G. P. Biswas. "Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography." International Journal of Computer Mathematics 90, no. 11 (November 2013): 2244–58. http://dx.doi.org/10.1080/00207160.2013.776674.
Full textIlyani Ahmad, Jasmin, Roshidi Din, and Mazida Ahmad. "Analysis Review on Public Key Cryptography Algorithms." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (November 1, 2018): 447. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp447-454.
Full textJimoh, R. G., M. AbdulRaheem, I. R. Salimonu, and O. V. Mejabi. "Elliptic Curve Cryptosystem in securing Communication across Unsecure Channel." Circulation in Computer Science 2, no. 5 (June 20, 2017): 7–12. http://dx.doi.org/10.22632/ccs-2017-251-97.
Full textAmento, Brittanney, Martin Rotteler, and Rainer Steinwalds. "Efficient quantum circuits for binary elliptic curve arithmetic: reducing $T$-gate complexity." Quantum Information and Computation 13, no. 7&8 (May 2013): 631–44. http://dx.doi.org/10.26421/qic13.7-8-5.
Full textY. David Solomon Raju, Thammaneni Snehitha Reddy,. "Implementation of Data Security with Wallace Tree Approach Using Elliptical Curve Cryptography on FPGA." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 5, 2021): 1546–53. http://dx.doi.org/10.17762/turcomat.v12i6.2693.
Full textElahi, Kashif, Ali Ahmad, and Roslan Hasni. "Construction Algorithm for Zero Divisor Graphs of Finite Commutative Rings and Their Vertex-Based Eccentric Topological Indices." Mathematics 6, no. 12 (December 4, 2018): 301. http://dx.doi.org/10.3390/math6120301.
Full textKabin, Ievgen, Zoya Dyka, Dan Klann, Marcin Aftowicz, and Peter Langendoerfer. "Resistance of the Montgomery Ladder Against Simple SCA: Theory and Practice." Journal of Electronic Testing 37, no. 3 (June 2021): 289–303. http://dx.doi.org/10.1007/s10836-021-05951-3.
Full textHOOBI, Mays M. "SURVEY: EFFICIENT HYBRID ALGOR ITHMS OF CRYPTOGRAPHY." MINAR International Journal of Applied Sciences and Technology 2, no. 4 (December 1, 2020): 1–16. http://dx.doi.org/10.47832/2717-8234.4-2.1.
Full textLiu, Zhe, Johann GroBschadl, Zhi Hu, Kimmo Jarvinen, Husen Wang, and Ingrid Verbauwhede. "Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things." IEEE Transactions on Computers 66, no. 5 (May 1, 2017): 773–85. http://dx.doi.org/10.1109/tc.2016.2623609.
Full textWang, Chao, HuanGuo Zhang, and LiLi Liu. "Evolutionary cryptography theory based generating method for a secure Koblitz elliptic curve and its improvement by a hidden Markov models." Science China Information Sciences 55, no. 4 (March 14, 2012): 911–20. http://dx.doi.org/10.1007/s11432-012-4552-4.
Full textPetit, Christophe. "Finding roots in with the successive resultants algorithm." LMS Journal of Computation and Mathematics 17, A (2014): 203–17. http://dx.doi.org/10.1112/s1461157014000138.
Full textBartolini, Sandro, Irina Branovic, Roberto Giorgi, and Enrico Martinelli. "Effects of Instruction-Set Extensions on an Embedded Processor: A Case Study on Elliptic Curve Cryptography over GF(2/sup m/)." IEEE Transactions on Computers 57, no. 5 (2008): 672–85. http://dx.doi.org/10.1109/tc.2007.70832.
Full textEngouang, Tristan Daladier, Yun Liu, and Zhenjiang Zhang. "TDAL: Thoroughly Data Aggregation of Low Energy Devices in Secure Heterogeneous Wireless Sensor Networks." Journal of Sensors 2014 (2014): 1–15. http://dx.doi.org/10.1155/2014/938480.
Full textBoumerzoug, Hayette, Boucif Amar Bensaber, and Ismail Biskri. "A lightweight key management scheme based on an Adelson-Velskii and Landis tree and elliptic curve cryptography for wireless sensor networks." Concurrency and Computation: Practice and Experience 28, no. 6 (October 24, 2013): 1831–47. http://dx.doi.org/10.1002/cpe.3153.
Full textZhou, Jie, Jian Bai, and Meng Shan Jiang. "White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode." Security and Communication Networks 2020 (November 19, 2020): 1–10. http://dx.doi.org/10.1155/2020/8881116.
Full textRajasekar, Vani, Muzafer Saračević, Darjan Karabašević, Dragiša Stanujkić, Eldin Dobardžić, and Sathya Krishnamoorthi. "Efficient Cancelable Template Generation Based on Signcryption and Bio Hash Function." Axioms 11, no. 12 (November 29, 2022): 684. http://dx.doi.org/10.3390/axioms11120684.
Full textБаскаков, Д. Е., Е. Ю. Кузнецова, and А. Л. Стариченков. "Implementation of Lightweight Elliptic Curve Cryptography for Security and Privacy in Cyber-Physical Systems of Intelligent Environmental Monitoring for the Northern Sea Route." MORSKIE INTELLEKTUAL`NYE TEHNOLOGII)</msg>, no. 4(58) (December 2, 2022): 185–92. http://dx.doi.org/10.37220/mit.2022.58.4.041.
Full textNayyar, Anand, Rudra Rameshwar, and Piyush Kanti Dutta. "Special Issue on Recent Trends and Future of Fog and Edge Computing, Services and Enabling Technologies." Scalable Computing: Practice and Experience 20, no. 2 (May 2, 2019): iii—vi. http://dx.doi.org/10.12694/scpe.v20i2.1558.
Full text"Image Pixel Permutation Operation Based on Elliptic Curve Cryptography." Applied Mathematics & Information Sciences 13, S1 (August 1, 2019): 183–89. http://dx.doi.org/10.18576/amis/13s119.
Full textBanik, Arpita, Laiphrakpam Dolendro Singh, Amit Agrawal, and Ripon Patgiri. "Secret image encryption based on chaotic system and elliptic curve cryptography." Digital Signal Processing, July 2022, 103639. http://dx.doi.org/10.1016/j.dsp.2022.103639.
Full text"High speed elliptic curve cryptography architecture for NIST recommended Galois field." International Journal of Advanced Technology and Engineering Exploration 9, no. 97 (December 31, 2022). http://dx.doi.org/10.19101/ijatee.2021.875995.
Full textĎuriš, Viliam, and Timotej Šumný. "Number of rational points of elliptic curves." Asian-European Journal of Mathematics, March 31, 2021, 2250017. http://dx.doi.org/10.1142/s1793557122500176.
Full textV, Sri Vigna Hema, and Ramesh K. "Augmented security for healthcare data using obfuscation and elliptic curve cryptography algorithm in health cloud environment." Concurrency and Computation: Practice and Experience, August 17, 2022. http://dx.doi.org/10.1002/cpe.7275.
Full text"Improved Hyper Elliptic Curve Cryptography with Hybrid Bat Algorithm for Tasks Replication to Meet Deadlines in Clouds." Applied Mathematics & Information Sciences 13, S1 (August 1, 2019): 337–47. http://dx.doi.org/10.18576/amis/13s137.
Full textAiyshwariya Devi, R., and A. R. Arunachalam. "Enhancement of IoT device security using an Improved Elliptic Curve Cryptography algorithm and malware detection utilizing deep LSTM." High-Confidence Computing, March 2023, 100117. http://dx.doi.org/10.1016/j.hcc.2023.100117.
Full textBanu Priya, G., and K. Dharani. "Secure Transmission of Data through Electronic Devices using ECC Algorithm." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, March 1, 2019, 130–35. http://dx.doi.org/10.32628/cseit195223.
Full text