Academic literature on the topic 'Curves, Elliptic. Cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Curves, Elliptic. Cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Curves, Elliptic. Cryptography"
Abhishek, Kunal, and E. George Dharma Prakash Raj. "Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography." Cybernetics and Information Technologies 21, no. 2 (June 1, 2021): 70–88. http://dx.doi.org/10.2478/cait-2021-0020.
Full textMiret, Josep M., Daniel Sadornil, and Juan G. Tena. "Pairing-Based Cryptography on Elliptic Curves." Mathematics in Computer Science 12, no. 3 (June 27, 2018): 309–18. http://dx.doi.org/10.1007/s11786-018-0347-3.
Full textHakuta, Keisuke. "Metrics on the Sets of Nonsupersingular Elliptic Curves in Simplified Weierstrass Form over Finite Fields of Characteristic Two." International Journal of Mathematics and Mathematical Sciences 2015 (2015): 1–5. http://dx.doi.org/10.1155/2015/597849.
Full textMORALES-SANDOVAL, M., C. FEREGRINO-URIBE, R. CUMPLIDO, and I. ALGREDO-BADILLO. "A SINGLE FORMULA AND ITS IMPLEMENTATION IN FPGA FOR ELLIPTIC CURVE POINT ADDITION USING AFFINE REPRESENTATION." Journal of Circuits, Systems and Computers 19, no. 02 (April 2010): 425–33. http://dx.doi.org/10.1142/s0218126610006153.
Full textHuque, Md Sirajul, Sk Bhadar Saheb, and Jayaram Boga. "An Approach to Secure Data Aggregation in Wireless Sensor Networks (WSN) using Asymmetric Homomorphic Encryption (Elliptic Curve Cryptography) Scheme." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (August 1, 2017): 263. http://dx.doi.org/10.23956/ijarcsse/v7i7/0162.
Full textFuta, Yuichi, Hiroyuki Okazaki, Daichi Mizushima, and Yasunari Shidama. "Operations of Points on Elliptic Curve in Projective Coordinates." Formalized Mathematics 20, no. 1 (January 1, 2012): 87–95. http://dx.doi.org/10.2478/v10037-012-0012-2.
Full textSonnino, Alberto, and Giorgio Sonnino. "Elliptic-Curves Cryptography on High-Dimensional Surfaces." International Journal of Advanced Engineering Research and Science 4, no. 2 (2017): 140–46. http://dx.doi.org/10.22161/ijaers.4.2.28.
Full textBrezing, Friederike, and Annegret Weng. "Elliptic Curves Suitable for Pairing Based Cryptography." Designs, Codes and Cryptography 37, no. 1 (October 2005): 133–41. http://dx.doi.org/10.1007/s10623-004-3808-4.
Full textGranger, R., D. Page, and M. Stam. "On Small Characteristic Algebraic Tori in Pairing-Based Cryptography." LMS Journal of Computation and Mathematics 9 (2006): 64–85. http://dx.doi.org/10.1112/s1461157000001194.
Full textSkuratovskii, Ruslan, and Volodymyr Osadchyy. "Criterions of Supersinguliarity and Groups of Montgomery and Edwards Curves in Cryptography." WSEAS TRANSACTIONS ON MATHEMATICS 19 (March 1, 2021): 709–22. http://dx.doi.org/10.37394/23206.2020.19.77.
Full textDissertations / Theses on the topic "Curves, Elliptic. Cryptography"
Idrees, Zunera. "Elliptic Curves Cryptography." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-17544.
Full textEnos, Graham. "Binary Edwards curves in elliptic curve cryptography." Thesis, The University of North Carolina at Charlotte, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=3563153.
Full textEdwards curves are a new normal form for elliptic curves that exhibit some cryptographically desirable properties and advantages over the typical Weierstrass form. Because the group law on an Edwards curve (normal, twisted, or binary) is complete and unified, implementations can be safer from side channel or exceptional procedure attacks. The different types of Edwards provide a better platform for cryptographic primitives, since they have more security built into them from the mathematic foundation up.
Of the three types of Edwards curves—original, twisted, and binary—there hasn't been as much work done on binary curves. We provide the necessary motivation and background, and then delve into the theory of binary Edwards curves. Next, we examine practical considerations that separate binary Edwards curves from other recently proposed normal forms. After that, we provide some of the theory for binary curves that has been worked on for other types already: pairing computations. We next explore some applications of elliptic curve and pairing-based cryptography wherein the added security of binary Edwards curves may come in handy. Finally, we finish with a discussion of e2c2, a modern C++11 library we've developed for Edwards Elliptic Curve Cryptography.
Mus, Koksal. "An Alternative Normal Form For Elliptic Curve Cryptography: Edwards Curves." Master's thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12611065/index.pdf.
Full textOzturk, Erdinc. "Low Power Elliptic Curve Cryptography." Link to electronic thesis, 2004. http://www.wpi.edu/Pubs/ETD/Available/etd-050405-143155/.
Full textKeywords: low power; montgomery multiplication; elliptic curve crytography; modulus scaling; unified architecture; inversion; redundant signed digit. Includes bibliographical references (p.55-59).
Pemberton, Michael Paul Banks William David. "Elliptic curves and their applications in cryptography." Diss., Columbia, Mo. : University of Missouri--Columbia, 2009. http://hdl.handle.net/10355/5364.
Full textBathgate, Jonathan. "Elliptic Curves and their Applications to Cryptography." Thesis, Boston College, 2007. http://hdl.handle.net/2345/389.
Full textIn the last twenty years, Elliptic Curve Cryptography has become a standard for the transmission of secure data. The purpose of my thesis is to develop the necessary theory for the implementation of elliptic curve cryptosystems, using elementary number theory, abstract algebra, and geometry. This theory is based on developing formulas for adding rational points on an elliptic curve. The set of rational points on an elliptic curve form a group over the addition law as it is defined. Using the group law, my study continues into computing the torsion subgroup of an elliptic curve and considering elliptic curves over finite fields. With a brief introduction to cryptography and the theory developed in the early chapters, my thesis culminates in the explanation and implementation of three elliptic curve cryptosystems in the Java programming language
Thesis (BA) — Boston College, 2007
Submitted to: Boston College. College of Arts and Sciences
Discipline: Mathematics
Discipline: College Honors Program
Bartzia, Evmorfia-Iro. "A formalization of elliptic curves for cryptography." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLX002/document.
Full textThis thesis is in the domain of formalization of mathematics and ofverification of cryptographic algorithms. The implementation ofcryptographic algorithms is often a complicated task becausecryptographic programs are optimized in order to satisfy bothefficiency and security criteria. As a result it is not alwaysobvious that a cryptographique program actually corresponds to themathematical algorithm, i.e. that the program is correct. Errors incryprtographic programs may be disastrous for the security of anentire cryptosystem, hence certification of their correctness isrequired. Formal systems and proof assistants such as Coq andIsabelle-HOL are often used to provide guarantees and proofs thatcryptographic programs are correct. Elliptic curves are widely usedin cryptography, mainly as efficient groups for asymmetriccryptography. To develop formal proofs of correctness forelliptic-curve schemes, formal theory of elliptic curves is needed.Our motivation in this thesis is to formalize elliptic curve theoryusing the Coq proof assistant, which enables formal analysis ofelliptic-curve schemes and algorithms. For this purpose, we used theSsreflect extension and the mathematical libraries developed by theMathematical Components team during the formalization of the FourColor Theorem. Our central result is a formal proof of Picard’stheorem for elliptic curves: there exists an isomorphism between thePicard group of divisor classes and the group of points of an ellipticcurve. An important immediate consequence of this proposition is theassociativity of the elliptic curve group operation. Furthermore, wepresent a formal proof of correctness for the GLV algorithm for scalarmultiplication on elliptic curve groups. The GLV algorithm exploitsproperties of the elliptic curve group in order to acceleratecomputation. It is composed of three independent algorithms:multiexponentiation on a generic group, decomposition of the scalarand computing endomorphisms on algebraic curves. This developmentincludes theory about endomorphisms on elliptic curves and is morethan 5000 lines of code. An application of our formalization is alsopresented
Kirlar, Baris Bulent. "Elliptic Curve Pairing-based Cryptography." Phd thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612613/index.pdf.
Full textOzturk, Erdinc. "Low Power Elliptic Curve Cryptography." Digital WPI, 2005. https://digitalcommons.wpi.edu/etd-theses/691.
Full textSundriyal, Suresh. "Counting points on elliptic curves over Zp /." Online version of thesis, 2008. http://hdl.handle.net/1850/7929.
Full textBooks on the topic "Curves, Elliptic. Cryptography"
1955-, Seroussi G., and Smart Nigel P. 1967-, eds. Elliptic curves in cryptography. New York: Cambridge University Press, 1999.
Find full textBhandari, Ashwani K., D. S. Nagaraj, B. Ramakrishnan, and T. N. Venkataramana, eds. Elliptic Curves, Modular Forms and Cryptography. Gurgaon: Hindustan Book Agency, 2003. http://dx.doi.org/10.1007/978-93-86279-15-6.
Full textWashington, Lawrence C. Elliptic curves: Number theory and cryptography. 2nd ed. Boca Raton, FL: Chapman & Hall/CRC, 2008.
Find full textWashington, Lawrence C. Elliptic curves: Number theory and cryptography. 2nd ed. Boca Raton, FL: Chapman & Hall/CRC, 2008.
Find full textEnge, Andreas. Elliptic Curves and Their Applications to Cryptography. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-1-4615-5207-9.
Full textElliptic curves and their applications to cryptography: An introduction. Boston: Kluwer Academic, 1999.
Find full textEnge, Andreas. Elliptic curves and their applications to cryptography: An introduction. Boston: Kluwer Academic, 1999.
Find full textK, Bhandari A., ed. Elliptic curves, modular forms and cryptography: Proceedings of the Advanced Instructional Workshop on Algebraic Number Theory. New Delhi: Hindustan Book Agency, 2003.
Find full textBook chapters on the topic "Curves, Elliptic. Cryptography"
Smart, Nigel P. "Elliptic Curves." In Cryptography Made Simple, 67–78. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21936-3_4.
Full textHankerson, Darrel, and Alfred Menezes. "Elliptic Curves." In Encyclopedia of Cryptography and Security, 408–10. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_244.
Full textHankerson, Darrel, and Alfred Menezes. "Elliptic Curves." In Encyclopedia of Cryptography, Security and Privacy, 1–4. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_244-2.
Full textKoblitz, Neal. "Elliptic Curves." In A Course in Number Theory and Cryptography, 150–79. New York, NY: Springer US, 1987. http://dx.doi.org/10.1007/978-1-4684-0310-7_6.
Full textKoblitz, Neal. "Elliptic Curves." In A Course in Number Theory and Cryptography, 167–99. New York, NY: Springer New York, 1994. http://dx.doi.org/10.1007/978-1-4419-8592-7_6.
Full textHoffstein, Jeffrey, Jill Pipher, and Joseph H. Silverman. "Elliptic Curves and Cryptography." In Undergraduate Texts in Mathematics, 299–371. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4939-1711-2_6.
Full textBalasubramanian, R. "Elliptic Curves and Cryptography." In Elliptic Curves, Modular Forms and Cryptography, 325–45. Gurgaon: Hindustan Book Agency, 2003. http://dx.doi.org/10.1007/978-93-86279-15-6_23.
Full textWohlgemuth, Martin. "ECC — Elliptic Curves Cryptography." In Mathematisch für fortgeschrittene Anfänger, 305–15. Heidelberg: Spektrum Akademischer Verlag, 2010. http://dx.doi.org/10.1007/978-3-8274-2607-9_24.
Full textBhandari, Ashwani K. "Cryptography." In Elliptic Curves, Modular Forms and Cryptography, 269–74. Gurgaon: Hindustan Book Agency, 2003. http://dx.doi.org/10.1007/978-93-86279-15-6_19.
Full textHankerson, Darrel, and Alfred Menezes. "Koblitz Elliptic Curves." In Encyclopedia of Cryptography and Security, 705–6. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_872.
Full textConference papers on the topic "Curves, Elliptic. Cryptography"
Järvinen, Kimmo U., and Jorma O. Skyttä. "High-Speed Elliptic Curve Cryptography Accelerator for Koblitz Curves." In 2008 16th International Symposium on Field-Programmable Custom Computing Machines (FCCM). IEEE, 2008. http://dx.doi.org/10.1109/fccm.2008.30.
Full textBiao Liu, Jian-Hua Ge, Jian He, and Fei Jiang. "Practical group signatures from Hyper-elliptic Curves Cryptography." In 2011 International Conference on Electric Information and Control Engineering (ICEICE). IEEE, 2011. http://dx.doi.org/10.1109/iceice.2011.5777466.
Full textDzurenda, Petr, Jan Hajny, Lukas Malina, and Sara Ricci. "Anonymous Credentials with Practical Revocation using Elliptic Curves." In 14th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2017. http://dx.doi.org/10.5220/0006467705340539.
Full text"A SHORT NOTE ON SECRET SHARING USING ELLIPTIC CURVES." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2008. http://dx.doi.org/10.5220/0001918303590362.
Full textKamarulhaili, Hailiza. "Generating Elliptic Curves Modulo p for Cryptography Using Mathematica Software." In 2010 Seventh International Conference on Computer Graphics, Imaging and Visualization (CGIV). IEEE, 2010. http://dx.doi.org/10.1109/cgiv.2010.22.
Full text"RFID AUTHENTICATION PROTOCOLS BASED ON ELLIPTIC CURVES - A Top-Down Evaluation Survey." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2009. http://dx.doi.org/10.5220/0002186201010110.
Full textShaikh, Javed R., Maria Nenova, Georgi Iliev, and Zlatka Valkova-Jarvis. "Analysis of standard elliptic curves for the implementation of elliptic curve cryptography in resource-constrained E-commerce applications." In 2017 IEEE International Conference on Microwaves, Antennas, Communications and Electronic Systems (COMCAS). IEEE, 2017. http://dx.doi.org/10.1109/comcas.2017.8244805.
Full text"Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves." In International Conference on Security and Cryptography. SCITEPRESS - Science and and Technology Publications, 2013. http://dx.doi.org/10.5220/0004496300150026.
Full textBabenko, M., A. Tchernykh, A. Redvanov, and A. Djurabaev. "Comparative analysis of the scalar point multiplication algorithms in the NIST FIPS 186 elliptic curve cryptography." In 3rd International Workshop on Information, Computation, and Control Systems for Distributed Environments 2021. Crossref, 2021. http://dx.doi.org/10.47350/iccs-de.2021.02.
Full text"POINT MULTIPLICATION ON SUPERSINGULAR ELLIPTIC CURVES DEFINED OVER FIELDS OF CHARACTERISTIC 2 AND 3." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2008. http://dx.doi.org/10.5220/0001926103730376.
Full textReports on the topic "Curves, Elliptic. Cryptography"
Lochter, M., and J. Merkle. Elliptic Curve Cryptography (ECC) Brainpool Standard Curves and Curve Generation. RFC Editor, March 2010. http://dx.doi.org/10.17487/rfc5639.
Full textMerkle, J., and M. Lochter. Elliptic Curve Cryptography (ECC) Brainpool Curves for Transport Layer Security (TLS). RFC Editor, October 2013. http://dx.doi.org/10.17487/rfc7027.
Full textBruckert, L., J. Merkle, and M. Lochter. Elliptic Curve Cryptography (ECC) Brainpool Curves for Transport Layer Security (TLS) Version 1.3. RFC Editor, February 2020. http://dx.doi.org/10.17487/rfc8734.
Full textMerkle, J., and M. Lochter. Using the Elliptic Curve Cryptography (ECC) Brainpool Curves for the Internet Key Exchange Protocol Version 2 (IKEv2). RFC Editor, July 2013. http://dx.doi.org/10.17487/rfc6954.
Full textMcGrew, D., K. Igoe, and M. Salter. Fundamental Elliptic Curve Cryptography Algorithms. RFC Editor, February 2011. http://dx.doi.org/10.17487/rfc6090.
Full textTurner, S., and D. Brown. Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS). RFC Editor, January 2010. http://dx.doi.org/10.17487/rfc5753.
Full textBlake-Wilson, S., D. Brown, and P. Lambert. Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS). RFC Editor, April 2002. http://dx.doi.org/10.17487/rfc3278.
Full textJivsov, A. Elliptic Curve Cryptography (ECC) in OpenPGP. RFC Editor, June 2012. http://dx.doi.org/10.17487/rfc6637.
Full textTurner, S., D. Brown, K. Yiu, R. Housley, and T. Polk. Elliptic Curve Cryptography Subject Public Key Information. RFC Editor, March 2009. http://dx.doi.org/10.17487/rfc5480.
Full textWoodbury, Adam D., Daniel V. Bailey, and Christof Paar. Elliptic Curve Cryptography on Smart Cards Without Coprocessors. Fort Belvoir, VA: Defense Technical Information Center, September 2000. http://dx.doi.org/10.21236/ada385851.
Full text