Journal articles on the topic 'Curves, Elliptic. Cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Curves, Elliptic. Cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Abhishek, Kunal, and E. George Dharma Prakash Raj. "Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography." Cybernetics and Information Technologies 21, no. 2 (June 1, 2021): 70–88. http://dx.doi.org/10.2478/cait-2021-0020.
Full textMiret, Josep M., Daniel Sadornil, and Juan G. Tena. "Pairing-Based Cryptography on Elliptic Curves." Mathematics in Computer Science 12, no. 3 (June 27, 2018): 309–18. http://dx.doi.org/10.1007/s11786-018-0347-3.
Full textHakuta, Keisuke. "Metrics on the Sets of Nonsupersingular Elliptic Curves in Simplified Weierstrass Form over Finite Fields of Characteristic Two." International Journal of Mathematics and Mathematical Sciences 2015 (2015): 1–5. http://dx.doi.org/10.1155/2015/597849.
Full textMORALES-SANDOVAL, M., C. FEREGRINO-URIBE, R. CUMPLIDO, and I. ALGREDO-BADILLO. "A SINGLE FORMULA AND ITS IMPLEMENTATION IN FPGA FOR ELLIPTIC CURVE POINT ADDITION USING AFFINE REPRESENTATION." Journal of Circuits, Systems and Computers 19, no. 02 (April 2010): 425–33. http://dx.doi.org/10.1142/s0218126610006153.
Full textHuque, Md Sirajul, Sk Bhadar Saheb, and Jayaram Boga. "An Approach to Secure Data Aggregation in Wireless Sensor Networks (WSN) using Asymmetric Homomorphic Encryption (Elliptic Curve Cryptography) Scheme." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (August 1, 2017): 263. http://dx.doi.org/10.23956/ijarcsse/v7i7/0162.
Full textFuta, Yuichi, Hiroyuki Okazaki, Daichi Mizushima, and Yasunari Shidama. "Operations of Points on Elliptic Curve in Projective Coordinates." Formalized Mathematics 20, no. 1 (January 1, 2012): 87–95. http://dx.doi.org/10.2478/v10037-012-0012-2.
Full textSonnino, Alberto, and Giorgio Sonnino. "Elliptic-Curves Cryptography on High-Dimensional Surfaces." International Journal of Advanced Engineering Research and Science 4, no. 2 (2017): 140–46. http://dx.doi.org/10.22161/ijaers.4.2.28.
Full textBrezing, Friederike, and Annegret Weng. "Elliptic Curves Suitable for Pairing Based Cryptography." Designs, Codes and Cryptography 37, no. 1 (October 2005): 133–41. http://dx.doi.org/10.1007/s10623-004-3808-4.
Full textGranger, R., D. Page, and M. Stam. "On Small Characteristic Algebraic Tori in Pairing-Based Cryptography." LMS Journal of Computation and Mathematics 9 (2006): 64–85. http://dx.doi.org/10.1112/s1461157000001194.
Full textSkuratovskii, Ruslan, and Volodymyr Osadchyy. "Criterions of Supersinguliarity and Groups of Montgomery and Edwards Curves in Cryptography." WSEAS TRANSACTIONS ON MATHEMATICS 19 (March 1, 2021): 709–22. http://dx.doi.org/10.37394/23206.2020.19.77.
Full textFuta, Yuichi, Hiroyuki Okazaki, and Yasunari Shidama. "Operations of Points on Elliptic Curve in Affine Coordinates." Formalized Mathematics 27, no. 3 (October 1, 2019): 315–20. http://dx.doi.org/10.2478/forma-2019-0026.
Full textWeku, Winsy. "Model Proyeksi (X/Z2, Y/Z2) pada Kurva Hesian Secara Paralel Menggunakan Mekanisme Kriptografi Kurva Eliptik." JURNAL ILMIAH SAINS 12, no. 1 (April 30, 2012): 65. http://dx.doi.org/10.35799/jis.12.1.2012.404.
Full textDavid, C., and J. Wu. "Pseudoprime Reductions of Elliptic Curves." Canadian Journal of Mathematics 64, no. 1 (February 1, 2012): 81–101. http://dx.doi.org/10.4153/cjm-2011-044-x.
Full textPuttmann, C., J. Shokrollahi, M. Porrmann, and U. Rückert. "Hardware Accelerators for Elliptic Curve Cryptography." Advances in Radio Science 6 (May 26, 2008): 259–64. http://dx.doi.org/10.5194/ars-6-259-2008.
Full textKim, Suhri, Kisoon Yoon, Jihoon Kwon, Seokhie Hong, and Young-Ho Park. "Efficient Isogeny Computations on Twisted Edwards Curves." Security and Communication Networks 2018 (July 15, 2018): 1–11. http://dx.doi.org/10.1155/2018/5747642.
Full textYann Cedric Lawson, Teyi, and Senthilnathan T. "Effectiveness of the NIZKP Protocol for Authentication in IoT Environment." International Journal of Engineering & Technology 7, no. 2.6 (March 11, 2018): 231. http://dx.doi.org/10.14419/ijet.v7i2.6.10775.
Full textGalbraith, Steven D. "Constructing Isogenies between Elliptic Curves Over Finite Fields." LMS Journal of Computation and Mathematics 2 (1999): 118–38. http://dx.doi.org/10.1112/s1461157000000097.
Full textGalbraith, Steven D., Xibin Lin, and Michael Scott. "Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves." Journal of Cryptology 24, no. 3 (May 4, 2010): 446–69. http://dx.doi.org/10.1007/s00145-010-9065-y.
Full textDuemong, Fudailah, and Ladda Preechaveerakul. "A Large Scalar Multiplication Algorithm using Modified Pell Numbers for Key Generation." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 15, no. 2 (May 5, 2021): 220–31. http://dx.doi.org/10.37936/ecti-cit.2021152.227427.
Full textKoblitz, N. "Good and Bad Uses of Elliptic Curves in Cryptography." Moscow Mathematical Journal 2, no. 4 (2002): 693–715. http://dx.doi.org/10.17323/1609-4514-2002-2-4-693-715.
Full textShanmugam, Ram. "Elliptic Curves and Their Applications to Cryptography: An Introduction." Neurocomputing 41, no. 1-4 (October 2001): 193. http://dx.doi.org/10.1016/s0925-2312(01)00332-0.
Full textScholl, Travis. "Super-Isolated Elliptic Curves and Abelian Surfaces in Cryptography." Experimental Mathematics 28, no. 4 (January 3, 2018): 385–97. http://dx.doi.org/10.1080/10586458.2017.1412371.
Full textHeß, Florian, Andreas Stein, Sandra Stein, and Manfred Lochter. "The Magic of Elliptic Curves and Public-Key Cryptography." Jahresbericht der Deutschen Mathematiker-Vereinigung 114, no. 2 (April 6, 2012): 59–88. http://dx.doi.org/10.1365/s13291-012-0038-y.
Full textXu, MaoZhi, ChunLai Zhao, Min Feng, ZhaoRong Ren, and JiQing Ye. "Cryptography on elliptic curves over p-adic number fields." Science in China Series F: Information Sciences 51, no. 3 (March 2008): 258–72. http://dx.doi.org/10.1007/s11432-008-0014-4.
Full textWang, Mingqiang, and Tao Zhan. "Analysis of the Fault Attack ECDLP over Prime Field." Journal of Applied Mathematics 2011 (2011): 1–11. http://dx.doi.org/10.1155/2011/580749.
Full textDal Negro, Luca Dal, Yuyao Chen, and Fabrizio Sgrignuoli. "Aperiodic Photonics of Elliptic Curves." Crystals 9, no. 9 (September 14, 2019): 482. http://dx.doi.org/10.3390/cryst9090482.
Full textJudge, Lyndon, Suvarna Mane, and Patrick Schaumont. "A Hardware-Accelerated ECDLP with High-Performance Modular Multiplication." International Journal of Reconfigurable Computing 2012 (2012): 1–14. http://dx.doi.org/10.1155/2012/439021.
Full textAlsaedi, Ramzi, Abdelwahab Dhifli, and Abdeljabbar Ghanmi. "Nonlinearities on particular elliptic curves subspaces and applications." Analele Universitatii "Ovidius" Constanta - Seria Matematica 28, no. 3 (December 1, 2020): 39–49. http://dx.doi.org/10.2478/auom-2020-0033.
Full textBos, Joppe W., Craig Costello, Patrick Longa, and Michael Naehrig. "Selecting elliptic curves for cryptography: an efficiency and security analysis." Journal of Cryptographic Engineering 6, no. 4 (May 1, 2015): 259–86. http://dx.doi.org/10.1007/s13389-015-0097-y.
Full textAmento, Brittanney, Martin Rotteler, and Rainer Steinwalds. "Efficient quantum circuits for binary elliptic curve arithmetic: reducing $T$-gate complexity." Quantum Information and Computation 13, no. 7&8 (May 2013): 631–44. http://dx.doi.org/10.26421/qic13.7-8-5.
Full textGalbraith, Steven D., and Victor Rotger. "Easy Decision Diffie-Hellman Groups." LMS Journal of Computation and Mathematics 7 (2004): 201–18. http://dx.doi.org/10.1112/s1461157000001108.
Full textCharles, Denis, and Kristin Lauter. "Computing Modular Polynomials." LMS Journal of Computation and Mathematics 8 (2005): 195–204. http://dx.doi.org/10.1112/s1461157000000954.
Full textDi Matteo, Stefano, Luca Baldanzi, Luca Crocetti, Pietro Nannipieri, Luca Fanucci, and Sergio Saponara. "Secure Elliptic Curve Crypto-Processor for Real-Time IoT Applications." Energies 14, no. 15 (August 1, 2021): 4676. http://dx.doi.org/10.3390/en14154676.
Full textImamverdiev, Ya N. "New Countermeasures Against Side-Channel Attacks for Cryptography on Elliptic Curves." Telecommunications and Radio Engineering 65, no. 10 (2006): 913–22. http://dx.doi.org/10.1615/telecomradeng.v65.i10.40.
Full textKoziel, Brian, Reza Azarderakhsh, Mehran Mozaffari Kermani, and David Jao. "Post-Quantum Cryptography on FPGA Based on Isogenies on Elliptic Curves." IEEE Transactions on Circuits and Systems I: Regular Papers 64, no. 1 (January 2017): 86–99. http://dx.doi.org/10.1109/tcsi.2016.2611561.
Full textGalbraith, Steven. "ELLIPTIC CURVES IN CRYPTOGRAPHY (London Mathematical Society Lecture Note Series 265)." Bulletin of the London Mathematical Society 32, no. 5 (September 2000): 625–26. http://dx.doi.org/10.1112/s0024609300247371.
Full textErrahmani, Hichem Bouchakour, and Hind Ikni. "Verifiable Self-Selecting Secret Sharing Based on Elliptic Curves." International Journal of Software Innovation 8, no. 3 (July 2020): 51–68. http://dx.doi.org/10.4018/ijsi.2020070104.
Full textYeh, Hsiu-Lien, Tien-Ho Chen, Pin-Chuan Liu, Tai-Hoo Kim, and Hsin-Wen Wei. "A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography." Sensors 11, no. 5 (May 2, 2011): 4767–79. http://dx.doi.org/10.3390/s110504767.
Full textSajid, Asher, Muhammad Rashid, Sajjad Shaukat Jamal, Malik Imran, Saud S. Alotaibi, and Mohammed H. Sinky. "AREEBA: An Area Efficient Binary Huff-Curve ARchitecture." Electronics 10, no. 12 (June 20, 2021): 1490. http://dx.doi.org/10.3390/electronics10121490.
Full textZhou, Xuan Wu. "Improved Signcryption Schemes Based on Hyper-Elliptic Curves Cryptosystem." Applied Mechanics and Materials 20-23 (January 2010): 546–52. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.546.
Full textIslam, Md Mainul, Md Selim Hossain, Moh Khalid Hasan, Md Shahjalal, and Yeong Min Jang. "Design and Implementation of High-Performance ECC Processor with Unified Point Addition on Twisted Edwards Curve." Sensors 20, no. 18 (September 10, 2020): 5148. http://dx.doi.org/10.3390/s20185148.
Full textShi, Wenbo, and Peng Gong. "A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography." International Journal of Distributed Sensor Networks 9, no. 4 (January 2013): 730831. http://dx.doi.org/10.1155/2013/730831.
Full textChoi, Younsung, Donghoon Lee, Jiye Kim, Jaewook Jung, Junghyun Nam, and Dongho Won. "Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography." Sensors 14, no. 6 (June 10, 2014): 10081–106. http://dx.doi.org/10.3390/s140610081.
Full textJimoh, R. G., M. AbdulRaheem, I. R. Salimonu, and O. V. Mejabi. "Elliptic Curve Cryptosystem in securing Communication across Unsecure Channel." Circulation in Computer Science 2, no. 5 (June 20, 2017): 7–12. http://dx.doi.org/10.22632/ccs-2017-251-97.
Full textAlmajed, Hisham, Ahmad Almogren, and Mohammed Alabdulkareem. "iTrust—A Trustworthy and Efficient Mapping Scheme in Elliptic Curve Cryptography." Sensors 20, no. 23 (November 30, 2020): 6841. http://dx.doi.org/10.3390/s20236841.
Full textHeo, Donghoe, Suhri Kim, Kisoon Yoon, Young-Ho Park, and Seokhie Hong. "Optimized CSIDH Implementation Using a 2-Torsion Point." Cryptography 4, no. 3 (July 29, 2020): 20. http://dx.doi.org/10.3390/cryptography4030020.
Full textJoshi, Artur. "Personal data storage and management using error correction codes and elliptic curves proxy signature algorithm." Modeling, Control and Information Technologies, no. 3 (November 5, 2019): 179–81. http://dx.doi.org/10.31713/mcit.2019.23.
Full textChen, Huifang, Linlin Ge, and Lei Xie. "A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks." Sensors 15, no. 7 (July 14, 2015): 17057–75. http://dx.doi.org/10.3390/s150717057.
Full textGreen, Frederic. "Review of Modern Cryptography and Elliptic Curves, A Beginner's Guide by Thomas R. Shemanske." ACM SIGACT News 50, no. 2 (July 24, 2019): 12–14. http://dx.doi.org/10.1145/3351452.3351457.
Full textSalah, Med Saïd, Abderrahim Maizate, Mohamed Ouzzif, and Mohamed Toumi. "Powerful mobile nodes for enhancing wireless sensor networks' security and lifetime." Engineering review 39, no. 1 (2019): 60–70. http://dx.doi.org/10.30765/er.39.1.7.
Full text