Artículos de revistas sobre el tema "Cryptography, elliptic curve, compiler theory"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Cryptography, elliptic curve, compiler theory".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Sanjeewa, R. y B. A. K. Welihinda. "Elliptic Curve Cryptography and Coding Theory". International Journal of Multidisciplinary Studies 3, n.º 2 (28 de enero de 2017): 99. http://dx.doi.org/10.4038/ijms.v3i2.12.
Texto completoBernstein, Daniel J. y Tanja Lange. "Hyper-and-elliptic-curve cryptography". LMS Journal of Computation and Mathematics 17, A (2014): 181–202. http://dx.doi.org/10.1112/s1461157014000394.
Texto completoRabah, Kefa. "Theory and Implementation of Elliptic Curve Cryptography". Journal of Applied Sciences 5, n.º 4 (15 de marzo de 2005): 604–33. http://dx.doi.org/10.3923/jas.2005.604.633.
Texto completoCui, Chao, Yun Zhao, Yong Xiao, Weibin Lin y Di Xu. "A Hardware-Efficient Elliptic Curve Cryptographic Architecture over GF (p)". Mathematical Problems in Engineering 2021 (18 de mayo de 2021): 1–7. http://dx.doi.org/10.1155/2021/8883614.
Texto completoPrabakaran, B., T. R. Sumithira y V. Nagaraj. "Smart Grid Communication Under Elliptic Curve Cryptography". Intelligent Automation & Soft Computing 36, n.º 2 (2023): 2333–47. http://dx.doi.org/10.32604/iasc.2023.029725.
Texto completoAljamaly, Karrar Taher R. y Ruma Kareem K. Ajeena. "The elliptic scalar multiplication graph and its application in elliptic curve cryptography". Journal of Discrete Mathematical Sciences and Cryptography 24, n.º 6 (18 de agosto de 2021): 1793–807. http://dx.doi.org/10.1080/09720529.2021.1932896.
Texto completoReddy, P. Vasudeva y M. Padmavathamma. "An authenticated key exchange protocol in elliptic curve cryptography". Journal of Discrete Mathematical Sciences and Cryptography 10, n.º 5 (octubre de 2007): 697–705. http://dx.doi.org/10.1080/09720529.2007.10698150.
Texto completoKumari, Adesh, M. Yahya Abbasi, Vinod Kumar y Akber Ali Khan. "A secure user authentication protocol using elliptic curve cryptography". Journal of Discrete Mathematical Sciences and Cryptography 22, n.º 4 (19 de mayo de 2019): 521–30. http://dx.doi.org/10.1080/09720529.2019.1637155.
Texto completoKoblitz, Ann Hibner, Neal Koblitz y Alfred Menezes. "Elliptic curve cryptography: The serpentine course of a paradigm shift". Journal of Number Theory 131, n.º 5 (mayo de 2011): 781–814. http://dx.doi.org/10.1016/j.jnt.2009.01.006.
Texto completoSudharson, K. y S. Arun. "Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm". Intelligent Automation & Soft Computing 34, n.º 3 (2022): 1769–84. http://dx.doi.org/10.32604/iasc.2022.026483.
Texto completoJungeblut, T., C. Puttmann, R. Dreesen, M. Porrmann, M. Thies, U. Rückert y U. Kastens. "Resource efficiency of hardware extensions of a 4-issue VLIW processor for elliptic curve cryptography". Advances in Radio Science 8 (22 de diciembre de 2010): 295–305. http://dx.doi.org/10.5194/ars-8-295-2010.
Texto completoAranha, Diego, Ricardo Dahab, Julio López y Leonardo Oliveira. "Efficient implementation of elliptic curve cryptography in wireless sensors". Advances in Mathematics of Communications 4, n.º 2 (mayo de 2010): 169–87. http://dx.doi.org/10.3934/amc.2010.4.169.
Texto completoKumari, Arpana y Vivek Kapoor. "Competing secure text encryption in intranet using elliptic curve cryptography". Journal of Discrete Mathematical Sciences and Cryptography 23, n.º 2 (17 de febrero de 2020): 631–41. http://dx.doi.org/10.1080/09720529.2020.1729509.
Texto completoKonstantinou, Elisavet y Aristides Kontogeorgis. "Ramanujan’s class invariants and their use in elliptic curve cryptography". Computers & Mathematics with Applications 59, n.º 8 (abril de 2010): 2901–17. http://dx.doi.org/10.1016/j.camwa.2010.02.008.
Texto completoMehrabi, Mohamad Ali, Christophe Doche y Alireza Jolfaei. "Elliptic Curve Cryptography Point Multiplication Core for Hardware Security Module". IEEE Transactions on Computers 69, n.º 11 (1 de noviembre de 2020): 1707–18. http://dx.doi.org/10.1109/tc.2020.3013266.
Texto completoPote, Santoshi, Virendra Sule y B. K. Lande. "Elliptic curve cryptography arithmetic in terms of one variable polynomial division". Journal of Discrete Mathematical Sciences and Cryptography 23, n.º 8 (5 de marzo de 2020): 1545–71. http://dx.doi.org/10.1080/09720529.2019.1702754.
Texto completoV. Rajesh, Kannan. "On-demand based wireless with hybrid cryptography in MANET". i-manager’s Journal on Wireless Communication Networks 10, n.º 2 (2022): 8. http://dx.doi.org/10.26634/jwcn.10.2.18937.
Texto completoJao, David, Stephen D. Miller y Ramarathnam Venkatesan. "Expander graphs based on GRH with an application to elliptic curve cryptography". Journal of Number Theory 129, n.º 6 (junio de 2009): 1491–504. http://dx.doi.org/10.1016/j.jnt.2008.11.006.
Texto completoHakuta, Keisuke. "Metrics on the Sets of Nonsupersingular Elliptic Curves in Simplified Weierstrass Form over Finite Fields of Characteristic Two". International Journal of Mathematics and Mathematical Sciences 2015 (2015): 1–5. http://dx.doi.org/10.1155/2015/597849.
Texto completoHafizul Islam, SK, Mohammad Sabzinejad Farash, G. P. Biswas, Muhammad Khurram Khan y Mohammad S. Obaidat. "A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography". International Journal of Computer Mathematics 94, n.º 1 (28 de septiembre de 2015): 39–55. http://dx.doi.org/10.1080/00207160.2015.1088148.
Texto completoTossavainen, Timo. "Cryptography based on algebraic perpendicularities". Mathematical Gazette 107, n.º 568 (16 de febrero de 2023): 65–69. http://dx.doi.org/10.1017/mag.2023.8.
Texto completoKieu-Do-Nguyen, Binh, Cuong Pham-Quoc, Ngoc-Thinh Tran, Cong-Kha Pham y Trong-Thuc Hoang. "Low-Cost Area-Efficient FPGA-Based Multi-Functional ECDSA/EdDSA". Cryptography 6, n.º 2 (10 de mayo de 2022): 25. http://dx.doi.org/10.3390/cryptography6020025.
Texto completoDimitrov, Vassil, Laurent Imbert y Pradeep K. Mishra. "The double-base number system and its application to elliptic curve cryptography". Mathematics of Computation 77, n.º 262 (11 de diciembre de 2007): 1075–105. http://dx.doi.org/10.1090/s0025-5718-07-02048-0.
Texto completoCarita, Sa'aadah Sajjana y Evie Sri Wahyuni. "Modifikasi Tanda Tangan Digital Pada Skema Esign Berbasis Kurva Eliptik". Jurnal Ilmiah SINUS 20, n.º 2 (19 de julio de 2022): 33. http://dx.doi.org/10.30646/sinus.v20i2.625.
Texto completoIslam, SK Hafizul y G. P. Biswas. "Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography". International Journal of Computer Mathematics 90, n.º 11 (noviembre de 2013): 2244–58. http://dx.doi.org/10.1080/00207160.2013.776674.
Texto completoIlyani Ahmad, Jasmin, Roshidi Din y Mazida Ahmad. "Analysis Review on Public Key Cryptography Algorithms". Indonesian Journal of Electrical Engineering and Computer Science 12, n.º 2 (1 de noviembre de 2018): 447. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp447-454.
Texto completoJimoh, R. G., M. AbdulRaheem, I. R. Salimonu y O. V. Mejabi. "Elliptic Curve Cryptosystem in securing Communication across Unsecure Channel". Circulation in Computer Science 2, n.º 5 (20 de junio de 2017): 7–12. http://dx.doi.org/10.22632/ccs-2017-251-97.
Texto completoAmento, Brittanney, Martin Rotteler y Rainer Steinwalds. "Efficient quantum circuits for binary elliptic curve arithmetic: reducing $T$-gate complexity". Quantum Information and Computation 13, n.º 7&8 (mayo de 2013): 631–44. http://dx.doi.org/10.26421/qic13.7-8-5.
Texto completoY. David Solomon Raju, Thammaneni Snehitha Reddy,. "Implementation of Data Security with Wallace Tree Approach Using Elliptical Curve Cryptography on FPGA". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, n.º 6 (5 de abril de 2021): 1546–53. http://dx.doi.org/10.17762/turcomat.v12i6.2693.
Texto completoElahi, Kashif, Ali Ahmad y Roslan Hasni. "Construction Algorithm for Zero Divisor Graphs of Finite Commutative Rings and Their Vertex-Based Eccentric Topological Indices". Mathematics 6, n.º 12 (4 de diciembre de 2018): 301. http://dx.doi.org/10.3390/math6120301.
Texto completoKabin, Ievgen, Zoya Dyka, Dan Klann, Marcin Aftowicz y Peter Langendoerfer. "Resistance of the Montgomery Ladder Against Simple SCA: Theory and Practice". Journal of Electronic Testing 37, n.º 3 (junio de 2021): 289–303. http://dx.doi.org/10.1007/s10836-021-05951-3.
Texto completoHOOBI, Mays M. "SURVEY: EFFICIENT HYBRID ALGOR ITHMS OF CRYPTOGRAPHY". MINAR International Journal of Applied Sciences and Technology 2, n.º 4 (1 de diciembre de 2020): 1–16. http://dx.doi.org/10.47832/2717-8234.4-2.1.
Texto completoLiu, Zhe, Johann GroBschadl, Zhi Hu, Kimmo Jarvinen, Husen Wang y Ingrid Verbauwhede. "Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things". IEEE Transactions on Computers 66, n.º 5 (1 de mayo de 2017): 773–85. http://dx.doi.org/10.1109/tc.2016.2623609.
Texto completoWang, Chao, HuanGuo Zhang y LiLi Liu. "Evolutionary cryptography theory based generating method for a secure Koblitz elliptic curve and its improvement by a hidden Markov models". Science China Information Sciences 55, n.º 4 (14 de marzo de 2012): 911–20. http://dx.doi.org/10.1007/s11432-012-4552-4.
Texto completoPetit, Christophe. "Finding roots in with the successive resultants algorithm". LMS Journal of Computation and Mathematics 17, A (2014): 203–17. http://dx.doi.org/10.1112/s1461157014000138.
Texto completoBartolini, Sandro, Irina Branovic, Roberto Giorgi y Enrico Martinelli. "Effects of Instruction-Set Extensions on an Embedded Processor: A Case Study on Elliptic Curve Cryptography over GF(2/sup m/)". IEEE Transactions on Computers 57, n.º 5 (2008): 672–85. http://dx.doi.org/10.1109/tc.2007.70832.
Texto completoEngouang, Tristan Daladier, Yun Liu y Zhenjiang Zhang. "TDAL: Thoroughly Data Aggregation of Low Energy Devices in Secure Heterogeneous Wireless Sensor Networks". Journal of Sensors 2014 (2014): 1–15. http://dx.doi.org/10.1155/2014/938480.
Texto completoBoumerzoug, Hayette, Boucif Amar Bensaber y Ismail Biskri. "A lightweight key management scheme based on an Adelson-Velskii and Landis tree and elliptic curve cryptography for wireless sensor networks". Concurrency and Computation: Practice and Experience 28, n.º 6 (24 de octubre de 2013): 1831–47. http://dx.doi.org/10.1002/cpe.3153.
Texto completoZhou, Jie, Jian Bai y Meng Shan Jiang. "White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode". Security and Communication Networks 2020 (19 de noviembre de 2020): 1–10. http://dx.doi.org/10.1155/2020/8881116.
Texto completoRajasekar, Vani, Muzafer Saračević, Darjan Karabašević, Dragiša Stanujkić, Eldin Dobardžić y Sathya Krishnamoorthi. "Efficient Cancelable Template Generation Based on Signcryption and Bio Hash Function". Axioms 11, n.º 12 (29 de noviembre de 2022): 684. http://dx.doi.org/10.3390/axioms11120684.
Texto completoБаскаков, Д. Е., Е. Ю. Кузнецова y А. Л. Стариченков. "Implementation of Lightweight Elliptic Curve Cryptography for Security and Privacy in Cyber-Physical Systems of Intelligent Environmental Monitoring for the Northern Sea Route". MORSKIE INTELLEKTUAL`NYE TEHNOLOGII)</msg>, n.º 4(58) (2 de diciembre de 2022): 185–92. http://dx.doi.org/10.37220/mit.2022.58.4.041.
Texto completoNayyar, Anand, Rudra Rameshwar y Piyush Kanti Dutta. "Special Issue on Recent Trends and Future of Fog and Edge Computing, Services and Enabling Technologies". Scalable Computing: Practice and Experience 20, n.º 2 (2 de mayo de 2019): iii—vi. http://dx.doi.org/10.12694/scpe.v20i2.1558.
Texto completo"Image Pixel Permutation Operation Based on Elliptic Curve Cryptography". Applied Mathematics & Information Sciences 13, S1 (1 de agosto de 2019): 183–89. http://dx.doi.org/10.18576/amis/13s119.
Texto completoBanik, Arpita, Laiphrakpam Dolendro Singh, Amit Agrawal y Ripon Patgiri. "Secret image encryption based on chaotic system and elliptic curve cryptography". Digital Signal Processing, julio de 2022, 103639. http://dx.doi.org/10.1016/j.dsp.2022.103639.
Texto completo"High speed elliptic curve cryptography architecture for NIST recommended Galois field". International Journal of Advanced Technology and Engineering Exploration 9, n.º 97 (31 de diciembre de 2022). http://dx.doi.org/10.19101/ijatee.2021.875995.
Texto completoĎuriš, Viliam y Timotej Šumný. "Number of rational points of elliptic curves". Asian-European Journal of Mathematics, 31 de marzo de 2021, 2250017. http://dx.doi.org/10.1142/s1793557122500176.
Texto completoV, Sri Vigna Hema y Ramesh K. "Augmented security for healthcare data using obfuscation and elliptic curve cryptography algorithm in health cloud environment". Concurrency and Computation: Practice and Experience, 17 de agosto de 2022. http://dx.doi.org/10.1002/cpe.7275.
Texto completo"Improved Hyper Elliptic Curve Cryptography with Hybrid Bat Algorithm for Tasks Replication to Meet Deadlines in Clouds". Applied Mathematics & Information Sciences 13, S1 (1 de agosto de 2019): 337–47. http://dx.doi.org/10.18576/amis/13s137.
Texto completoAiyshwariya Devi, R. y A. R. Arunachalam. "Enhancement of IoT device security using an Improved Elliptic Curve Cryptography algorithm and malware detection utilizing deep LSTM". High-Confidence Computing, marzo de 2023, 100117. http://dx.doi.org/10.1016/j.hcc.2023.100117.
Texto completoBanu Priya, G. y K. Dharani. "Secure Transmission of Data through Electronic Devices using ECC Algorithm". International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 1 de marzo de 2019, 130–35. http://dx.doi.org/10.32628/cseit195223.
Texto completo