Добірка наукової літератури з теми "Cryptography, elliptic curve, compiler theory"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Cryptography, elliptic curve, compiler theory".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Cryptography, elliptic curve, compiler theory"
Sanjeewa, R., and B. A. K. Welihinda. "Elliptic Curve Cryptography and Coding Theory." International Journal of Multidisciplinary Studies 3, no. 2 (January 28, 2017): 99. http://dx.doi.org/10.4038/ijms.v3i2.12.
Повний текст джерелаBernstein, Daniel J., and Tanja Lange. "Hyper-and-elliptic-curve cryptography." LMS Journal of Computation and Mathematics 17, A (2014): 181–202. http://dx.doi.org/10.1112/s1461157014000394.
Повний текст джерелаRabah, Kefa. "Theory and Implementation of Elliptic Curve Cryptography." Journal of Applied Sciences 5, no. 4 (March 15, 2005): 604–33. http://dx.doi.org/10.3923/jas.2005.604.633.
Повний текст джерелаCui, Chao, Yun Zhao, Yong Xiao, Weibin Lin, and Di Xu. "A Hardware-Efficient Elliptic Curve Cryptographic Architecture over GF (p)." Mathematical Problems in Engineering 2021 (May 18, 2021): 1–7. http://dx.doi.org/10.1155/2021/8883614.
Повний текст джерелаPrabakaran, B., T. R. Sumithira, and V. Nagaraj. "Smart Grid Communication Under Elliptic Curve Cryptography." Intelligent Automation & Soft Computing 36, no. 2 (2023): 2333–47. http://dx.doi.org/10.32604/iasc.2023.029725.
Повний текст джерелаAljamaly, Karrar Taher R., and Ruma Kareem K. Ajeena. "The elliptic scalar multiplication graph and its application in elliptic curve cryptography." Journal of Discrete Mathematical Sciences and Cryptography 24, no. 6 (August 18, 2021): 1793–807. http://dx.doi.org/10.1080/09720529.2021.1932896.
Повний текст джерелаReddy, P. Vasudeva, and M. Padmavathamma. "An authenticated key exchange protocol in elliptic curve cryptography." Journal of Discrete Mathematical Sciences and Cryptography 10, no. 5 (October 2007): 697–705. http://dx.doi.org/10.1080/09720529.2007.10698150.
Повний текст джерелаKumari, Adesh, M. Yahya Abbasi, Vinod Kumar, and Akber Ali Khan. "A secure user authentication protocol using elliptic curve cryptography." Journal of Discrete Mathematical Sciences and Cryptography 22, no. 4 (May 19, 2019): 521–30. http://dx.doi.org/10.1080/09720529.2019.1637155.
Повний текст джерелаKoblitz, Ann Hibner, Neal Koblitz, and Alfred Menezes. "Elliptic curve cryptography: The serpentine course of a paradigm shift." Journal of Number Theory 131, no. 5 (May 2011): 781–814. http://dx.doi.org/10.1016/j.jnt.2009.01.006.
Повний текст джерелаSudharson, K., and S. Arun. "Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm." Intelligent Automation & Soft Computing 34, no. 3 (2022): 1769–84. http://dx.doi.org/10.32604/iasc.2022.026483.
Повний текст джерелаДисертації з теми "Cryptography, elliptic curve, compiler theory"
Bathgate, Jonathan. "Elliptic Curves and their Applications to Cryptography." Thesis, Boston College, 2007. http://hdl.handle.net/2345/389.
Повний текст джерелаIn the last twenty years, Elliptic Curve Cryptography has become a standard for the transmission of secure data. The purpose of my thesis is to develop the necessary theory for the implementation of elliptic curve cryptosystems, using elementary number theory, abstract algebra, and geometry. This theory is based on developing formulas for adding rational points on an elliptic curve. The set of rational points on an elliptic curve form a group over the addition law as it is defined. Using the group law, my study continues into computing the torsion subgroup of an elliptic curve and considering elliptic curves over finite fields. With a brief introduction to cryptography and the theory developed in the early chapters, my thesis culminates in the explanation and implementation of three elliptic curve cryptosystems in the Java programming language
Thesis (BA) — Boston College, 2007
Submitted to: Boston College. College of Arts and Sciences
Discipline: Mathematics
Discipline: College Honors Program
Wilcox, Nicholas. "A Computational Introduction to Elliptic and Hyperelliptic Curve Cryptography." Oberlin College Honors Theses / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=oberlin1528649455201473.
Повний текст джерелаKosek, Amy. "An Exploration of Mathematical Applications in Cryptography." The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1428944810.
Повний текст джерелаBradley, Tatiana. "A Cryptographic Attack: Finding the Discrete Logarithm on Elliptic Curves of Trace One." Scholarship @ Claremont, 2015. http://scholarship.claremont.edu/scripps_theses/716.
Повний текст джерелаSunar, Berk. "Fast Galois field arithmetic for elliptic curve cryptography and error control codes." Thesis, 1998. http://hdl.handle.net/1957/33927.
Повний текст джерелаGraduation date: 1999
Ling, Jie. "Smart card fault attacks on public key and elliptic curve cryptography." Thesis, 2014. http://hdl.handle.net/1805/5967.
Повний текст джерелаBlömmer, Otto, and Seifert presented a fault attack on elliptic curve scalar multiplication called the Sign Change Attack, which causes a fault that changes the sign of the accumulation point. As the use of a sign bit for an extended integer is highly unlikely, this appears to be a highly selective manipulation of the key stream. In this thesis we describe two plausible fault attacks on a smart card implementation of elliptic curve cryptography. King and Wang designed a new attack called counter fault attack by attacking the scalar multiple of discrete-log cryptosystem. They then successfully generalize this approach to a family of attacks. By implementing King and Wang's scheme on RSA, we successfully attacked RSA keys for a variety of sizes. Further, we generalized the attack model to an attack on any implementation that uses NAF and wNAF key.
Ridgdill, Penny Catherine. "On the Frequency of Finitely Anomalous Elliptic Curves." 2010. https://scholarworks.umass.edu/open_access_dissertations/238.
Повний текст джерелаКниги з теми "Cryptography, elliptic curve, compiler theory"
Henri, Cohen, and Frey Gerhard 1944-, eds. Handbook of elliptic and hyperelliptic curve cryptography. Boca Raton, FL: Taylor and Francis, 2005.
Знайти повний текст джерелаLange, Tanja, Henri Cohen, Gerhard Frey, Roberto Avanzi, and Christophe Doche. Handbook of Elliptic and Hyperelliptic Curve Cryptography. Taylor & Francis Group, 2005.
Знайти повний текст джерелаHandbook of elliptic and hyperelliptic curve cryptography. Boca Raton, FL: Chapman & Hall/CRC, 2005.
Знайти повний текст джерелаSunar, Berk. Fast Galois field arithmetic for elliptic curve cryptography and error control codes. 1998.
Знайти повний текст джерела(Editor), Henri Cohen, Gerhard Frey (Editor), Roberto Avanzi (Editor), Christophe Doche (Editor), Tanja Lange (Editor), Kim Nguyen (Editor), and Frederik Vercauteren (Editor), eds. Handbook of Elliptic and Hyperelliptic Curve Cryptography (Discrete Mathematics and Its Applications). Chapman & Hall/CRC, 2005.
Знайти повний текст джерелаDaisūgaku kara manabu angō riron: Seisūron no kiso kara daen kyokusen angō no jissō made = Cryptography in algebraic aspects : from basic number theory to implementing elliptic curve cryptography. 2012.
Знайти повний текст джерелаЧастини книг з теми "Cryptography, elliptic curve, compiler theory"
Peralta, René. "Elliptic Curve Factorization Using a “Partially Oblivious” Function." In Cryptography and Computational Number Theory, 123–28. Basel: Birkhäuser Basel, 2001. http://dx.doi.org/10.1007/978-3-0348-8295-8_11.
Повний текст джерелаCheung, Donny, Dmitri Maslov, Jimson Mathew, and Dhiraj K. Pradhan. "On the Design and Optimization of a Quantum Polynomial-Time Attack on Elliptic Curve Cryptography." In Theory of Quantum Computation, Communication, and Cryptography, 96–104. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89304-2_9.
Повний текст джерелаGroßschädl, Johann, Dan Page, and Stefan Tillich. "Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices." In Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 189–207. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30955-7_17.
Повний текст джерела"Elliptic Curve Cryptography (ECC)." In Cryptography, Information Theory, and Error-Correction, 113–29. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9781118033296.ch6.
Повний текст джерела"Elliptic Curve Discrete Logarithm Based Cryptography." In Computational Number Theory and Modern Cryptography, 353–76. Chichester, UK: John Wiley & Sons, Ltd, 2017. http://dx.doi.org/10.1002/9781118188606.ch9.
Повний текст джерелаChillali, Abdelhakim, and Lhoussain El Fadil. "Elliptic Curve over a Local Finite Ring Rn." In Number Theory and Its Applications. IntechOpen, 2020. http://dx.doi.org/10.5772/intechopen.93476.
Повний текст джерелаТези доповідей конференцій з теми "Cryptography, elliptic curve, compiler theory"
El Hafez Bakr, Mohamed Abd, Mohamed Amr Mokhtar, and Ali El Sherbini Takieldeen. "Modified Elliptic Curve Cryptography in Wireless Sensor Networks Security." In 2018 28th International Conference on Computer Theory and Applications (ICCTA). IEEE, 2018. http://dx.doi.org/10.1109/iccta45985.2018.9499173.
Повний текст джерелаSetiadi, Iskandar, Achmad Imam Kistijantoro, and Atsuko Miyaji. "Elliptic curve cryptography: Algorithms and implementation analysis over coordinate systems." In 2015 2nd International Conference on Advanced Informatics: Concepts, Theory and Applications (ICAICTA). IEEE, 2015. http://dx.doi.org/10.1109/icaicta.2015.7335349.
Повний текст джерелаBenssalah, Mustapha, Yasser Rhaskali, and Mohamed Salah Azzaz. "Medical Images Encryption Based on Elliptic Curve Cryptography and Chaos Theory." In 2018 International Conference on Smart Communications in Network Technologies (SaCoNeT). IEEE, 2018. http://dx.doi.org/10.1109/saconet.2018.8585512.
Повний текст джерела