Статті в журналах з теми "Cryptography, elliptic curve, compiler theory"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Cryptography, elliptic curve, compiler theory".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Sanjeewa, R., and B. A. K. Welihinda. "Elliptic Curve Cryptography and Coding Theory." International Journal of Multidisciplinary Studies 3, no. 2 (January 28, 2017): 99. http://dx.doi.org/10.4038/ijms.v3i2.12.
Повний текст джерелаBernstein, Daniel J., and Tanja Lange. "Hyper-and-elliptic-curve cryptography." LMS Journal of Computation and Mathematics 17, A (2014): 181–202. http://dx.doi.org/10.1112/s1461157014000394.
Повний текст джерелаRabah, Kefa. "Theory and Implementation of Elliptic Curve Cryptography." Journal of Applied Sciences 5, no. 4 (March 15, 2005): 604–33. http://dx.doi.org/10.3923/jas.2005.604.633.
Повний текст джерелаCui, Chao, Yun Zhao, Yong Xiao, Weibin Lin, and Di Xu. "A Hardware-Efficient Elliptic Curve Cryptographic Architecture over GF (p)." Mathematical Problems in Engineering 2021 (May 18, 2021): 1–7. http://dx.doi.org/10.1155/2021/8883614.
Повний текст джерелаPrabakaran, B., T. R. Sumithira, and V. Nagaraj. "Smart Grid Communication Under Elliptic Curve Cryptography." Intelligent Automation & Soft Computing 36, no. 2 (2023): 2333–47. http://dx.doi.org/10.32604/iasc.2023.029725.
Повний текст джерелаAljamaly, Karrar Taher R., and Ruma Kareem K. Ajeena. "The elliptic scalar multiplication graph and its application in elliptic curve cryptography." Journal of Discrete Mathematical Sciences and Cryptography 24, no. 6 (August 18, 2021): 1793–807. http://dx.doi.org/10.1080/09720529.2021.1932896.
Повний текст джерелаReddy, P. Vasudeva, and M. Padmavathamma. "An authenticated key exchange protocol in elliptic curve cryptography." Journal of Discrete Mathematical Sciences and Cryptography 10, no. 5 (October 2007): 697–705. http://dx.doi.org/10.1080/09720529.2007.10698150.
Повний текст джерелаKumari, Adesh, M. Yahya Abbasi, Vinod Kumar, and Akber Ali Khan. "A secure user authentication protocol using elliptic curve cryptography." Journal of Discrete Mathematical Sciences and Cryptography 22, no. 4 (May 19, 2019): 521–30. http://dx.doi.org/10.1080/09720529.2019.1637155.
Повний текст джерелаKoblitz, Ann Hibner, Neal Koblitz, and Alfred Menezes. "Elliptic curve cryptography: The serpentine course of a paradigm shift." Journal of Number Theory 131, no. 5 (May 2011): 781–814. http://dx.doi.org/10.1016/j.jnt.2009.01.006.
Повний текст джерелаSudharson, K., and S. Arun. "Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm." Intelligent Automation & Soft Computing 34, no. 3 (2022): 1769–84. http://dx.doi.org/10.32604/iasc.2022.026483.
Повний текст джерелаJungeblut, T., C. Puttmann, R. Dreesen, M. Porrmann, M. Thies, U. Rückert, and U. Kastens. "Resource efficiency of hardware extensions of a 4-issue VLIW processor for elliptic curve cryptography." Advances in Radio Science 8 (December 22, 2010): 295–305. http://dx.doi.org/10.5194/ars-8-295-2010.
Повний текст джерелаAranha, Diego, Ricardo Dahab, Julio López, and Leonardo Oliveira. "Efficient implementation of elliptic curve cryptography in wireless sensors." Advances in Mathematics of Communications 4, no. 2 (May 2010): 169–87. http://dx.doi.org/10.3934/amc.2010.4.169.
Повний текст джерелаKumari, Arpana, and Vivek Kapoor. "Competing secure text encryption in intranet using elliptic curve cryptography." Journal of Discrete Mathematical Sciences and Cryptography 23, no. 2 (February 17, 2020): 631–41. http://dx.doi.org/10.1080/09720529.2020.1729509.
Повний текст джерелаKonstantinou, Elisavet, and Aristides Kontogeorgis. "Ramanujan’s class invariants and their use in elliptic curve cryptography." Computers & Mathematics with Applications 59, no. 8 (April 2010): 2901–17. http://dx.doi.org/10.1016/j.camwa.2010.02.008.
Повний текст джерелаMehrabi, Mohamad Ali, Christophe Doche, and Alireza Jolfaei. "Elliptic Curve Cryptography Point Multiplication Core for Hardware Security Module." IEEE Transactions on Computers 69, no. 11 (November 1, 2020): 1707–18. http://dx.doi.org/10.1109/tc.2020.3013266.
Повний текст джерелаPote, Santoshi, Virendra Sule, and B. K. Lande. "Elliptic curve cryptography arithmetic in terms of one variable polynomial division." Journal of Discrete Mathematical Sciences and Cryptography 23, no. 8 (March 5, 2020): 1545–71. http://dx.doi.org/10.1080/09720529.2019.1702754.
Повний текст джерелаV. Rajesh, Kannan. "On-demand based wireless with hybrid cryptography in MANET." i-manager’s Journal on Wireless Communication Networks 10, no. 2 (2022): 8. http://dx.doi.org/10.26634/jwcn.10.2.18937.
Повний текст джерелаJao, David, Stephen D. Miller, and Ramarathnam Venkatesan. "Expander graphs based on GRH with an application to elliptic curve cryptography." Journal of Number Theory 129, no. 6 (June 2009): 1491–504. http://dx.doi.org/10.1016/j.jnt.2008.11.006.
Повний текст джерелаHakuta, Keisuke. "Metrics on the Sets of Nonsupersingular Elliptic Curves in Simplified Weierstrass Form over Finite Fields of Characteristic Two." International Journal of Mathematics and Mathematical Sciences 2015 (2015): 1–5. http://dx.doi.org/10.1155/2015/597849.
Повний текст джерелаHafizul Islam, SK, Mohammad Sabzinejad Farash, G. P. Biswas, Muhammad Khurram Khan, and Mohammad S. Obaidat. "A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography." International Journal of Computer Mathematics 94, no. 1 (September 28, 2015): 39–55. http://dx.doi.org/10.1080/00207160.2015.1088148.
Повний текст джерелаTossavainen, Timo. "Cryptography based on algebraic perpendicularities." Mathematical Gazette 107, no. 568 (February 16, 2023): 65–69. http://dx.doi.org/10.1017/mag.2023.8.
Повний текст джерелаKieu-Do-Nguyen, Binh, Cuong Pham-Quoc, Ngoc-Thinh Tran, Cong-Kha Pham, and Trong-Thuc Hoang. "Low-Cost Area-Efficient FPGA-Based Multi-Functional ECDSA/EdDSA." Cryptography 6, no. 2 (May 10, 2022): 25. http://dx.doi.org/10.3390/cryptography6020025.
Повний текст джерелаDimitrov, Vassil, Laurent Imbert, and Pradeep K. Mishra. "The double-base number system and its application to elliptic curve cryptography." Mathematics of Computation 77, no. 262 (December 11, 2007): 1075–105. http://dx.doi.org/10.1090/s0025-5718-07-02048-0.
Повний текст джерелаCarita, Sa'aadah Sajjana, and Evie Sri Wahyuni. "Modifikasi Tanda Tangan Digital Pada Skema Esign Berbasis Kurva Eliptik." Jurnal Ilmiah SINUS 20, no. 2 (July 19, 2022): 33. http://dx.doi.org/10.30646/sinus.v20i2.625.
Повний текст джерелаIslam, SK Hafizul, and G. P. Biswas. "Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography." International Journal of Computer Mathematics 90, no. 11 (November 2013): 2244–58. http://dx.doi.org/10.1080/00207160.2013.776674.
Повний текст джерелаIlyani Ahmad, Jasmin, Roshidi Din, and Mazida Ahmad. "Analysis Review on Public Key Cryptography Algorithms." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (November 1, 2018): 447. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp447-454.
Повний текст джерелаJimoh, R. G., M. AbdulRaheem, I. R. Salimonu, and O. V. Mejabi. "Elliptic Curve Cryptosystem in securing Communication across Unsecure Channel." Circulation in Computer Science 2, no. 5 (June 20, 2017): 7–12. http://dx.doi.org/10.22632/ccs-2017-251-97.
Повний текст джерелаAmento, Brittanney, Martin Rotteler, and Rainer Steinwalds. "Efficient quantum circuits for binary elliptic curve arithmetic: reducing $T$-gate complexity." Quantum Information and Computation 13, no. 7&8 (May 2013): 631–44. http://dx.doi.org/10.26421/qic13.7-8-5.
Повний текст джерелаY. David Solomon Raju, Thammaneni Snehitha Reddy,. "Implementation of Data Security with Wallace Tree Approach Using Elliptical Curve Cryptography on FPGA." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 5, 2021): 1546–53. http://dx.doi.org/10.17762/turcomat.v12i6.2693.
Повний текст джерелаElahi, Kashif, Ali Ahmad, and Roslan Hasni. "Construction Algorithm for Zero Divisor Graphs of Finite Commutative Rings and Their Vertex-Based Eccentric Topological Indices." Mathematics 6, no. 12 (December 4, 2018): 301. http://dx.doi.org/10.3390/math6120301.
Повний текст джерелаKabin, Ievgen, Zoya Dyka, Dan Klann, Marcin Aftowicz, and Peter Langendoerfer. "Resistance of the Montgomery Ladder Against Simple SCA: Theory and Practice." Journal of Electronic Testing 37, no. 3 (June 2021): 289–303. http://dx.doi.org/10.1007/s10836-021-05951-3.
Повний текст джерелаHOOBI, Mays M. "SURVEY: EFFICIENT HYBRID ALGOR ITHMS OF CRYPTOGRAPHY." MINAR International Journal of Applied Sciences and Technology 2, no. 4 (December 1, 2020): 1–16. http://dx.doi.org/10.47832/2717-8234.4-2.1.
Повний текст джерелаLiu, Zhe, Johann GroBschadl, Zhi Hu, Kimmo Jarvinen, Husen Wang, and Ingrid Verbauwhede. "Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things." IEEE Transactions on Computers 66, no. 5 (May 1, 2017): 773–85. http://dx.doi.org/10.1109/tc.2016.2623609.
Повний текст джерелаWang, Chao, HuanGuo Zhang, and LiLi Liu. "Evolutionary cryptography theory based generating method for a secure Koblitz elliptic curve and its improvement by a hidden Markov models." Science China Information Sciences 55, no. 4 (March 14, 2012): 911–20. http://dx.doi.org/10.1007/s11432-012-4552-4.
Повний текст джерелаPetit, Christophe. "Finding roots in with the successive resultants algorithm." LMS Journal of Computation and Mathematics 17, A (2014): 203–17. http://dx.doi.org/10.1112/s1461157014000138.
Повний текст джерелаBartolini, Sandro, Irina Branovic, Roberto Giorgi, and Enrico Martinelli. "Effects of Instruction-Set Extensions on an Embedded Processor: A Case Study on Elliptic Curve Cryptography over GF(2/sup m/)." IEEE Transactions on Computers 57, no. 5 (2008): 672–85. http://dx.doi.org/10.1109/tc.2007.70832.
Повний текст джерелаEngouang, Tristan Daladier, Yun Liu, and Zhenjiang Zhang. "TDAL: Thoroughly Data Aggregation of Low Energy Devices in Secure Heterogeneous Wireless Sensor Networks." Journal of Sensors 2014 (2014): 1–15. http://dx.doi.org/10.1155/2014/938480.
Повний текст джерелаBoumerzoug, Hayette, Boucif Amar Bensaber, and Ismail Biskri. "A lightweight key management scheme based on an Adelson-Velskii and Landis tree and elliptic curve cryptography for wireless sensor networks." Concurrency and Computation: Practice and Experience 28, no. 6 (October 24, 2013): 1831–47. http://dx.doi.org/10.1002/cpe.3153.
Повний текст джерелаZhou, Jie, Jian Bai, and Meng Shan Jiang. "White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode." Security and Communication Networks 2020 (November 19, 2020): 1–10. http://dx.doi.org/10.1155/2020/8881116.
Повний текст джерелаRajasekar, Vani, Muzafer Saračević, Darjan Karabašević, Dragiša Stanujkić, Eldin Dobardžić, and Sathya Krishnamoorthi. "Efficient Cancelable Template Generation Based on Signcryption and Bio Hash Function." Axioms 11, no. 12 (November 29, 2022): 684. http://dx.doi.org/10.3390/axioms11120684.
Повний текст джерелаБаскаков, Д. Е., Е. Ю. Кузнецова, and А. Л. Стариченков. "Implementation of Lightweight Elliptic Curve Cryptography for Security and Privacy in Cyber-Physical Systems of Intelligent Environmental Monitoring for the Northern Sea Route." MORSKIE INTELLEKTUAL`NYE TEHNOLOGII)</msg>, no. 4(58) (December 2, 2022): 185–92. http://dx.doi.org/10.37220/mit.2022.58.4.041.
Повний текст джерелаNayyar, Anand, Rudra Rameshwar, and Piyush Kanti Dutta. "Special Issue on Recent Trends and Future of Fog and Edge Computing, Services and Enabling Technologies." Scalable Computing: Practice and Experience 20, no. 2 (May 2, 2019): iii—vi. http://dx.doi.org/10.12694/scpe.v20i2.1558.
Повний текст джерела"Image Pixel Permutation Operation Based on Elliptic Curve Cryptography." Applied Mathematics & Information Sciences 13, S1 (August 1, 2019): 183–89. http://dx.doi.org/10.18576/amis/13s119.
Повний текст джерелаBanik, Arpita, Laiphrakpam Dolendro Singh, Amit Agrawal, and Ripon Patgiri. "Secret image encryption based on chaotic system and elliptic curve cryptography." Digital Signal Processing, July 2022, 103639. http://dx.doi.org/10.1016/j.dsp.2022.103639.
Повний текст джерела"High speed elliptic curve cryptography architecture for NIST recommended Galois field." International Journal of Advanced Technology and Engineering Exploration 9, no. 97 (December 31, 2022). http://dx.doi.org/10.19101/ijatee.2021.875995.
Повний текст джерелаĎuriš, Viliam, and Timotej Šumný. "Number of rational points of elliptic curves." Asian-European Journal of Mathematics, March 31, 2021, 2250017. http://dx.doi.org/10.1142/s1793557122500176.
Повний текст джерелаV, Sri Vigna Hema, and Ramesh K. "Augmented security for healthcare data using obfuscation and elliptic curve cryptography algorithm in health cloud environment." Concurrency and Computation: Practice and Experience, August 17, 2022. http://dx.doi.org/10.1002/cpe.7275.
Повний текст джерела"Improved Hyper Elliptic Curve Cryptography with Hybrid Bat Algorithm for Tasks Replication to Meet Deadlines in Clouds." Applied Mathematics & Information Sciences 13, S1 (August 1, 2019): 337–47. http://dx.doi.org/10.18576/amis/13s137.
Повний текст джерелаAiyshwariya Devi, R., and A. R. Arunachalam. "Enhancement of IoT device security using an Improved Elliptic Curve Cryptography algorithm and malware detection utilizing deep LSTM." High-Confidence Computing, March 2023, 100117. http://dx.doi.org/10.1016/j.hcc.2023.100117.
Повний текст джерелаBanu Priya, G., and K. Dharani. "Secure Transmission of Data through Electronic Devices using ECC Algorithm." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, March 1, 2019, 130–35. http://dx.doi.org/10.32628/cseit195223.
Повний текст джерела