Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Eliptic curve.

Zeitschriftenartikel zum Thema „Eliptic curve“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-19 Zeitschriftenartikel für die Forschung zum Thema "Eliptic curve" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Latifah, Ummu Wachidatul, and Puguh Wahyu Prasetyo. "IMPLEMENTASI KRIPTOGRAFI KURVA ELIPTIK ELGAMAL DI LAPANGAN GALOIS PRIMA PADA PROSES ENKRIPSI DAN DEKRIPSI BERBANTUAN SOFTWARE PYTHON." Journal of Fundamental Mathematics and Applications (JFMA) 4, no. 1 (2021): 45–60. http://dx.doi.org/10.14710/jfma.v4i1.9278.

Der volle Inhalt der Quelle
Annotation:
Perkembangan teknologi memberikan dampak terhadap kemajuan di segala bidang kehidupan manusia terutama dalam bidang informasi. Hal ini memberikan dampak positif dan negatif. Salah satu dampak positifnya adalah mudahnya bertukar informasi dari yang bersifat umum atau rahasia melalui internet. Dampak negatifnya adalah data yang bersifat rahasia menjadi kurang aman dan dapat disalahgunakan oleh pihak yang tidak berwenang. Kriptografi kurva eliptik El-Gamal (ECC: Eliptic Curve Cryptosystem) memberikan solusi untuk keamanan suatu informasi. ECC merupakan salah satu metode kriptografi kunci publik y
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Pomykała, Jacek, and Sławomir Barabasz. "Eliptic Curve Based Threshold Proxy Signature Scheme with Known Signers." Fundamenta Informaticae 69, no. 4 (2006): 411–25. https://doi.org/10.3233/fun-2006-69403.

Der volle Inhalt der Quelle
Annotation:
In the article we present a new (t,n) threshold proxy signature scheme with known signers. It is based on the elliptic curve cryptosystem whose security refers to the discrete logarithm problem (DLP) in the group E(E _p ) of rational points of elliptic curve over the finite field. In comparision to similar schemes based on the RSA or DSS systems our solution requires application of significantly shorter cryptographic keys. The scheme is relatively simple in construction, has the property of unforgeability, non-repudation and admits the proactive security.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Miao, Xiao Yu, and Guang Guo Han. "Cryptanalysis of an Eliptic Curve Based Threshold Proxy Signature Scheme." Advanced Materials Research 926-930 (May 2014): 3604–7. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.3604.

Der volle Inhalt der Quelle
Annotation:
In 2006, Pomykala et al. proposed an elliptic curve based threshold proxy signature scheme as well as a proxy-protected version. They claimed that their scheme had the properties of secrecy, unforgeability, non-repudiation and signer’s identification, and the proxy-protected version could assure the proxy-protection property. In this paper, we show attacks on the basic scheme and we also point out that even if the central authority is engaged, the basic model is not proxy-protected.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Miao, Xiao Yu. "Improvement of an Eliptic Curve Based Threshold Proxy Signature Scheme." MATEC Web of Conferences 44 (2016): 02017. http://dx.doi.org/10.1051/matecconf/20164402017.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Weku, Winsy. "Model Proyeksi (X/Z2, Y/Z2) pada Kurva Hesian Secara Paralel Menggunakan Mekanisme Kriptografi Kurva Eliptik." JURNAL ILMIAH SAINS 12, no. 1 (2012): 65. http://dx.doi.org/10.35799/jis.12.1.2012.404.

Der volle Inhalt der Quelle
Annotation:
MODEL PROYEKSI (X/Z2, Y/Z2) PADA KURVA HESIAN SECARA PARALEL MENGGUNAKAN MEKANISME KRIPTOGRAFI KURVA ELIPTIKABSTRAK Suatu kunci publik, Elliptic Curve Cryptography (ECC) dikenal sebagai algoritma yang paling aman yang digunakan untuk memproteksi informasi sepanjang melakukan transmisi. ECC dalam komputasi aritemetika didapatkan berdasarkan operasi inversi modular. Inversi modular adalah operasi aritmetika dan operasi yang sangat panjang yang didapatkan berdasar ECC crypto-processor. Penggunaan koordinat proyeksi untuk menentukan Kurva Eliptik/ Elliptic Curves pada kenyataannya untuk memastikan
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Sibarani, Edy Budi Harjono, M. Zarlis, and Rahmat Widya Sembiring. "ANALISIS KRIPTO SISTEM ALGORITMA AES DAN ELLIPTIC CURVE CRYPTOGRAPHY (ECC) UNTUK KEAMANAN DATA." InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) 1, no. 2 (2017): 106–12. http://dx.doi.org/10.30743/infotekjar.v1i2.71.

Der volle Inhalt der Quelle
Annotation:
Kriptografi merupakan salah satu solusi atau metode pengamanan data yang tepat untuk menjaga kerahasiaan dan keaslian data, serta dapat meningkatkan aspek keamanan suatu data atau informasi. Metode ini bertujuan agar informasi yang bersifat rahasia dan dikirim melalui suatu jaringan, seperti LAN atau Internet, tidak dapat diketahui atau dimanfaatkan oleh orang atau pihak yang tidak berkepentingan. Kriptografi mendukung kebutuhan dua aspek keamanan informasi, yaitu perlindungan terhadap kerahasiaan data informasi dan perlindungan terhadap pemalsuan dan pengubahan informasi yang tidak diinginkan
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Putra, Eko. "Implementation Of Eliptic Curve Cryptography Using The Elgamald Algorithm And Primary Number Generating Method Rabin-Miller For Text File Security." Journal Basic Science and Technology 11, no. 1 (2022): 32–39. http://dx.doi.org/10.35335/jbst.v11i1.1773.

Der volle Inhalt der Quelle
Annotation:
The biggest weakness of Elliptic Curve Cryptography is the difficulty of points counting in elliptic curve which affects the process time. This paper considers a method of simplifying the counting in Elliptic Curve Cryptography and quickening the process time without decreasing the security level. Using ElGamal Algorithm as method of encryption, the implementation also involves Rabin-Miller Prime Number Generator to generate the public key. The system is tested using five different text files with different sizes and lengths. The result shows that by limiting the value of a and b to 1 in the e
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Carita, Sa'aadah Sajjana, and Evie Sri Wahyuni. "Modifikasi Tanda Tangan Digital Pada Skema Esign Berbasis Kurva Eliptik." Jurnal Ilmiah SINUS 20, no. 2 (2022): 33. http://dx.doi.org/10.30646/sinus.v20i2.625.

Der volle Inhalt der Quelle
Annotation:
Digital signature has an important role in the digital era, where more and more people are joining the paperless life. Many cryptographic researchers support digital development by creating cryptographic schemes that are safe to use, and one of them is digital signature. This paper proposes a digital signature scheme based on an elliptic curve defined over with , where and are private keys of prime number elements. This scheme utilizes the advantages of elliptic curve cryptography in terms of security by using points that satisfy the elliptic curve equation. Additionally, the shorter key size
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Tama, Yanuar Bhakti Wira, and Muhammad Firdhausi Fahmi. "Sistem Kriptografi Klasik Dengan Memanfaatkan Orde Dari Grup Titik Pada Kurva Eliptik Bentuk Montgomery." Euler : Jurnal Ilmiah Matematika, Sains dan Teknologi 11, no. 2 (2023): 361–71. http://dx.doi.org/10.37905/euler.v11i2.23009.

Der volle Inhalt der Quelle
Annotation:
Elliptic curve cryptography is one of the application fields of algebra and number theory concepts. One form of elliptic curve cryptography is Montgomery elliptic curve cryptography. In this paper, a method for a classical cryptographic system be formulated, consisting of encryption and decryption involving twenty-six alphabetical letters which are mapped to points on an elliptic curve by utilizing the order of the point group on the Montgomery elliptic curve. Several examples of implementation in simple cases are given to verify the results.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Saepulrohman, Asep, and Teguh Puja Negara. "IMPLEMENTASI ALGORITMA TANDA TANGAN DIGITAL BERBASIS KRIPTOGRAFI KURVA ELIPTIK DIFFIE-HELLMAN." Komputasi: Jurnal Ilmiah Ilmu Komputer dan Matematika 18, no. 1 (2021): 22–28. http://dx.doi.org/10.33751/komputasi.v18i1.2569.

Der volle Inhalt der Quelle
Annotation:
In data communication systems, digital signatures are a form of electronic signature security services based on the Elliptic Curve Digital Signature Algorithm (ECDSA) which are considered resistant to certain types of attacks. Attacks on digital signature schemes aim to fake a signature or are called forgery which is said to be successful if the key pair and signature generated by the attacker are accepted by the verifier. Mathematical schemes used to prove the authenticity of messages or digital documents or guarantees that the data and information actually come from the correct source. ECDSA
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Taopan, Gever Imanuel, Meiton Boru, and Adriana Fanggidae. "Pengamanan Portable Document Format (PDF) Menggunakan Algoritma Kriptografi Kurva Eliptik." Jurnal Komputer dan Informatika 10, no. 1 (2022): 47–54. http://dx.doi.org/10.35508/jicon.v10i1.5296.

Der volle Inhalt der Quelle
Annotation:
Penggunaan dokumen digital telah banyak digunakan pada berbagai kalangan, organisasi ataupun instansi. Salah satu dokumen digital yang sering digunakan adalah portable document format (PDF). Diperlukan sebuah algoritma yang diterapkan dalam perangkat lunak, sehingga dapat mengamankan dokumen tersebut dari pihak-pihak yang dapat merugikan. Salah satu algoritma yang dapat digunakan adalah elliptic curve cryptography (ECC). ECC mempunyai keunggulan pada tingkat keamanan sebuah data dengan kunci yang tidak terlalu panjang. Enkripsi dilakukan pada 16 Byte dari header PDF dengan menggunakan 7 parame
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Zahra, Della Annisa, Rini Marwati, and Ririn Sispiyati. "Kriptografi Visual pada Gambar Berwarna (RGB) Menggunakan Algoritma Elliptic Curve Cryptography." Jurnal EurekaMatika 9, no. 2 (2021): 141–50. http://dx.doi.org/10.17509/jem.v9i2.40054.

Der volle Inhalt der Quelle
Annotation:
Cryptography held an important role in the digital era for securing data from hackers. As technology develops, types of data that can be secured using cryptography is expanding, one of which is securing images using visual cryptography. Visual cryptography is a cryptosystem that splits an image into parts and can only be solved if it has all parts of the image. Another type of cryptography that can be used to secure data is Elliptic Curve Cryptography (ECC). ECC uses a field of prime numbers consists of points on the elliptic curve as a technique to secure data. In this research, a cryptosyste
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Dychka, I. A. ,., M. V. Onai, and T. P. Drozda. "MODIFIED METHOD FOR ELIPTIC CURVE SCALAR POINT MULTIPLICATION OVER GF(P)." Radio Electronics, Computer Science, Control, no. 2 (August 25, 2016). http://dx.doi.org/10.15588/1607-3274-2016-2-12.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Hadi, Hiba Hilal, and Ammar Ali Neamah. "An image encryption method based on modified elliptic curve Diffie-Hellman key exchange protocol and Hill Cipher." Open Engineering 14, no. 1 (2024). http://dx.doi.org/10.1515/eng-2022-0552.

Der volle Inhalt der Quelle
Annotation:
Abstract Digital image protection is crucial since images often contain private and sensitive information in business, medical, and military. One of the best techniques for securing the content of these images is encryption. This article introduces a cryptosystem known as the elliptic curve Diffie-Hellman Hill Cipher (ECDHHC) that uses the modified eliptic curve Diffie-Hellman (ECDH) key exchange protocol to generate the shared secret key integrated with the Hill Cipher. An elliptic curve point-based secret shared key matrix using the ECDHHC, which will be used for encryption and decryption, i
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Villanueva Polanco, Ricardo. "Algoritmos Basicos Para La Multiplicacion De Puntos En Una Curva Eliptica." Investigacion e Innovación en Ingenierias 2, no. 1 (2014). http://dx.doi.org/10.17081/invinno.2.1.2057.

Der volle Inhalt der Quelle
Annotation:
La criptografía de curva elíptica fue introducida por Neal Koblitz y Víctor Miller en el año de 1985. La razón por la cual es atractiva, es que no se conocen algoritmos eficientes para resolver el problema del logaritmo discreto. Es muy importante además, que se mejoren los tiempos de ejecución de los algoritmos usados para la implementación de las curvas elípticas. Por consiguiente, en este artículo se describen algoritmos básicos para la multiplicación de puntos en una curva elíptica. A medida que se avanza en la lectura, se detallan técnicas más eficientes y se brindan ciertas recomendacion
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Скуратовський, Руслан Вячеславович. "Constructing eliptic curves with zero trace of Frobenius endomorphism." Ukrainian Information Security Research Journal 20, no. 1 (2018). http://dx.doi.org/10.18372/2410-7840.20.12208.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

PAZARKAYA, İbrahim, Mehmet YAZAR, and Ahmet ÖZDEMİR. "Elliptical Gear Design, Manufacturing, Analysis, and Their Industrial Practises." Gazi Üniversitesi Fen Bilimleri Dergisi Part C: Tasarım ve Teknoloji, July 28, 2022. http://dx.doi.org/10.29109/gujsc.1103492.

Der volle Inhalt der Quelle
Annotation:
The studies covered elliptical gears focus on the design of tooth profiles and the researches increase about prototype manufacturing of elliptical gears. Elliptical gear tooth profile, which is developed based on the fact that the tooth profiles of elliptical gears are not identical to cylindrical gears; It is obtained by shaping tooth flanks with involute curves in accordance with the rolling method on the section ellipse with a rack or cylindrical spur gear cutter. It has been determined that the use of CNC electrical discharge machining (EDM) in the manufacture of elliptical gears has prefe
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Widyawati, Lilik, Husain Husain, Muhamad Azwar, and Mikha Christian Satria Girsang. "ANALISA PERBANDINGAN HYBRID CRYPTOGRAPHY RSA-AES DAN ECDH-AES UNTUK KEAMANAN PESAN." Jurnal Teknologi Informasi dan Komputer 9, no. 2 (2023). http://dx.doi.org/10.36002/jutik.v9i2.2182.

Der volle Inhalt der Quelle
Annotation:
ABSTRACTInformation exchange becomes easier, information exchange can easily be known by unauthorized parties if it is not accompanied by a security system, this can be overcome by combining symmetric algorithms with asymmetric algorithms or commonly called Hybrid cryptography. This research was conducted with the aim of knowing the results of the Comparative Analysis of Hybrid cryptography RSA-AES and ECDH-AES in message security by measuring processing time, memory and security when the algorithm is run on measuring applications. The methodology used in making the measurement application to
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Carrera Troyano, Miguel, and José Ignacio Antón. "Las relaciones entre equidad y crecimiento y la nueva agenda para América latina." América Latina Hoy 48 (December 3, 2008). http://dx.doi.org/10.14201/alh.1358.

Der volle Inhalt der Quelle
Annotation:
RESUMEN: El objetivo de este trabajo es analizar los cambios ocurridos en la teoría económica acerca de las relaciones entre equidad y crecimiento y su influencia sobre las nuevas agendas propuestas para el desarrollo de América Latina. Para ello se parte de la elipsis de las cuestiones distributivas en las recomendaciones de política económica formuladas en las décadas de 1980 y 1990, comenzando por el Consenso de Washington. A continuación se presentan las propuestas teóricas (y los ejercicios empíricos realizados a partir de ellas) que analizan el nexo entre crecimiento y desigualdad y que
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!