Journal articles on the topic 'Double Elliptic Curve Cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Double Elliptic Curve Cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Maimuţ, Diana, and Alexandru Cristian Matei. "Speeding-Up Elliptic Curve Cryptography Algorithms." Mathematics 10, no. 19 (2022): 3676. http://dx.doi.org/10.3390/math10193676.
Full textMarin, Leandro, Antonio Jara, and Antonio Skarmeta. "Multiplication and Squaring with Shifting Primes on OpenRISC Processors with Hardware Multiplier." JUCS - Journal of Universal Computer Science 19, no. (16) (2013): 2368–84. https://doi.org/10.3217/jucs-019-16-2368.
Full textDi Matteo, Stefano, Luca Baldanzi, Luca Crocetti, Pietro Nannipieri, Luca Fanucci, and Sergio Saponara. "Secure Elliptic Curve Crypto-Processor for Real-Time IoT Applications." Energies 14, no. 15 (2021): 4676. http://dx.doi.org/10.3390/en14154676.
Full textVinay, S. Iyengar. "A Novel Approach for Cryptography Technique on Perturbed Data for Distributed Environment." International Journal on Cryptography and Information Security (IJCIS) 2, no. 3 (2019): 57–66. https://doi.org/10.5281/zenodo.3401274.
Full textSharma, P. L., Kritika Gupta, Nikhlesh Kumar Badoga, Ashima, and Himanshu Monga. "Authenticated Public Key Encryption Scheme using Elliptic Curve Cryptography." International Journal of UbiComp 13, no. 2 (2022): 19–31. http://dx.doi.org/10.5121/iju.2022.13202.
Full textP., L. Sharma, Gupta Kritika, Kumar Badoga Nikhlesh, Ashima, and Monga Himanshu. "AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY." International Journal of Ubiquitous Computing (IJU 13, no. 1/2 (2022): 13. https://doi.org/10.5281/zenodo.6583465.
Full textVinay, S. Iyengar. "Novel Elliptic Curve Scalar Multiplication Algorithms for Faster and Safer Public-Key Cryptosystems." International Journal on Cryptography and Information Security (IJCIS) 2, no. 3 (2019): 57–66. https://doi.org/10.5281/zenodo.3549467.
Full textMuslim, Norliana, and Mohamad Rushdan Md. Said. "Constructing Scalar Multiplication via Elliptic Net of Rank Two." International Journal of Engineering & Technology 7, no. 4.34 (2018): 403. http://dx.doi.org/10.14419/ijet.v7i4.34.26884.
Full textDimitrov, Vassil, Laurent Imbert, and Pradeep K. Mishra. "The double-base number system and its application to elliptic curve cryptography." Mathematics of Computation 77, no. 262 (2007): 1075–105. http://dx.doi.org/10.1090/s0025-5718-07-02048-0.
Full textMalik, Anju, Mayank Aggarwal, Bharti Sharma, Akansha Singh, and Krishna Kant Singh. "Optimal Elliptic Curve Cryptography-Based Effective Approach for Secure Data Storage in Clouds." International Journal of Knowledge and Systems Science 11, no. 4 (2020): 65–81. http://dx.doi.org/10.4018/ijkss.2020100105.
Full textHashim, Hasan, Ahmad Reda Alzighaibi, Amaal Farag Elessawy, Ibrahim Gad, Hatem Abdul-Kader, and Asmaa Elsaid. "Securing Financial Transactions with a Robust Algorithm: Preventing Double-Spending Attacks." Computers 12, no. 9 (2023): 171. http://dx.doi.org/10.3390/computers12090171.
Full textAzarderakhsh, Reza, and Arash Reyhani-Masoleh. "Parallel and High-Speed Computations of Elliptic Curve Cryptography Using Hybrid-Double Multipliers." IEEE Transactions on Parallel and Distributed Systems 26, no. 6 (2015): 1668–77. http://dx.doi.org/10.1109/tpds.2014.2323062.
Full textRashid, Muhammad, Mohammad Mazyad Hazzazi, Sikandar Zulqarnain Khan, Adel R. Alharbi, Asher Sajid, and Amer Aljaedi. "A Novel Low-Area Point Multiplication Architecture for Elliptic-Curve Cryptography." Electronics 10, no. 21 (2021): 2698. http://dx.doi.org/10.3390/electronics10212698.
Full textWuttidittachotti, Pongpisit, and Pornsak Preelakha. "An asymmetric encryption method for 3D mesh model using elgamal with elliptic curve cryptography." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 2 (2022): 959–69. https://doi.org/10.11591/ijeecs.v27.i2.pp959-969.
Full textWuttidittachotti, Pongpisit, and Pornsak Preelakha. "An asymmetric encryption method for 3D mesh model using elgamal with elliptic curve cryptography." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 2 (2022): 959. http://dx.doi.org/10.11591/ijeecs.v27.i2.pp959-969.
Full textDr. Pasumponpandian. "Development of Secure Cloud Based Storage Using the Elgamal Hyper Elliptic Curve Cryptography with Fuzzy Logic Based Integer Selection." Journal of Soft Computing Paradigm 2, no. 1 (2020): 24–35. http://dx.doi.org/10.36548/jscp.2020.1.003.
Full textDong, Jiankuo, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, and Yuan Zhao. "Utilizing the Double-Precision Floating-Point Computing Power of GPUs for RSA Acceleration." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/3508786.
Full textPohasii, Serhii, Stanislav Milevskyi, Bogdan Tomashevsky, and Natalya Voropay. "DEVELOPMENT OF THE DOUBLE-CONTOUR PROTECTION CONCEPT IN SOCIO-CYBERPHYSICAL SYSTEMS." Advanced Information Systems 6, no. 2 (2022): 57–66. http://dx.doi.org/10.20998/2522-9052.2022.2.10.
Full textRashid, Muhammad, Malik Imran, and Asher Sajid. "An Efficient Elliptic-Curve Point Multiplication Architecture for High-Speed Cryptographic Applications." Electronics 9, no. 12 (2020): 2126. http://dx.doi.org/10.3390/electronics9122126.
Full textArif, Muhammad, Omar S. Sonbul, Muhammad Rashid, Mohsin Murad, and Mohammed H. Sinky. "A Unified Point Multiplication Architecture of Weierstrass, Edward and Huff Elliptic Curves on FPGA." Applied Sciences 13, no. 7 (2023): 4194. http://dx.doi.org/10.3390/app13074194.
Full textBalasubramanian, Dr Kannan. "Security of the Secp256k1 Elliptic Curve used in the Bitcoin Blockchain." Indian Journal of Cryptography and Network Security 4, no. 1 (2024): 1–5. http://dx.doi.org/10.54105/ijcns.a1426.04010524.
Full textDr., Kannan Balasubramanian. "Security of the Secp256k1 Elliptic Curve used in the Bitcoin Blockchain." Indian Journal of Cryptography and Network Security (IJCNS) 4, no. 1 (2024): 1–5. https://doi.org/10.54105/ijcns.A1426.04010524.
Full textConstantinescu, Nicolae, Ioan Daniel Hunyadi, and Oana-Adriana Ticleanu. "An Improved GN-AK Protocol Using Double-Base Scalar Multiplication and Point Halving over Elliptic Curves." Applied Sciences 15, no. 13 (2025): 7492. https://doi.org/10.3390/app15137492.
Full textHuang, Ting. "Mobile, Divisible, and Safe E-Cash System." Mathematical Problems in Engineering 2021 (April 19, 2021): 1–3. http://dx.doi.org/10.1155/2021/5537965.
Full textChowdhary, Chiranji Lal, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan Perumal, and Muhammad Fazal Ijaz. "Analytical Study of Hybrid Techniques for Image Encryption and Decryption." Sensors 20, no. 18 (2020): 5162. http://dx.doi.org/10.3390/s20185162.
Full textJankowski, Beniamin, Kamil Szydłowski, Marcin Niemiec, and Piotr Chołda. "An Internet Messenger Using Post-Quantum Cryptography Algorithms Based on Isogenies of Elliptic Curves." Electronics 14, no. 14 (2025): 2905. https://doi.org/10.3390/electronics14142905.
Full textLi, Xingran, Wei Yu, and Bao Li. "Parallel and Regular Algorithm of Elliptic Curve Scalar Multiplication over Binary Fields." Security and Communication Networks 2020 (June 24, 2020): 1–10. http://dx.doi.org/10.1155/2020/4087873.
Full textJafri, Atif Raza, Muhammad Najam ul Islam, Malik Imran, and Muhammad Rashid. "Towards an Optimized Architecture for Unified Binary Huff Curves." Journal of Circuits, Systems and Computers 26, no. 11 (2017): 1750178. http://dx.doi.org/10.1142/s021812661750178x.
Full textShah, Yasir A., Khalid Javeed, Shoaib Azmat, and Xiaojun Wang. "Redundant-Signed-Digit-Based High Speed Elliptic Curve Cryptographic Processor." Journal of Circuits, Systems and Computers 28, no. 05 (2019): 1950081. http://dx.doi.org/10.1142/s0218126619500816.
Full textSargunam, B., and R. Dhanasekaran. "Fault Tolerant Techniques for Finite Field Multipliers." Applied Mechanics and Materials 573 (June 2014): 209–14. http://dx.doi.org/10.4028/www.scientific.net/amm.573.209.
Full textKurniawan, Hafiz Abdul Fatah, Shelvie Nidya Neyman, and Sony H. Wijaya. "PENGEMBANGAN ALGORITMA ECDSA DENGAN MODIFIKASI PERKALIAN SKALAR MENGGUNAKAN DOUBLE BASE CHAIN." Jurnal Teknologi Informasi dan Ilmu Komputer 11, no. 2 (2024): 275–84. http://dx.doi.org/10.25126/jtiik.20241127446.
Full textSajid, Asher, Omar S. Sonbul, Muhammad Rashid, and Muhammad Yousuf Irfan Zia. "A Hybrid Approach for Efficient and Secure Point Multiplication on Binary Edwards Curves." Applied Sciences 13, no. 9 (2023): 5799. http://dx.doi.org/10.3390/app13095799.
Full textEom, Sookyung, Hyang-Sook Lee, and Kyunghwan Song. "Memory-Efficient Algorithm for Scalar Multiplications on Twisted Edwards Curves for Isogeny-Based Cryptosystems." Mathematical Problems in Engineering 2022 (April 27, 2022): 1–8. http://dx.doi.org/10.1155/2022/3846369.
Full textSelvamani, D., and V. Selvi. "A Two-Fold Authentication Mechanism for Network Security." Asian Journal of Engineering and Applied Technology 7, no. 2 (2018): 86–90. http://dx.doi.org/10.51983/ajeat-2018.7.2.1001.
Full textBessalov, Anatoliy V. "CALCULATION OF PARAMETERS OF CRYPTIC CRIVIAE EDWARDS OVER THE FIELDS OF CHARACTERISTICS 5 AND 7." Cybersecurity: Education, Science, Technique, no. 1 (2018): 94–104. http://dx.doi.org/10.28925/2663-4023.2018.1.94104.
Full textA., A., and A. Murugan. "RBHAP-HLB framework with high data privacy for secured EHR storage." Fusion: Practice and Applications 18, no. 2 (2025): 182–99. https://doi.org/10.54216/fpa.180214.
Full textBhagappa, H. S. Divyashree, N. Avinash, B. N. Manjunatha, J. Vishesh, and M. Mamatha. "Enhancing secrecy using hybrid elliptic curve cryptography and Diffie Hellman key exchange approach and Young's double slit experiment optimizer based optimized cross layer in multihop wireless network." Measurement: Sensors 31 (February 2024): 100967. http://dx.doi.org/10.1016/j.measen.2023.100967.
Full textYang, Rui. "Secure Cloud SDN Educational Management with Internet + Learning Management System." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 6s (2023): 44–54. http://dx.doi.org/10.17762/ijritcc.v11i6s.6809.
Full textZhao, Xia, Bing Li, Lin Zhang, Yazhou Wang, Yan Zhang, and Rui Chen. "FPGA Implementation of High-Efficiency ECC Point Multiplication Circuit." Electronics 10, no. 11 (2021): 1252. http://dx.doi.org/10.3390/electronics10111252.
Full textKapoor, Vivek, Vivek Sonny Abraham, and Ramesh Singh. "Elliptic curve cryptography." Ubiquity 2008, May (2008): 1–8. http://dx.doi.org/10.1145/1386853.1378356.
Full textCilardo, A., L. Coppolino, N. Mazzocca, and L. Romano. "Elliptic Curve Cryptography Engineering." Proceedings of the IEEE 94, no. 2 (2006): 395–406. http://dx.doi.org/10.1109/jproc.2005.862438.
Full textYan, Yuhan. "The Overview of Elliptic Curve Cryptography (ECC)." Journal of Physics: Conference Series 2386, no. 1 (2022): 012019. http://dx.doi.org/10.1088/1742-6596/2386/1/012019.
Full textTama, Yanuar Bhakti Wira, and Muhammad Firdhausi Fahmi. "Sistem Kriptografi Klasik Dengan Memanfaatkan Orde Dari Grup Titik Pada Kurva Eliptik Bentuk Montgomery." Euler : Jurnal Ilmiah Matematika, Sains dan Teknologi 11, no. 2 (2023): 361–71. http://dx.doi.org/10.37905/euler.v11i2.23009.
Full textTrung, Mai Manh, Le Phe Do, Do Trung Tuan, Nguyen Van Tanh, and Ngo Quang Tri. "Design a cryptosystem using elliptic curves cryptography and Vigenère symmetry key." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 1734. http://dx.doi.org/10.11591/ijece.v13i2.pp1734-1743.
Full textAdnan, Mrs.Ansari Afreen Mohammad, Mrs.Ansari Afra Aijaz Ahmed, Mr.Meraj Shabbir Bubere, and Mr.Umer Farooque Khaleel Ahmad. "Elliptic Curve Cryptography: A Mathematical Approach." International Journal of Advance and Applied Research 5, no. 23 (2024): 233–37. https://doi.org/10.5281/zenodo.13622350.
Full textZhang, Zhengqi, and Yan Zhao. "Enhanced Elliptic Curve Cryptography (EECC)." Procedia Computer Science 247 (2024): 1324–30. http://dx.doi.org/10.1016/j.procs.2024.10.158.
Full textBernstein, Daniel J., and Tanja Lange. "Hyper-and-elliptic-curve cryptography." LMS Journal of Computation and Mathematics 17, A (2014): 181–202. http://dx.doi.org/10.1112/s1461157014000394.
Full textZahra, Della Annisa, Rini Marwati, and Ririn Sispiyati. "Kriptografi Visual pada Gambar Berwarna (RGB) Menggunakan Algoritma Elliptic Curve Cryptography." Jurnal EurekaMatika 9, no. 2 (2021): 141–50. http://dx.doi.org/10.17509/jem.v9i2.40054.
Full textMai, Manh Trung, Phe Do Le, Trung Tuan Do, Van Tanh Nguyen, and Quang Tri Ngo. "Design a cryptosystem using elliptic curves cryptography and Vigenère symmetry key." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 1734–43. https://doi.org/10.11591/ijece.v13i2.pp1734-1743.
Full textJin, Shi Guo, and Guang Jiang Wang. "Design of Digital Signature Scheme Based on Elliptic Curve Cryptosystem." Applied Mechanics and Materials 685 (October 2014): 579–82. http://dx.doi.org/10.4028/www.scientific.net/amm.685.579.
Full text