Journal articles on the topic 'Eliptic curve'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 19 journal articles for your research on the topic 'Eliptic curve.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Latifah, Ummu Wachidatul, and Puguh Wahyu Prasetyo. "IMPLEMENTASI KRIPTOGRAFI KURVA ELIPTIK ELGAMAL DI LAPANGAN GALOIS PRIMA PADA PROSES ENKRIPSI DAN DEKRIPSI BERBANTUAN SOFTWARE PYTHON." Journal of Fundamental Mathematics and Applications (JFMA) 4, no. 1 (2021): 45–60. http://dx.doi.org/10.14710/jfma.v4i1.9278.
Full textPomykała, Jacek, and Sławomir Barabasz. "Eliptic Curve Based Threshold Proxy Signature Scheme with Known Signers." Fundamenta Informaticae 69, no. 4 (2006): 411–25. https://doi.org/10.3233/fun-2006-69403.
Full textMiao, Xiao Yu, and Guang Guo Han. "Cryptanalysis of an Eliptic Curve Based Threshold Proxy Signature Scheme." Advanced Materials Research 926-930 (May 2014): 3604–7. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.3604.
Full textMiao, Xiao Yu. "Improvement of an Eliptic Curve Based Threshold Proxy Signature Scheme." MATEC Web of Conferences 44 (2016): 02017. http://dx.doi.org/10.1051/matecconf/20164402017.
Full textWeku, Winsy. "Model Proyeksi (X/Z2, Y/Z2) pada Kurva Hesian Secara Paralel Menggunakan Mekanisme Kriptografi Kurva Eliptik." JURNAL ILMIAH SAINS 12, no. 1 (2012): 65. http://dx.doi.org/10.35799/jis.12.1.2012.404.
Full textSibarani, Edy Budi Harjono, M. Zarlis, and Rahmat Widya Sembiring. "ANALISIS KRIPTO SISTEM ALGORITMA AES DAN ELLIPTIC CURVE CRYPTOGRAPHY (ECC) UNTUK KEAMANAN DATA." InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) 1, no. 2 (2017): 106–12. http://dx.doi.org/10.30743/infotekjar.v1i2.71.
Full textPutra, Eko. "Implementation Of Eliptic Curve Cryptography Using The Elgamald Algorithm And Primary Number Generating Method Rabin-Miller For Text File Security." Journal Basic Science and Technology 11, no. 1 (2022): 32–39. http://dx.doi.org/10.35335/jbst.v11i1.1773.
Full textCarita, Sa'aadah Sajjana, and Evie Sri Wahyuni. "Modifikasi Tanda Tangan Digital Pada Skema Esign Berbasis Kurva Eliptik." Jurnal Ilmiah SINUS 20, no. 2 (2022): 33. http://dx.doi.org/10.30646/sinus.v20i2.625.
Full textTama, Yanuar Bhakti Wira, and Muhammad Firdhausi Fahmi. "Sistem Kriptografi Klasik Dengan Memanfaatkan Orde Dari Grup Titik Pada Kurva Eliptik Bentuk Montgomery." Euler : Jurnal Ilmiah Matematika, Sains dan Teknologi 11, no. 2 (2023): 361–71. http://dx.doi.org/10.37905/euler.v11i2.23009.
Full textSaepulrohman, Asep, and Teguh Puja Negara. "IMPLEMENTASI ALGORITMA TANDA TANGAN DIGITAL BERBASIS KRIPTOGRAFI KURVA ELIPTIK DIFFIE-HELLMAN." Komputasi: Jurnal Ilmiah Ilmu Komputer dan Matematika 18, no. 1 (2021): 22–28. http://dx.doi.org/10.33751/komputasi.v18i1.2569.
Full textTaopan, Gever Imanuel, Meiton Boru, and Adriana Fanggidae. "Pengamanan Portable Document Format (PDF) Menggunakan Algoritma Kriptografi Kurva Eliptik." Jurnal Komputer dan Informatika 10, no. 1 (2022): 47–54. http://dx.doi.org/10.35508/jicon.v10i1.5296.
Full textZahra, Della Annisa, Rini Marwati, and Ririn Sispiyati. "Kriptografi Visual pada Gambar Berwarna (RGB) Menggunakan Algoritma Elliptic Curve Cryptography." Jurnal EurekaMatika 9, no. 2 (2021): 141–50. http://dx.doi.org/10.17509/jem.v9i2.40054.
Full textDychka, I. A. ,., M. V. Onai, and T. P. Drozda. "MODIFIED METHOD FOR ELIPTIC CURVE SCALAR POINT MULTIPLICATION OVER GF(P)." Radio Electronics, Computer Science, Control, no. 2 (August 25, 2016). http://dx.doi.org/10.15588/1607-3274-2016-2-12.
Full textHadi, Hiba Hilal, and Ammar Ali Neamah. "An image encryption method based on modified elliptic curve Diffie-Hellman key exchange protocol and Hill Cipher." Open Engineering 14, no. 1 (2024). http://dx.doi.org/10.1515/eng-2022-0552.
Full textVillanueva Polanco, Ricardo. "Algoritmos Basicos Para La Multiplicacion De Puntos En Una Curva Eliptica." Investigacion e Innovación en Ingenierias 2, no. 1 (2014). http://dx.doi.org/10.17081/invinno.2.1.2057.
Full textСкуратовський, Руслан Вячеславович. "Constructing eliptic curves with zero trace of Frobenius endomorphism." Ukrainian Information Security Research Journal 20, no. 1 (2018). http://dx.doi.org/10.18372/2410-7840.20.12208.
Full textPAZARKAYA, İbrahim, Mehmet YAZAR, and Ahmet ÖZDEMİR. "Elliptical Gear Design, Manufacturing, Analysis, and Their Industrial Practises." Gazi Üniversitesi Fen Bilimleri Dergisi Part C: Tasarım ve Teknoloji, July 28, 2022. http://dx.doi.org/10.29109/gujsc.1103492.
Full textWidyawati, Lilik, Husain Husain, Muhamad Azwar, and Mikha Christian Satria Girsang. "ANALISA PERBANDINGAN HYBRID CRYPTOGRAPHY RSA-AES DAN ECDH-AES UNTUK KEAMANAN PESAN." Jurnal Teknologi Informasi dan Komputer 9, no. 2 (2023). http://dx.doi.org/10.36002/jutik.v9i2.2182.
Full textCarrera Troyano, Miguel, and José Ignacio Antón. "Las relaciones entre equidad y crecimiento y la nueva agenda para América latina." América Latina Hoy 48 (December 3, 2008). http://dx.doi.org/10.14201/alh.1358.
Full text