Academic literature on the topic 'Elliptic Curve Cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Elliptic Curve Cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Elliptic Curve Cryptography"
Yan, Yuhan. "The Overview of Elliptic Curve Cryptography (ECC)." Journal of Physics: Conference Series 2386, no. 1 (2022): 012019. http://dx.doi.org/10.1088/1742-6596/2386/1/012019.
Full textShchur, Nataliia, Oleksandra Pokotylo, and Yelyzaveta Bailiuk. "ELLIPTIC CURVE CRYPTOGRAPHY AND ITS PRACTICAL APPLICATION." Cybersecurity: Education, Science, Technique 1, no. 21 (2023): 48–64. http://dx.doi.org/10.28925/2663-4023.2023.21.4864.
Full textAbhishek, Kunal, and E. George Dharma Prakash Raj. "Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography." Cybernetics and Information Technologies 21, no. 2 (2021): 70–88. http://dx.doi.org/10.2478/cait-2021-0020.
Full textMichael, Nsikan John, Otobong. G. Udoaka, and Musa Alex. "SYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE AND LIE ALGEBRA." GPH - International Journal of Mathematics 06, no. 10 (2023): 01–10. https://doi.org/10.5281/zenodo.10252317.
Full textTama, Yanuar Bhakti Wira, and Muhammad Firdhausi Fahmi. "Sistem Kriptografi Klasik Dengan Memanfaatkan Orde Dari Grup Titik Pada Kurva Eliptik Bentuk Montgomery." Euler : Jurnal Ilmiah Matematika, Sains dan Teknologi 11, no. 2 (2023): 361–71. http://dx.doi.org/10.37905/euler.v11i2.23009.
Full textSangeetha, V., T. Anupreethi, and Manju Somanath. "Cryptographic Application of Elliptic Curve Generated through Centered Hexadecagonal Numbers." Indian Journal Of Science And Technology 17, no. 20 (2024): 2074–78. http://dx.doi.org/10.17485/ijst/v17i20.1183.
Full textV, Sangeetha, Anupreethi T, and Somanath Manju. "Cryptographic Application of Elliptic Curve Generated through Centered Hexadecagonal Numbers." Indian Journal of Science and Technology 17, no. 20 (2024): 2074–78. https://doi.org/10.17485/IJST/v17i20.1183.
Full textKapoor, Vivek, Vivek Sonny Abraham, and Ramesh Singh. "Elliptic curve cryptography." Ubiquity 2008, May (2008): 1–8. http://dx.doi.org/10.1145/1386853.1378356.
Full textTsiganov, A. V. "Duffing Oscillator and Elliptic Curve Cryptography." Nelineinaya Dinamika 14, no. 2 (2018): 235–41. http://dx.doi.org/10.20537/nd180207.
Full textAlshar’e, Marwan, Sharf Alzu’bi, Ahed Al-Haraizah, Hamzah Ali Alkhazaleh, Malik Jawarneh, and Mohammad Rustom Al Nasar. "Elliptic curve cryptography based light weight technique for information security." Bulletin of Electrical Engineering and Informatics 14, no. 3 (2025): 2300–2308. https://doi.org/10.11591/eei.v14i3.8587.
Full textDissertations / Theses on the topic "Elliptic Curve Cryptography"
Enos, Graham. "Binary Edwards curves in elliptic curve cryptography." Thesis, The University of North Carolina at Charlotte, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=3563153.
Full textKirlar, Baris Bulent. "Elliptic Curve Pairing-based Cryptography." Phd thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612613/index.pdf.
Full textHutchinson, Aaron. "Algorithms in Elliptic Curve Cryptography." Thesis, Florida Atlantic University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=10980188.
Full textOzturk, Erdinc. "Low Power Elliptic Curve Cryptography." Digital WPI, 2005. https://digitalcommons.wpi.edu/etd-theses/691.
Full textOzturk, Erdinc. "Low Power Elliptic Curve Cryptography." Link to electronic thesis, 2004. http://www.wpi.edu/Pubs/ETD/Available/etd-050405-143155/.
Full textOzcan, Ayca Bahar. "Performance Analysis Of Elliptic Curve Multiplication Algorithms For Elliptic Curve Cryptography." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607698/index.pdf.
Full textBommireddipalli, Nithesh Venkata Ramana Surya. "Tutorial on Elliptic Curve Arithmetic and Introduction to Elliptic Curve Cryptography (ECC)." University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1511866832906148.
Full textKumar, Sandeep S. "Elliptic curve cryptography for constrained devices." [S.l.] : [s.n.], 2006. http://deposit.ddb.de/cgi-bin/dokserv?idn=982216998.
Full textHitchcock, Yvonne Roslyn. "Elliptic curve cryptography for lightweight applications." Thesis, Queensland University of Technology, 2003. https://eprints.qut.edu.au/15838/1/Yvonne_Hitchcock_Thesis.pdf.
Full textHitchcock, Yvonne Roslyn. "Elliptic Curve Cryptography for Lightweight Applications." Queensland University of Technology, 2003. http://eprints.qut.edu.au/15838/.
Full textBooks on the topic "Elliptic Curve Cryptography"
Stevens, Zac Roger Julius. Elliptic Curve Cryptography. Oxford Brookes University, 2003.
Find full textF, Blake Ian, Seroussi G. 1955-, and Smart Nigel P. 1967-, eds. Advances in elliptic curve cryptography. Cambridge University Press, 2005.
Find full textMenezes, A. J. Elliptic curve public key cryptosystems. Kluwer Academic Publishers, 1993.
Find full textHenri, Cohen, and Frey Gerhard 1944-, eds. Handbook of elliptic and hyperelliptic curve cryptography. Taylor and Francis, 2005.
Find full text1955-, Seroussi G., and Smart Nigel P. 1967-, eds. Elliptic curves in cryptography. Cambridge University Press, 1999.
Find full textWashington, Lawrence C. Elliptic curves: Number theory and cryptography. 2nd ed. Chapman & Hall/CRC, 2008.
Find full textWashington, Lawrence C. Elliptic curves: Number theory and cryptography. 2nd ed. Chapman & Hall/CRC, 2008.
Find full textBhandari, Ashwani K., D. S. Nagaraj, B. Ramakrishnan, and T. N. Venkataramana, eds. Elliptic Curves, Modular Forms and Cryptography. Hindustan Book Agency, 2003. http://dx.doi.org/10.1007/978-93-86279-15-6.
Full textEnge, Andreas. Elliptic curves and their applications to cryptography: An introduction. Kluwer Academic, 1999.
Find full textEnge, Andreas. Elliptic Curves and Their Applications to Cryptography. Springer US, 1999. http://dx.doi.org/10.1007/978-1-4615-5207-9.
Full textBook chapters on the topic "Elliptic Curve Cryptography"
Easttom, William. "Elliptic Curve Cryptography." In Modern Cryptography. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-63115-4_11.
Full textEasttom, Chuck. "Elliptic Curve Cryptography." In Modern Cryptography. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-12304-7_11.
Full textMihailescu, Marius Iulian, and Stefania Loredana Nita. "Elliptic-Curve Cryptography." In Pro Cryptography and Cryptanalysis. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6367-9_10.
Full textYan, Song Y. "Elliptic Curve Cryptography." In Cybercryptography: Applicable Cryptography for Cyberspace Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-72536-9_7.
Full textHankerson, Darrel, and Alfred Menezes. "Elliptic Curve Cryptography." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_245.
Full textJao, David. "Elliptic Curve Cryptography." In Handbook of Information and Communication Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-04117-4_3.
Full textMihailescu, Marius Iulian, and Stefania Loredana Nita. "Elliptic-Curve Cryptography." In Pro Cryptography and Cryptanalysis with C++23. Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9450-5_9.
Full textBiggs, Norman L. "Elliptic curve cryptography." In Springer Undergraduate Mathematics Series. Springer London, 2008. http://dx.doi.org/10.1007/978-1-84800-273-9_15.
Full textBuell, Duncan. "Elliptic Curve Cryptography." In Undergraduate Topics in Computer Science. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73492-3_14.
Full textSafieh, Malek. "Elliptic Curve Cryptography." In Algorithms and Architectures for Cryptography and Source Coding in Non-Volatile Flash Memories. Springer Fachmedien Wiesbaden, 2021. http://dx.doi.org/10.1007/978-3-658-34459-7_2.
Full textConference papers on the topic "Elliptic Curve Cryptography"
Maimuţ, Diana, Cristian Matei, and George Teşeleanu. "(Deep) Learning About Elliptic Curve Cryptography." In 11th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013095100003899.
Full textAbhinav, Surjeet Singh Chauhan Gonder, Prachi Garg, and Sudhanshu Shekhar Dubey. "$k^{\prime}$ -Lucas Sequence for Elliptic Curve Cryptography." In 2025 First International Conference on Advances in Computer Science, Electrical, Electronics, and Communication Technologies (CE2CT). IEEE, 2025. https://doi.org/10.1109/ce2ct64011.2025.10939091.
Full textFaz-Hernández, Armando, and Julio López. "High-Performance Elliptic Curve Cryptography: A SIMD Approach to Modern Curves." In Concurso de Teses e Dissertações. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/ctd.2023.230156.
Full textFaz-Hernandez, Armando, and Julio López. "High-Performance Elliptic Curve Cryptography: A SIMD Approach to Modern Curves." In Anais Estendidos do Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2024. http://dx.doi.org/10.5753/sbseg_estendido.2024.241959.
Full textEdoh, Kossi D. "Elliptic curve cryptography." In the 1st annual conference. ACM Press, 2004. http://dx.doi.org/10.1145/1059524.1059542.
Full textKalra, Sheetal, and Sandeep K. Sood. "Elliptic curve cryptography." In the International Conference. ACM Press, 2011. http://dx.doi.org/10.1145/2007052.2007073.
Full textLiu, Yiqiao. "Elliptic curve cryptography." In International Conference on Statistics, Applied Mathematics, and Computing Science (CSAMCS 2021), edited by Ke Chen, Nan Lin, Romeo Meštrović, Teresa A. Oliveira, Fengjie Cen, and Hong-Ming Yin. SPIE, 2022. http://dx.doi.org/10.1117/12.2628220.
Full textDeligiannidis, Leonidas. "Elliptic curve cryptography in Java." In 2015 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2015. http://dx.doi.org/10.1109/isi.2015.7165975.
Full textHarkanson, R., and Y. Kim. "Applications of elliptic curve cryptography." In CISRC'17: Twelfth Annual Cyber and Information Security Research Conference. ACM, 2017. http://dx.doi.org/10.1145/3064814.3064818.
Full textЛацин, Семен Михайлович, and Наталья Александровна Борсук. "ANALYSIS OF ELLIPTICAL CRYPTOGRAPHY ON THE EXAMPLE OF THE BITCOIN BLOCKCHAIN." In Методики фундаментальных и прикладных научных исследований: сборник статей всероссийской научной конференции (Санкт-Петербург, Декабрь 2022). Crossref, 2023. http://dx.doi.org/10.37539/221223.2022.83.11.008.
Full textReports on the topic "Elliptic Curve Cryptography"
McGrew, D., K. Igoe, and M. Salter. Fundamental Elliptic Curve Cryptography Algorithms. RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6090.
Full textLochter, M., and J. Merkle. Elliptic Curve Cryptography (ECC) Brainpool Standard Curves and Curve Generation. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5639.
Full textJivsov, A. Elliptic Curve Cryptography (ECC) in OpenPGP. RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6637.
Full textTurner, S., D. Brown, K. Yiu, R. Housley, and T. Polk. Elliptic Curve Cryptography Subject Public Key Information. RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5480.
Full textWoodbury, Adam D., Daniel V. Bailey, and Christof Paar. Elliptic Curve Cryptography on Smart Cards Without Coprocessors. Defense Technical Information Center, 2000. http://dx.doi.org/10.21236/ada385851.
Full textMerkle, J., and M. Lochter. Elliptic Curve Cryptography (ECC) Brainpool Curves for Transport Layer Security (TLS). RFC Editor, 2013. http://dx.doi.org/10.17487/rfc7027.
Full textBlake-Wilson, S., D. Brown, and P. Lambert. Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS). RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3278.
Full textTurner, S., and D. Brown. Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS). RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5753.
Full textIto, T., and S. Turner. Clarifications for Elliptic Curve Cryptography Subject Public Key Information. RFC Editor, 2020. http://dx.doi.org/10.17487/rfc8813.
Full textBruckert, L., J. Merkle, and M. Lochter. Elliptic Curve Cryptography (ECC) Brainpool Curves for Transport Layer Security (TLS) Version 1.3. RFC Editor, 2020. http://dx.doi.org/10.17487/rfc8734.
Full text