Academic literature on the topic 'Elliptic Curve Cryptography (ECC)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Elliptic Curve Cryptography (ECC).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Elliptic Curve Cryptography (ECC)"
Yan, Yuhan. "The Overview of Elliptic Curve Cryptography (ECC)." Journal of Physics: Conference Series 2386, no. 1 (2022): 012019. http://dx.doi.org/10.1088/1742-6596/2386/1/012019.
Full textAbhishek, Kunal, and E. George Dharma Prakash Raj. "Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography." Cybernetics and Information Technologies 21, no. 2 (2021): 70–88. http://dx.doi.org/10.2478/cait-2021-0020.
Full textJebrane, Jihane, Akram Chhaybi, Saiida Lazaar, and Abderrahmane Nitaj. "Elliptic Curve Cryptography with Machine Learning." Cryptography 9, no. 1 (2024): 3. https://doi.org/10.3390/cryptography9010003.
Full textAlshar’e, Marwan, Sharf Alzu’bi, Ahed Al-Haraizah, Hamzah Ali Alkhazaleh, Malik Jawarneh, and Mohammad Rustom Al Nasar. "Elliptic curve cryptography based light weight technique for information security." Bulletin of Electrical Engineering and Informatics 14, no. 3 (2025): 2300–2308. https://doi.org/10.11591/eei.v14i3.8587.
Full textDuka, Mariusz. "ELLIPTIC-CURVE CRYPTOGRAPHY (ECC) AND ARGON2 ALGORITHM IN PHP USING OPENSSL AND SODIUM LIBRARIES." Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska 10, no. 3 (2020): 91–94. http://dx.doi.org/10.35784/iapgos.897.
Full textMichael, Nsikan John, Otobong. G. Udoaka, and Musa Alex. "SYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE AND LIE ALGEBRA." GPH - International Journal of Mathematics 06, no. 10 (2023): 01–10. https://doi.org/10.5281/zenodo.10252317.
Full textObukhov, Vadim, Zulayho Qadamova, Muzaffar Sobirov, Otabek Ergashev, and Ravshanbek Nabijonov. "Methods for using elliptic curves in cryptography." E3S Web of Conferences 508 (2024): 05009. http://dx.doi.org/10.1051/e3sconf/202450805009.
Full textMiao, Zhe. "Elliptic curve cryptography: Theory, security, and applications in modern network security." Theoretical and Natural Science 51, no. 1 (2024): 114–20. http://dx.doi.org/10.54254/2753-8818/51/2024ch0183.
Full textZahra, Della Annisa, Rini Marwati, and Ririn Sispiyati. "Kriptografi Visual pada Gambar Berwarna (RGB) Menggunakan Algoritma Elliptic Curve Cryptography." Jurnal EurekaMatika 9, no. 2 (2021): 141–50. http://dx.doi.org/10.17509/jem.v9i2.40054.
Full textT. Anupreethi. "Cryptographic Application of Elliptic Curve generated through the formation of Diophantine triples using Hex Numbers and Pronic Numbers." Communications on Applied Nonlinear Analysis 32, no. 9s (2025): 836–40. https://doi.org/10.52783/cana.v32.4017.
Full textDissertations / Theses on the topic "Elliptic Curve Cryptography (ECC)"
Bommireddipalli, Nithesh Venkata Ramana Surya. "Tutorial on Elliptic Curve Arithmetic and Introduction to Elliptic Curve Cryptography (ECC)." University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1511866832906148.
Full textKultinov, Kirill. "Software Implementations and Applications of Elliptic Curve Cryptography." Wright State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=wright1559232475298514.
Full textLien, E.-Jen. "EFFICIENT IMPLEMENTATION OF ELLIPTIC CURVE CRYPTOGRAPHY IN RECONFIGURABLE HARDWARE." Case Western Reserve University School of Graduate Studies / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=case1333761904.
Full textbaktir, selcuk. "Frequency Domain Finite Field Arithmetic for Elliptic Curve Cryptography." Digital WPI, 2008. https://digitalcommons.wpi.edu/etd-dissertations/272.
Full textKrisell, Martin. "Elliptic Curve Digital Signatures in RSA Hardware." Thesis, Linköpings universitet, Informationskodning, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-81084.
Full textHitchcock, Yvonne Roslyn. "Elliptic curve cryptography for lightweight applications." Thesis, Queensland University of Technology, 2003. https://eprints.qut.edu.au/15838/1/Yvonne_Hitchcock_Thesis.pdf.
Full textHitchcock, Yvonne Roslyn. "Elliptic Curve Cryptography for Lightweight Applications." Queensland University of Technology, 2003. http://eprints.qut.edu.au/15838/.
Full textMurdica, Cédric. "Sécurité physique de la cryptographie sur courbes elliptiques." Thesis, Paris, ENST, 2014. http://www.theses.fr/2014ENST0008/document.
Full textAbu-Mahfouz, Adnan Mohammed. "Elliptic curve cryptosystem over optimal extension fields for computationally constrained devices." Diss., University of Pretoria, 2004. http://hdl.handle.net/2263/25330.
Full textFelding, Eric. "Simuleringar av elliptiska kurvor för elliptisk kryptografi." Thesis, Linköpings universitet, Matematik och tillämpad matematik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158133.
Full textBooks on the topic "Elliptic Curve Cryptography (ECC)"
Stevens, Zac Roger Julius. Elliptic Curve Cryptography. Oxford Brookes University, 2003.
Find full textF, Blake Ian, Seroussi G. 1955-, and Smart Nigel P. 1967-, eds. Advances in elliptic curve cryptography. Cambridge University Press, 2005.
Find full textMenezes, A. J. Elliptic curve public key cryptosystems. Kluwer Academic Publishers, 1993.
Find full textHenri, Cohen, and Frey Gerhard 1944-, eds. Handbook of elliptic and hyperelliptic curve cryptography. Taylor and Francis, 2005.
Find full textBlake, Ian F., Gadiel Seroussi, and Nigel P. Smart, eds. Advances in Elliptic Curve Cryptography. Cambridge University Press, 2005. http://dx.doi.org/10.1017/cbo9780511546570.
Full textGuide to Elliptic Curve Cryptography. Springer-Verlag, 2004. http://dx.doi.org/10.1007/b97644.
Full textHankerson, Darrel, Alfred J. Menezes, and Scott Vanstone. Guide to Elliptic Curve Cryptography. Springer London, Limited, 2004.
Find full textLange, Tanja, Henri Cohen, Gerhard Frey, Roberto Avanzi, and Christophe Doche. Elliptic and Hyperelliptic Curve Cryptography. Taylor & Francis Group, 2018.
Find full textHankerson, Darrel, Alfred J. Menezes, and Scott Vanstone. Guide to Elliptic Curve Cryptography. Springer New York, 2010.
Find full textBook chapters on the topic "Elliptic Curve Cryptography (ECC)"
Wohlgemuth, Martin. "ECC — Elliptic Curves Cryptography." In Mathematisch für fortgeschrittene Anfänger. Spektrum Akademischer Verlag, 2010. http://dx.doi.org/10.1007/978-3-8274-2607-9_24.
Full textRaghav, Piyush, and Amit Dua. "Security and Cryptography in Images and Video Using Elliptic Curve Cryptography (ECC)." In Cryptographic and Information Security. CRC Press, 2018. http://dx.doi.org/10.1201/9780429435461-6.
Full textLiu, Zhe, Erich Wenger, and Johann Großschädl. "MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks." In Applied Cryptography and Network Security. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07536-5_22.
Full textMoosavi, Sanaz Rahimi, and Arman Izadifar. "End-to-End Security Scheme for E-Health Systems Using DNA-Based ECC." In Silicon Valley Cybersecurity Conference. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96057-5_6.
Full textEl Sayed Amer, Mohamed Saied M., Nancy El Hefnawy, and Hatem Mohamed Abdual-Kader. "Enhance Fog-Based E-learning System Security Using Elliptic Curve Cryptography (ECC) and SQL Database." In International Conference on Innovative Computing and Communications. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-4071-4_34.
Full textVishwakarma, Janmejay Kumar, and Rajendra Kumar Dwivedi. "Designing a Secure Oil and Gas Supply Chain System with Elliptic Curve Cryptography (ECC) Enabled Blockchain." In Proceedings of 4th International Conference on Artificial Intelligence and Smart Energy. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-61475-0_33.
Full textEch Chkaf, Ayoub, Abdelhadi El Allali, Siham Beloualid, et al. "Applying Lightweight Elliptic Curve Cryptography ECC to Smart Energy IoT Platforms Based on the CoAP Protocol." In Advances in Information, Communication and Cybersecurity. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-91738-8_20.
Full textKumar, Priyanka Rajan, and Sonia Goel. "SE-ECC: A Secure and Efficient Symmetric Encryption Framework with Elliptic Curve Cryptography Key Exchange for Fog Communication." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-96-2647-2_24.
Full textJoglekar, Jyoti, Simran Bhutani, Nisha Patel, and Pradnya Soman. "Lightweight Elliptical Curve Cryptography (ECC) for Data Integrity and User Authentication in Smart Transportation IoT System." In Sustainable Communication Networks and Application. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34515-0_28.
Full textHamza, Fatima Zahra, Sanaa El Aidi, Abdelhadi El Allali, Siham Beloualid, Abderrahim Bajit, and Ahmed Tamtaoui. "Applying Lightweight Elliptic Curve Cryptography ECC and Advanced IoT Network Topologies to Optimize COVID-19 Sanitary Passport Platforms Based on Constrained Application Protocol." In Advances on Intelligent Informatics and Computing. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98741-1_42.
Full textConference papers on the topic "Elliptic Curve Cryptography (ECC)"
Pandey, Pushpanjali, Ashish Kumar Singh, Keshav Kumar, Hardik Gohel, Leila Rzayeva, and Bishwajeet Pandey. "HSTL IO Standards Based Low Power Implementation of Elliptic Curve Cryptography (ECC) on FPGA." In 2024 IEEE 4th International Conference on Smart Information Systems and Technologies (SIST). IEEE, 2024. http://dx.doi.org/10.1109/sist61555.2024.10629505.
Full textRachmayanti, Alifina, and Wirawan Wirawan. "Elliptic Curve Cryptography (ECC) Based Authentication Scheme on IoT Networks for Health Information Systems." In 2024 International Seminar on Intelligent Technology and Its Applications (ISITIA). IEEE, 2024. http://dx.doi.org/10.1109/isitia63062.2024.10668289.
Full textHuang, Yicheng, Xueyan Wang, Tianao Dai, et al. "LLP-ECCA: A Low-Latency and Programmable Framework for Elliptic Curve Cryptography Accelerators." In 2024 IEEE International Test Conference in Asia (ITC-Asia). IEEE, 2024. http://dx.doi.org/10.1109/itc-asia62534.2024.10661323.
Full textMaimuţ, Diana, Cristian Matei, and George Teşeleanu. "(Deep) Learning About Elliptic Curve Cryptography." In 11th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013095100003899.
Full textAbhinav, Surjeet Singh Chauhan Gonder, Prachi Garg, and Sudhanshu Shekhar Dubey. "$k^{\prime}$ -Lucas Sequence for Elliptic Curve Cryptography." In 2025 First International Conference on Advances in Computer Science, Electrical, Electronics, and Communication Technologies (CE2CT). IEEE, 2025. https://doi.org/10.1109/ce2ct64011.2025.10939091.
Full textPonomarev, Oleg, Andrey Khurri, and Andrei Gurtov. "Elliptic Curve Cryptography (ECC) for Host Identity Protocol (HIP)." In 2010 Ninth International Conference on Networks. IEEE, 2010. http://dx.doi.org/10.1109/icn.2010.68.
Full textAsaker, Ahmed A., Zeinab F. Elsharkawy, Sabry Nassar, Nabil Ayad, O. Zahran, and Fathi E. Abd El-Samie. "A Novel Iris Cryptosystem Using Elliptic Curve Cryptography." In 2021 9th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC). IEEE, 2021. http://dx.doi.org/10.1109/jac-ecc54461.2021.9691307.
Full textHu, Yu, Qing Li, Lei Huang, and Chung-Chieh Jay Kuo. "Efficient implementation of elliptic curve cryptography (ECC) on embedded media processors." In Electronic Imaging 2004, edited by Sethuraman Panchanathan and Bhaskaran Vasudev. SPIE, 2004. http://dx.doi.org/10.1117/12.532449.
Full textChauhan, Miss Manorama. "An implemented of hybrid cryptography using elliptic curve cryptosystem (ECC) and MD5." In 2016 International Conference on Inventive Computation Technologies (ICICT). IEEE, 2016. http://dx.doi.org/10.1109/inventive.2016.7830092.
Full textS. Gornale, Shivanand, and A. C. Nuthan. "Discrete Wavelet Transform (DWT) Based Triple-stegging With Elliptic Curve Cryptography (ECC)." In Second International Conference on Signal Processing, Image Processing and VLSI. Research Publishing Services, 2015. http://dx.doi.org/10.3850/978-981-09-6200-5_o-59.
Full textReports on the topic "Elliptic Curve Cryptography (ECC)"
Jivsov, A. Elliptic Curve Cryptography (ECC) in OpenPGP. RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6637.
Full textLochter, M., and J. Merkle. Elliptic Curve Cryptography (ECC) Brainpool Standard Curves and Curve Generation. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5639.
Full textMerkle, J., and M. Lochter. Elliptic Curve Cryptography (ECC) Brainpool Curves for Transport Layer Security (TLS). RFC Editor, 2013. http://dx.doi.org/10.17487/rfc7027.
Full textBlake-Wilson, S., D. Brown, and P. Lambert. Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS). RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3278.
Full textTurner, S., and D. Brown. Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS). RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5753.
Full textMcGrew, D., D. Bailey, M. Campagna, and R. Dugal. AES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites for TLS. RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7251.
Full textBruckert, L., J. Merkle, and M. Lochter. Elliptic Curve Cryptography (ECC) Brainpool Curves for Transport Layer Security (TLS) Version 1.3. RFC Editor, 2020. http://dx.doi.org/10.17487/rfc8734.
Full textBlake-Wilson, S., N. Bolyard, V. Gupta, C. Hawk, and B. Moeller. Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS). RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4492.
Full textZhu, L., K. Jaganathan, and K. Lauter. Elliptic Curve Cryptography (ECC) Support for Public Key Cryptography for Initial Authentication in Kerberos (PKINIT). RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5349.
Full textMerkle, J., and M. Lochter. Using the Elliptic Curve Cryptography (ECC) Brainpool Curves for the Internet Key Exchange Protocol Version 2 (IKEv2). RFC Editor, 2013. http://dx.doi.org/10.17487/rfc6954.
Full text