Journal articles on the topic 'Elliptic Curve Cryptography (ECC)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Elliptic Curve Cryptography (ECC).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yan, Yuhan. "The Overview of Elliptic Curve Cryptography (ECC)." Journal of Physics: Conference Series 2386, no. 1 (2022): 012019. http://dx.doi.org/10.1088/1742-6596/2386/1/012019.
Full textAbhishek, Kunal, and E. George Dharma Prakash Raj. "Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography." Cybernetics and Information Technologies 21, no. 2 (2021): 70–88. http://dx.doi.org/10.2478/cait-2021-0020.
Full textJebrane, Jihane, Akram Chhaybi, Saiida Lazaar, and Abderrahmane Nitaj. "Elliptic Curve Cryptography with Machine Learning." Cryptography 9, no. 1 (2024): 3. https://doi.org/10.3390/cryptography9010003.
Full textAlshar’e, Marwan, Sharf Alzu’bi, Ahed Al-Haraizah, Hamzah Ali Alkhazaleh, Malik Jawarneh, and Mohammad Rustom Al Nasar. "Elliptic curve cryptography based light weight technique for information security." Bulletin of Electrical Engineering and Informatics 14, no. 3 (2025): 2300–2308. https://doi.org/10.11591/eei.v14i3.8587.
Full textDuka, Mariusz. "ELLIPTIC-CURVE CRYPTOGRAPHY (ECC) AND ARGON2 ALGORITHM IN PHP USING OPENSSL AND SODIUM LIBRARIES." Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska 10, no. 3 (2020): 91–94. http://dx.doi.org/10.35784/iapgos.897.
Full textMichael, Nsikan John, Otobong. G. Udoaka, and Musa Alex. "SYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE AND LIE ALGEBRA." GPH - International Journal of Mathematics 06, no. 10 (2023): 01–10. https://doi.org/10.5281/zenodo.10252317.
Full textObukhov, Vadim, Zulayho Qadamova, Muzaffar Sobirov, Otabek Ergashev, and Ravshanbek Nabijonov. "Methods for using elliptic curves in cryptography." E3S Web of Conferences 508 (2024): 05009. http://dx.doi.org/10.1051/e3sconf/202450805009.
Full textMiao, Zhe. "Elliptic curve cryptography: Theory, security, and applications in modern network security." Theoretical and Natural Science 51, no. 1 (2024): 114–20. http://dx.doi.org/10.54254/2753-8818/51/2024ch0183.
Full textZahra, Della Annisa, Rini Marwati, and Ririn Sispiyati. "Kriptografi Visual pada Gambar Berwarna (RGB) Menggunakan Algoritma Elliptic Curve Cryptography." Jurnal EurekaMatika 9, no. 2 (2021): 141–50. http://dx.doi.org/10.17509/jem.v9i2.40054.
Full textT. Anupreethi. "Cryptographic Application of Elliptic Curve generated through the formation of Diophantine triples using Hex Numbers and Pronic Numbers." Communications on Applied Nonlinear Analysis 32, no. 9s (2025): 836–40. https://doi.org/10.52783/cana.v32.4017.
Full textWeku, Winsy. "Model Proyeksi (X/Z2, Y/Z2) pada Kurva Hesian Secara Paralel Menggunakan Mekanisme Kriptografi Kurva Eliptik." JURNAL ILMIAH SAINS 12, no. 1 (2012): 65. http://dx.doi.org/10.35799/jis.12.1.2012.404.
Full textSangeetha, V., T. Anupreethi, and Manju Somanath. "Cryptographic Application of Elliptic Curve Generated through Centered Hexadecagonal Numbers." Indian Journal Of Science And Technology 17, no. 20 (2024): 2074–78. http://dx.doi.org/10.17485/ijst/v17i20.1183.
Full textV, Sangeetha, Anupreethi T, and Somanath Manju. "Cryptographic Application of Elliptic Curve Generated through Centered Hexadecagonal Numbers." Indian Journal of Science and Technology 17, no. 20 (2024): 2074–78. https://doi.org/10.17485/IJST/v17i20.1183.
Full textTaqwa, Ainur Rilo, and Danang Haryo Sulaksono. "IMPLEMENTASI KRIPTOGRAFI DENGAN METODE ELLIPTIC CURVE CRYPTOGRAPHY (ECC) UNTUK APLIKASI CHATTING DALAM CLOUD COMPUTING BERBASIS ANDROID." KERNEL: Jurnal Riset Inovasi Bidang Informatika dan Pendidikan Informatika 1, no. 1 (2020): 42–48. http://dx.doi.org/10.31284/j.kernel.2020.v1i1.929.
Full textThanh, Dinh Tien, Nguyen Quoc Toan, Nguyen Van Son, and Nguyen Van Duan. "An algorithm to select a secure twisted elliptic curve in cryptography." Journal of Science and Technology on Information security 1, no. 15 (2022): 17–25. http://dx.doi.org/10.54654/isj.v1i15.832.
Full textRanjita and Gautam Kumar Rajput Dr. "Role of data security in elliptic curve cryptography." International Journal of Trends in Emerging Research and Development 1, no. 1 (2024): 281–85. https://doi.org/10.5281/zenodo.13643253.
Full textTrung, Mai Manh, Le Phe Do, Do Trung Tuan, Nguyen Van Tanh, and Ngo Quang Tri. "Design a cryptosystem using elliptic curves cryptography and Vigenère symmetry key." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 1734. http://dx.doi.org/10.11591/ijece.v13i2.pp1734-1743.
Full textTrung, Mai Manh, Le Phe Do, Do Trung Tuan, et al. "The comparison of several cryptosystems using the elliptic curve: a report." International Journal of Electrical and Computer Engineering (IJECE) 14, no. 5 (2024): 5319. http://dx.doi.org/10.11591/ijece.v14i5.pp5319-5329.
Full textPurwiko, Daniel Perdana Putra, Favian Dewanta, and Farah Afianti. "ANALISIS PENGGUNAAN ECC PADA SISTEM AUTENTIKASI DI IOT." MULTINETICS 8, no. 1 (2022): 42–49. http://dx.doi.org/10.32722/multinetics.v8i1.4701.
Full textMai, Manh Trung, Phe Do Le, Trung Tuan Do, Van Tanh Nguyen, and Quang Tri Ngo. "Design a cryptosystem using elliptic curves cryptography and Vigenère symmetry key." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 1734–43. https://doi.org/10.11591/ijece.v13i2.pp1734-1743.
Full textMaimuţ, Diana, and Alexandru Cristian Matei. "Speeding-Up Elliptic Curve Cryptography Algorithms." Mathematics 10, no. 19 (2022): 3676. http://dx.doi.org/10.3390/math10193676.
Full textJayanti, Sravani, K. Chittibabu, and Chandra Sekhar Akkapeddi. "A Cryptosystem of Skewed Affine Cipher of Multiple Keys." ECS Transactions 107, no. 1 (2022): 15071–80. http://dx.doi.org/10.1149/10701.15071ecst.
Full textMaheswari, M., R. A. Karthika, and Anuska Chatterjee. "Implementation Methodology of ECC to Overcome Side Channel Attacks." International Journal of Engineering & Technology 7, no. 3.27 (2018): 421. http://dx.doi.org/10.14419/ijet.v7i3.27.17989.
Full textDomathoti, Manasa, Sai Kowsik Ayyalasomayajula, Venkata Kishore Karri, and Lokesh M. "Hiding Data Using Efficient Combination of ECC And Compression Steganography Techniques." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem42798.
Full textOjha, D. B., Ms Shree, A. Dwivedi, and A. Mishra. "An approach for Embedding Elliptic Curve in Fractal Based Digital Signature Scheme." Journal of Scientific Research 3, no. 1 (2010): 75. http://dx.doi.org/10.3329/jsr.v3i1.4694.
Full textWu, Huangwei. "General analysis on essential mathematical principles of elliptic curve cryptography." Theoretical and Natural Science 10, no. 1 (2023): 123–29. http://dx.doi.org/10.54254/2753-8818/10/20230327.
Full textElhajj, Mohammed, and Pim Mulder. "A Comparative Analysis of the Computation Cost and Energy Consumption of Relevant Curves of ECC Presented in Literature." International Journal of Electrical and Computer Engineering Research 3, no. 1 (2023): 1–6. http://dx.doi.org/10.53375/ijecer.2023.318.
Full textTrung, Mai Manh, Le Phe Do, and Do Trung Tuan. "Building Elliptic Curve Cryptography With Public Key To Encrypt Vietnamese Text." Journal of Science and Technology on Information security 1, no. 15 (2022): 119–26. http://dx.doi.org/10.54654/isj.v1i15.854.
Full textEl Kinani, E. H., and Fatima Amounas. "Proposed Developments of Blind Signature Scheme based on The Elliptic Curve Discrete Logarithm Problem." Computer Engineering and Applications Journal 2, no. 1 (2013): 151–60. http://dx.doi.org/10.18495/comengapp.v2i1.16.
Full textSundararajan, Ananiah Durai Durai, and Rajashree R. "A Comprehensive Survey on Lightweight Asymmetric Key Cryptographic Algorithm for Resource Constrained Devices." ECS Transactions 107, no. 1 (2022): 7457–68. http://dx.doi.org/10.1149/10701.7457ecst.
Full textM, Rudhra, Sathya Lakshmi N, Thenmozhi S, Tamizhenthi A, and Nandhagopal N. "ECC: Elliptic Curve Cryptography-based Watchdog for Detecting Malicious Nodes." SIJ Transactions on Computer Networks & Communication Engineering 05, no. 04 (2017): 04–08. http://dx.doi.org/10.9756/sijcnce/v5i4/05010120101.
Full textUpadhyay, Bipin Chandra, and Priyanka Sirola. "A STUDY ON ELLIPTIC CURVE, ITS PROPERTIES AND APPLICATIONS." International Journal of Engineering Science and Humanities 3, no. 1 (2013): 41–47. http://dx.doi.org/10.62904/1nhrs467.
Full textAbdulnabi, Mohamed Wameedh. "Elliptic Curve Implementation and its Applications: A Review." Iraqi Journal of Intelligent Computing and Informatics (IJICI) 2, no. 2 (2023): 90–100. http://dx.doi.org/10.52940/ijici.v2i2.39.
Full textVamsi, Desam, and Pradeep Reddy CH. "Hybrid Image Encryption Using Elliptic Curve Cryptography, Hadamard Transform and Hill Cipher." Webology 19, no. 1 (2022): 2357–78. http://dx.doi.org/10.14704/web/v19i1/web19160.
Full textJosepha Menandas J. and Mary Subaja Christo. "Chinese Remainder Theorem-Based Encoding of Text to Point Elliptic Curve Cryptography." Journal of Advanced Research in Applied Sciences and Engineering Technology 47, no. 2 (2024): 148–59. http://dx.doi.org/10.37934/araset.47.2.148159.
Full textMs., A. A. Deshmukh, Manali Dubal Ms., Mahesh TR Dr., and C. R. Chauhan Mr. "DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARD." International Journal of Advanced Information Technology (IJAIT) 2, no. 2 (2012): 41–57. https://doi.org/10.5281/zenodo.3534867.
Full textMutar, Ahmed Fakhir, Leyli Mohammad Khanli, and Hojjat Emami. "A hybrid cryptographic and deep learning approach for IoT device security." Journal of Discrete Mathematical Sciences and Cryptography 28, no. 4-B (2025): 1437–49. https://doi.org/10.47974/jdmsc-2289.
Full textRoutis, George, Panagiotis Dagas, and Ioanna Roussaki. "Enhancing Privacy in the Internet of Vehicles via Hyperelliptic Curve Cryptography." Electronics 13, no. 4 (2024): 730. http://dx.doi.org/10.3390/electronics13040730.
Full textMetrilitna Br Sembiring. "ELLIPTIC CURVE CRYPTOGRAPHY (ECC) PADA PROSES PERTUKARAN KUNCI PUBLIK DIFFIE-HELMAN." Visipena Journal 6, no. 1 (2015): 25–33. http://dx.doi.org/10.46244/visipena.v6i1.351.
Full textDar, Muneer Ahmad, Aadil Askar, Daliya Alyahya, and Sameer Ahmad Bhat. "Lightweight and Secure Elliptical Curve Cryptography (ECC) Key Exchange for Mobile Phones." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 23 (2021): 89–103. http://dx.doi.org/10.3991/ijim.v15i23.26337.
Full textJudge, Lyndon, Suvarna Mane, and Patrick Schaumont. "A Hardware-Accelerated ECDLP with High-Performance Modular Multiplication." International Journal of Reconfigurable Computing 2012 (2012): 1–14. http://dx.doi.org/10.1155/2012/439021.
Full textPocarovsky, Stefan, Martin Koppl, and Milos Orgon. "Flawed implemented cryptographic algorithm in the Microsoft ecosystem." Journal of Electrical Engineering 73, no. 3 (2022): 190–96. http://dx.doi.org/10.2478/jee-2022-0025.
Full textD., Sudha Devi, Thilagavathy K., and Sai Krishnan Preethi. "AN EFFICIENT AND SECURE DIGITAL MULTISIGNATURE PROTOCOL BASED ON ECC." International Journal on Cryptography and Information Security (IJCIS) 5, no. 3/4 (2015): 15–21. https://doi.org/10.5281/zenodo.1246948.
Full textKumar, Manoj, O. P., and Archana Saxena. "Elliptic Curve Cryptography (ECC) based Relational Database Watermarking." International Journal of Computer Applications 154, no. 6 (2016): 20–28. http://dx.doi.org/10.5120/ijca2016912159.
Full textAyyalasomayajula, Madan Mohan Tito, Hayder M. A. Ghanimi, M. Manimaran, et al. "Enhanced network security through algebraic cryptanalysis of elliptic curve cryptography." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 7 (2024): 2219–30. http://dx.doi.org/10.47974/jdmsc-2093.
Full textVerri Lucca, Arielle, Guilherme Augusto Mariano Sborz, Valderi Reis Quietinho Leithardt, Marko Beko, Cesar Albenes Zeferino, and Wemerson Delcio Parreira. "A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware." Journal of Sensor and Actuator Networks 10, no. 1 (2020): 3. http://dx.doi.org/10.3390/jsan10010003.
Full textSingh Bhadoria, Anurag, and Anurag Jain. "A Review of Digital Signature Using Different Elliptic Cryptography Technique." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 8 (2016): 6976–78. http://dx.doi.org/10.24297/ijct.v15i8.1499.
Full textCH. Neelima. "Minimising the Cipher Length of Elliptic Curve Cryptography Basing on Chebyshev Polynomial." Journal of Information Systems Engineering and Management 10, no. 38s (2025): 294–303. https://doi.org/10.52783/jisem.v10i38s.6850.
Full textIsmail, N. H. M., and M. Y. Misro. "Bézier Coefficients Matrix for ElGamal Elliptic Curve Cryptosystem." Malaysian Journal of Mathematical Sciences 16, no. 3 (2022): 483–99. http://dx.doi.org/10.47836/mjms.16.3.06.
Full textHarika B, Dr. "A Decentralized Approach to Academic Certificate Management Using Blockchain and IPFS." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47151.
Full text