Journal articles on the topic 'Elliptic Curve Cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Elliptic Curve Cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yan, Yuhan. "The Overview of Elliptic Curve Cryptography (ECC)." Journal of Physics: Conference Series 2386, no. 1 (2022): 012019. http://dx.doi.org/10.1088/1742-6596/2386/1/012019.
Full textShchur, Nataliia, Oleksandra Pokotylo, and Yelyzaveta Bailiuk. "ELLIPTIC CURVE CRYPTOGRAPHY AND ITS PRACTICAL APPLICATION." Cybersecurity: Education, Science, Technique 1, no. 21 (2023): 48–64. http://dx.doi.org/10.28925/2663-4023.2023.21.4864.
Full textAbhishek, Kunal, and E. George Dharma Prakash Raj. "Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography." Cybernetics and Information Technologies 21, no. 2 (2021): 70–88. http://dx.doi.org/10.2478/cait-2021-0020.
Full textMichael, Nsikan John, Otobong. G. Udoaka, and Musa Alex. "SYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE AND LIE ALGEBRA." GPH - International Journal of Mathematics 06, no. 10 (2023): 01–10. https://doi.org/10.5281/zenodo.10252317.
Full textTama, Yanuar Bhakti Wira, and Muhammad Firdhausi Fahmi. "Sistem Kriptografi Klasik Dengan Memanfaatkan Orde Dari Grup Titik Pada Kurva Eliptik Bentuk Montgomery." Euler : Jurnal Ilmiah Matematika, Sains dan Teknologi 11, no. 2 (2023): 361–71. http://dx.doi.org/10.37905/euler.v11i2.23009.
Full textSangeetha, V., T. Anupreethi, and Manju Somanath. "Cryptographic Application of Elliptic Curve Generated through Centered Hexadecagonal Numbers." Indian Journal Of Science And Technology 17, no. 20 (2024): 2074–78. http://dx.doi.org/10.17485/ijst/v17i20.1183.
Full textV, Sangeetha, Anupreethi T, and Somanath Manju. "Cryptographic Application of Elliptic Curve Generated through Centered Hexadecagonal Numbers." Indian Journal of Science and Technology 17, no. 20 (2024): 2074–78. https://doi.org/10.17485/IJST/v17i20.1183.
Full textKapoor, Vivek, Vivek Sonny Abraham, and Ramesh Singh. "Elliptic curve cryptography." Ubiquity 2008, May (2008): 1–8. http://dx.doi.org/10.1145/1386853.1378356.
Full textTsiganov, A. V. "Duffing Oscillator and Elliptic Curve Cryptography." Nelineinaya Dinamika 14, no. 2 (2018): 235–41. http://dx.doi.org/10.20537/nd180207.
Full textAlshar’e, Marwan, Sharf Alzu’bi, Ahed Al-Haraizah, Hamzah Ali Alkhazaleh, Malik Jawarneh, and Mohammad Rustom Al Nasar. "Elliptic curve cryptography based light weight technique for information security." Bulletin of Electrical Engineering and Informatics 14, no. 3 (2025): 2300–2308. https://doi.org/10.11591/eei.v14i3.8587.
Full textDuka, Mariusz. "ELLIPTIC-CURVE CRYPTOGRAPHY (ECC) AND ARGON2 ALGORITHM IN PHP USING OPENSSL AND SODIUM LIBRARIES." Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska 10, no. 3 (2020): 91–94. http://dx.doi.org/10.35784/iapgos.897.
Full textTrung, Mai Manh, Le Phe Do, Do Trung Tuan, Nguyen Van Tanh, and Ngo Quang Tri. "Design a cryptosystem using elliptic curves cryptography and Vigenère symmetry key." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 1734. http://dx.doi.org/10.11591/ijece.v13i2.pp1734-1743.
Full textTrung, Mai Manh, Le Phe Do, Do Trung Tuan, et al. "The comparison of several cryptosystems using the elliptic curve: a report." International Journal of Electrical and Computer Engineering (IJECE) 14, no. 5 (2024): 5319. http://dx.doi.org/10.11591/ijece.v14i5.pp5319-5329.
Full textHu, Ruoxi, and Weihong Wu. "Security of elliptic curve cryptosystems over Z_n." Theoretical and Natural Science 12, no. 1 (2023): 38–45. http://dx.doi.org/10.54254/2753-8818/12/20230429.
Full textMai, Manh Trung, Phe Do Le, Trung Tuan Do, Van Tanh Nguyen, and Quang Tri Ngo. "Design a cryptosystem using elliptic curves cryptography and Vigenère symmetry key." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 1734–43. https://doi.org/10.11591/ijece.v13i2.pp1734-1743.
Full textJebrane, Jihane, Akram Chhaybi, Saiida Lazaar, and Abderrahmane Nitaj. "Elliptic Curve Cryptography with Machine Learning." Cryptography 9, no. 1 (2024): 3. https://doi.org/10.3390/cryptography9010003.
Full textCilardo, A., L. Coppolino, N. Mazzocca, and L. Romano. "Elliptic Curve Cryptography Engineering." Proceedings of the IEEE 94, no. 2 (2006): 395–406. http://dx.doi.org/10.1109/jproc.2005.862438.
Full textJuhari, Juhari, and Mohamad Febry Andrean. "On the Application of Noiseless Steganography and Elliptic Curves Cryptography Digital Signature Algorithm Methods in Securing Text Messages." CAUCHY: Jurnal Matematika Murni dan Aplikasi 7, no. 3 (2022): 483–92. http://dx.doi.org/10.18860/ca.v7i3.17358.
Full textObukhov, Vadim, Zulayho Qadamova, Muzaffar Sobirov, Otabek Ergashev, and Ravshanbek Nabijonov. "Methods for using elliptic curves in cryptography." E3S Web of Conferences 508 (2024): 05009. http://dx.doi.org/10.1051/e3sconf/202450805009.
Full textAbhishek, Kunal, and E. George Dharma Prakash Raj. "Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography." Cybernetics and Information Technologies 21, no. 4 (2021): 105–18. http://dx.doi.org/10.2478/cait-2021-0045.
Full textUmarov, Shohzod Zafar oʻgʻli. "ANALYSIS OF CRYPTOSYSTEMS BASED ON ELLIPTIC CURVES." Multidisciplinary Journal of Science and Technology 3, no. 5 (2023): 176–79. https://doi.org/10.5281/zenodo.10396099.
Full textT. Anupreethi. "Cryptographic Application of Elliptic Curve generated through the formation of Diophantine triples using Hex Numbers and Pronic Numbers." Communications on Applied Nonlinear Analysis 32, no. 9s (2025): 836–40. https://doi.org/10.52783/cana.v32.4017.
Full textDe Smet, Ruben, Robrecht Blancquaert, Tom Godden, Kris Steenhaut, and An Braeken. "Armed with Faster Crypto: Optimizing Elliptic Curve Cryptography for ARM Processors." Sensors 24, no. 3 (2024): 1030. http://dx.doi.org/10.3390/s24031030.
Full textHuque, Md Sirajul, Sk Bhadar Saheb, and Jayaram Boga. "An Approach to Secure Data Aggregation in Wireless Sensor Networks (WSN) using Asymmetric Homomorphic Encryption (Elliptic Curve Cryptography) Scheme." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 263. http://dx.doi.org/10.23956/ijarcsse/v7i7/0162.
Full textBernstein, Daniel J., and Tanja Lange. "Hyper-and-elliptic-curve cryptography." LMS Journal of Computation and Mathematics 17, A (2014): 181–202. http://dx.doi.org/10.1112/s1461157014000394.
Full textFan, Jing, Xuejun Fan, Ningning Song, and Long Wang. "Hyperelliptic Covers of Different Degree for Elliptic Curves." Mathematical Problems in Engineering 2022 (July 4, 2022): 1–11. http://dx.doi.org/10.1155/2022/9833393.
Full textMORALES-SANDOVAL, M., C. FEREGRINO-URIBE, R. CUMPLIDO, and I. ALGREDO-BADILLO. "A SINGLE FORMULA AND ITS IMPLEMENTATION IN FPGA FOR ELLIPTIC CURVE POINT ADDITION USING AFFINE REPRESENTATION." Journal of Circuits, Systems and Computers 19, no. 02 (2010): 425–33. http://dx.doi.org/10.1142/s0218126610006153.
Full textLopez, Maria Isaura, and Ayad Barsoum. "Traditional Public-Key Cryptosystems and Elliptic Curve Cryptography." International Journal of Cyber Research and Education 4, no. 1 (2022): 1–14. http://dx.doi.org/10.4018/ijcre.309688.
Full textMaimuţ, Diana, and Alexandru Cristian Matei. "Speeding-Up Elliptic Curve Cryptography Algorithms." Mathematics 10, no. 19 (2022): 3676. http://dx.doi.org/10.3390/math10193676.
Full textZhang, Zhengqi, and Yan Zhao. "Enhanced Elliptic Curve Cryptography (EECC)." Procedia Computer Science 247 (2024): 1324–30. http://dx.doi.org/10.1016/j.procs.2024.10.158.
Full textZahra, Della Annisa, Rini Marwati, and Ririn Sispiyati. "Kriptografi Visual pada Gambar Berwarna (RGB) Menggunakan Algoritma Elliptic Curve Cryptography." Jurnal EurekaMatika 9, no. 2 (2021): 141–50. http://dx.doi.org/10.17509/jem.v9i2.40054.
Full textFuta, Yuichi, Hiroyuki Okazaki, Daichi Mizushima, and Yasunari Shidama. "Operations of Points on Elliptic Curve in Projective Coordinates." Formalized Mathematics 20, no. 1 (2012): 87–95. http://dx.doi.org/10.2478/v10037-012-0012-2.
Full textAdnan, Mrs.Ansari Afreen Mohammad, Mrs.Ansari Afra Aijaz Ahmed, Mr.Meraj Shabbir Bubere, and Mr.Umer Farooque Khaleel Ahmad. "Elliptic Curve Cryptography: A Mathematical Approach." International Journal of Advance and Applied Research 5, no. 23 (2024): 233–37. https://doi.org/10.5281/zenodo.13622350.
Full textTaqwa, Ainur Rilo, and Danang Haryo Sulaksono. "IMPLEMENTASI KRIPTOGRAFI DENGAN METODE ELLIPTIC CURVE CRYPTOGRAPHY (ECC) UNTUK APLIKASI CHATTING DALAM CLOUD COMPUTING BERBASIS ANDROID." KERNEL: Jurnal Riset Inovasi Bidang Informatika dan Pendidikan Informatika 1, no. 1 (2020): 42–48. http://dx.doi.org/10.31284/j.kernel.2020.v1i1.929.
Full textJin, Shi Guo, and Guang Jiang Wang. "Design of Digital Signature Scheme Based on Elliptic Curve Cryptosystem." Applied Mechanics and Materials 685 (October 2014): 579–82. http://dx.doi.org/10.4028/www.scientific.net/amm.685.579.
Full textAnnu. "Algebraic Structures and Their Applications in Modern Cryptography." Innovative Research Thoughts 10, no. 3 (2024): 52–59. http://dx.doi.org/10.36676/irt.v10.i3.1433.
Full textChochtoula, Despoina, Aristidis Ilias, Yannis C. Stamatiou, and Christos Makris. "Integrating Elliptic Curve Cryptography with the Modbus TCP SCADA Communication Protocol." Future Internet 14, no. 8 (2022): 232. http://dx.doi.org/10.3390/fi14080232.
Full textWeku, Winsy. "Model Proyeksi (X/Z2, Y/Z2) pada Kurva Hesian Secara Paralel Menggunakan Mekanisme Kriptografi Kurva Eliptik." JURNAL ILMIAH SAINS 12, no. 1 (2012): 65. http://dx.doi.org/10.35799/jis.12.1.2012.404.
Full textThanh, Dinh Tien, Nguyen Quoc Toan, Nguyen Van Son, and Nguyen Van Duan. "An algorithm to select a secure twisted elliptic curve in cryptography." Journal of Science and Technology on Information security 1, no. 15 (2022): 17–25. http://dx.doi.org/10.54654/isj.v1i15.832.
Full textPocarovsky, Stefan, Martin Koppl, and Milos Orgon. "Flawed implemented cryptographic algorithm in the Microsoft ecosystem." Journal of Electrical Engineering 73, no. 3 (2022): 190–96. http://dx.doi.org/10.2478/jee-2022-0025.
Full textMiao, Zhe. "Elliptic curve cryptography: Theory, security, and applications in modern network security." Theoretical and Natural Science 51, no. 1 (2024): 114–20. http://dx.doi.org/10.54254/2753-8818/51/2024ch0183.
Full textChillali, Sara, and Lahcen Oughdir. "Construction of a Matrix by an Elliptic Curve for Image Encryption." International Journal of Emerging Technology and Advanced Engineering 12, no. 9 (2022): 122–29. http://dx.doi.org/10.46338/ijetae0922_13.
Full textShi, Leyi, and Mengting Liu. "A Decentralized Signcryption Scheme Based on CFL." Sensors 25, no. 6 (2025): 1773. https://doi.org/10.3390/s25061773.
Full textVenkateswarlu, Ch, and Nirmala Teegala. "Implementation of Elliptic Curve Cryptography Processor for FPGA Applications." International Journal of Science and Research (IJSR) 11, no. 4 (2022): 1295–99. http://dx.doi.org/10.21275/sr22423155851.
Full textJayanti, Sravani, K. Chittibabu, and Chandra Sekhar Akkapeddi. "A Cryptosystem of Skewed Affine Cipher of Multiple Keys." ECS Transactions 107, no. 1 (2022): 15071–80. http://dx.doi.org/10.1149/10701.15071ecst.
Full textFuta, Yuichi, Hiroyuki Okazaki, and Yasunari Shidama. "Operations of Points on Elliptic Curve in Affine Coordinates." Formalized Mathematics 27, no. 3 (2019): 315–20. http://dx.doi.org/10.2478/forma-2019-0026.
Full textCheddour, Zakariae, Abdelhakim Chillali, and Ali Mouhib. "Generalized Fibonacci Sequences for Elliptic Curve Cryptography." Mathematics 11, no. 22 (2023): 4656. http://dx.doi.org/10.3390/math11224656.
Full textM., Kalynovych S., and Golovko V. G. "SPECIFICS OF IMPLEMENTATION OF THE ASYMMETRIC ENCRYPTION ALGORITHM ON ELLIPTIC CURVES." Automation of technological and business processes 15, no. 1 (2023): 11. http://dx.doi.org/10.15673/atbp.v15i1.2484.
Full textMehta, Kinjal, and Dharmesh Patel. "A Survey on Elliptic Curve Cryptography." INTERNATIONAL JOURNAL OF RESEARCH IN ADVANCE ENGINEERING 1, no. 2 (2015): 7. http://dx.doi.org/10.26472/ijrae.v1i2.4.
Full textPuttmann, C., J. Shokrollahi, M. Porrmann, and U. Rückert. "Hardware Accelerators for Elliptic Curve Cryptography." Advances in Radio Science 6 (May 26, 2008): 259–64. http://dx.doi.org/10.5194/ars-6-259-2008.
Full text