Journal articles on the topic 'Elliptic Curve Discrete Logarithm (ECDL)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Elliptic Curve Discrete Logarithm (ECDL).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Vidya, Sagar Potharaju*. "FPGA IMPLEMENTATION OF ELLIPTIC CURVE DISCRETE LOGARITHMUSING VERILOG HDL." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 4, no. 11 (2017): 151–62. https://doi.org/10.5281/zenodo.1067986.
Full textHess, F. "Generalising the GHS Attack on the Elliptic Curve Discrete Logarithm Problem." LMS Journal of Computation and Mathematics 7 (2004): 167–92. http://dx.doi.org/10.1112/s146115700000108x.
Full textMaurer, Markus, Alfred Menezes, and Edlyn Teske. "Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree." LMS Journal of Computation and Mathematics 5 (2002): 127–74. http://dx.doi.org/10.1112/s1461157000000723.
Full textAbhishek, Kunal, and E. George Dharma Prakash Raj. "Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography." Cybernetics and Information Technologies 21, no. 2 (2021): 70–88. http://dx.doi.org/10.2478/cait-2021-0020.
Full textAbhishek, Kunal, and E. George Dharma Prakash Raj. "Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography." Cybernetics and Information Technologies 21, no. 4 (2021): 105–18. http://dx.doi.org/10.2478/cait-2021-0045.
Full textCarita, Sa'aadah Sajjana, and Herman Kabetta. "MODIFICATION OF POLLARD RHO ALGORITHM USING NEGATION MAPPING." BAREKENG: Jurnal Ilmu Matematika dan Terapan 16, no. 4 (2022): 1159–66. http://dx.doi.org/10.30598/barekengvol16iss4pp1159-1166.
Full textWang, Mingqiang, and Tao Zhan. "Analysis of the Fault Attack ECDLP over Prime Field." Journal of Applied Mathematics 2011 (2011): 1–11. http://dx.doi.org/10.1155/2011/580749.
Full textTiwari, Namita, Mayur Rahul, Rati Shukla, Devvrat Tyagi, and Ayushi Prakash. "A New Fail-Stop Group Signature over Elliptic Curves Secure against Computationally Unbounded Adversary." International Journal of Electrical and Electronics Research 10, no. 2 (2022): 150–53. http://dx.doi.org/10.37391/ijeer.100217.
Full textWu, Huangwei. "General analysis on essential mathematical principles of elliptic curve cryptography." Theoretical and Natural Science 10, no. 1 (2023): 123–29. http://dx.doi.org/10.54254/2753-8818/10/20230327.
Full textWronski, Michal, and Lukasz Dzierzkowski. "Base of exponent representation matters -- more efficient reduction of discrete logarithm problem and elliptic curve discrete logarithm problem to the QUBO problem." Quantum Information and Computation 24, no. 7&8 (2024): 541–64. http://dx.doi.org/10.26421/qic24.7-8-1.
Full textYoon, Eun-Jun, and Kee-Young Yoo. "Robust User Password Change Scheme based on the Elliptic Curve Cryptosystem." Fundamenta Informaticae 87, no. 3-4 (2008): 483–92. https://doi.org/10.3233/fun-2008-873-411.
Full textConstantinescu, Nicolae, Ioan Daniel Hunyadi, and Oana-Adriana Ticleanu. "An Improved GN-AK Protocol Using Double-Base Scalar Multiplication and Point Halving over Elliptic Curves." Applied Sciences 15, no. 13 (2025): 7492. https://doi.org/10.3390/app15137492.
Full textZhang, Mei Na, Chun Bao Fu, and Wei Fu. "Two New Electronic Cash Schemes Based on Elliptic Curve." Advanced Materials Research 694-697 (May 2013): 2388–93. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2388.
Full textShchur, Nataliia, Oleksandra Pokotylo, and Yelyzaveta Bailiuk. "ELLIPTIC CURVE CRYPTOGRAPHY AND ITS PRACTICAL APPLICATION." Cybersecurity: Education, Science, Technique 1, no. 21 (2023): 48–64. http://dx.doi.org/10.28925/2663-4023.2023.21.4864.
Full textChande, Manoj Kumar, and Balwant Singh Thakur. "Proxy-Protected Proxy Multi-Signature Based on Elliptic Curve." International Journal of Informatics and Communication Technology (IJ-ICT) 3, no. 1 (2014): 67. http://dx.doi.org/10.11591/ijict.v3i1.pp67-72.
Full textAyyalasomayajula, Madan Mohan Tito, Hayder M. A. Ghanimi, M. Manimaran, et al. "Enhanced network security through algebraic cryptanalysis of elliptic curve cryptography." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 7 (2024): 2219–30. http://dx.doi.org/10.47974/jdmsc-2093.
Full textJudge, Lyndon, Suvarna Mane, and Patrick Schaumont. "A Hardware-Accelerated ECDLP with High-Performance Modular Multiplication." International Journal of Reconfigurable Computing 2012 (2012): 1–14. http://dx.doi.org/10.1155/2012/439021.
Full textLi, Kenli, Shuting Zou, and Jin Xv. "Fast Parallel Molecular Algorithms for DNA-Based Computation: Solving the Elliptic Curve Discrete Logarithm Problem overGF(2n)." Journal of Biomedicine and Biotechnology 2008 (2008): 1–10. http://dx.doi.org/10.1155/2008/518093.
Full textSkuratovskii, Ruslan. "SUPERSINGULAR EDWARDS CURVES AND EDWARDS CURVE POINTS COUNTING METHOD OVER FINITE FIELD." Journal of Numerical and Applied Mathematics, no. 1 (133) (2020): 68–88. http://dx.doi.org/10.17721/2706-9699.2020.1.06.
Full textPrakoso, Gilang, Aulia Khamas Heikmakhtiar, and Teddy Mantoro. "Efficiency Analysis of Elliptic Curve Cryptography in Vital Information Infrastructure: Time, Security, and Resilience." International Journal of Progressive Sciences and Technologies 42, no. 1 (2023): 410. http://dx.doi.org/10.52155/ijpsat.v42.1.5862.
Full textDelaplace, Claire, та Alexander May. "Can we Beat the Square Root Bound for ECDLP over 𝔽p2 via Representation?" Journal of Mathematical Cryptology 14, № 1 (2020): 293–306. http://dx.doi.org/10.1515/jmc-2019-0025.
Full textMiao, Zhe. "Elliptic curve cryptography: Theory, security, and applications in modern network security." Theoretical and Natural Science 51, no. 1 (2024): 114–20. http://dx.doi.org/10.54254/2753-8818/51/2024ch0183.
Full textShohaimay, Fairuz, and Eddie Shahril Ismail. "Improved and Provably Secure ECC-Based Two-Factor Remote Authentication Scheme with Session Key Agreement." Mathematics 11, no. 1 (2022): 5. http://dx.doi.org/10.3390/math11010005.
Full textElhajj, Mohammed, and Pim Mulder. "A Comparative Analysis of the Computation Cost and Energy Consumption of Relevant Curves of ECC Presented in Literature." International Journal of Electrical and Computer Engineering Research 3, no. 1 (2023): 1–6. http://dx.doi.org/10.53375/ijecer.2023.318.
Full textMeneghetti, Alessio, Massimiliano Sala, and Daniele Taufer. "A New ECDLP-Based PoW Model." Mathematics 8, no. 8 (2020): 1344. http://dx.doi.org/10.3390/math8081344.
Full textKiran, Medikonda Asha, Syam Kumar Pasupuleti, and R. Eswari. "Efficient Pairing-Free Identity-Based Signcryption Scheme for Cloud-Assisted IoT." International Journal of Cloud Applications and Computing 12, no. 1 (2022): 1–15. http://dx.doi.org/10.4018/ijcac.305216.
Full textPetrenko, Alexei, and Sergei Petrenko. "Basic Algorithms Quantum Cryptanalysis." Voprosy kiberbezopasnosti, no. 1(53) (2023): 100–115. http://dx.doi.org/10.21681/2311-3456-2023-1-100-115.
Full textReyad, Omar, Kadry Hamed, and Mohamed Esmail Karar. "Hash-enhanced elliptic curve bit-string generator for medical image encryption." Journal of Intelligent & Fuzzy Systems 39, no. 5 (2020): 7795–806. http://dx.doi.org/10.3233/jifs-201146.
Full textKhan, Qaiser, Sourav Purification, and Sang-Yoon Chang. "Post-Quantum Key Exchange and Subscriber Identity Encryption in 5G Using ML-KEM (Kyber)." Information 16, no. 7 (2025): 617. https://doi.org/10.3390/info16070617.
Full textYang, Ang, Junghyun Nam, Moonseong Kim, and Kim-Kwang Raymond Choo. "Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols." Scientific World Journal 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/825984.
Full textShaaban, Mohamed Ali, Almohammady S. Alsharkawy, Mohammad T. AbouKreisha, and Mohammed Abdel Razek. "Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment." International journal of Computer Networks & Communications 15, no. 04 (2023): 55–71. http://dx.doi.org/10.5121/ijcnc.2023.15404.
Full textMa, Rui, and Linyue Du. "Efficient attribute-based strong designated verifier signature scheme based on elliptic curve cryptography." PLOS ONE 19, no. 5 (2024): e0300153. http://dx.doi.org/10.1371/journal.pone.0300153.
Full textTan, Duc Nguyen, Hai Nguyen Nam, Minh Nguyen Hieu, and Hiep Nguyen Van. "New Blind Muti-signature Schemes based on ECDLP." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 2 (2018): 1074. http://dx.doi.org/10.11591/ijece.v8i2.pp1074-1083.
Full textDuc, Nguyen Tan, Nguyen Nam Hai, Nguyen Hieu Minh, Nguyen Hieu Minh, and Tran Thi Lam. "New Blind Muti-signature Schemes based on ECDLP." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 2 (2018): 1074–83. https://doi.org/10.11591/ijece.v8i2.pp1074-1083.
Full textDr., C. Porkodi* Dr. R. Arumuganathan. "ELLIPTIC CURVE BASED UNTRACEABLE OFF-LINE ELECTRONIC CASH SYSTEM." Global Journal of Engineering Science and Research Management 6, no. 7 (2019): 25–34. https://doi.org/10.5281/zenodo.3345117.
Full textCidem Dogan, Demet, and Huseyin Altindis. "Storage and Communication Security in Cloud Computing Using a Homomorphic Encryption Scheme Based Weil Pairing." Elektronika ir Elektrotechnika 26, no. 1 (2020): 78–83. http://dx.doi.org/10.5755/j01.eie.26.1.25312.
Full textZhang, Weijian, Zhimin Guo, Nuannuan Li, Mingyan Li, Qing Fan, and Min Luo. "A Blind Signature-Aided Privacy-Preserving Power Request Scheme for Smart Grid." Wireless Communications and Mobile Computing 2021 (June 29, 2021): 1–10. http://dx.doi.org/10.1155/2021/9988170.
Full textYokoyama, Kazuhiro, Masaya Yasuda, Yasushi Takahashi, and Jun Kogure. "Complexity bounds on Semaev’s naive index calculus method for ECDLP." Journal of Mathematical Cryptology 14, no. 1 (2020): 460–85. http://dx.doi.org/10.1515/jmc-2019-0029.
Full textWang, Jie, Shengbao Wang, Kang Wen, Bosen Weng, Xin Zhou, and Kefei Chen. "An ECC-Based Authentication Protocol for Dynamic Charging System of Electric Vehicles." Electronics 13, no. 6 (2024): 1109. http://dx.doi.org/10.3390/electronics13061109.
Full textMUSTAFA, HUSSEIN, ELHADY MAHMOUD ABD, HAMDY SARA, and ALSOBKY WAGEDA. "DESIGNING NEW TECHNIQUE IN DIGITAL SIGNATURE BASED ON GALOIS FIELD 2n AND CHAOTIC MAPS." Seybold Report Journal 18, no. 09 (2023): 53–72. https://doi.org/10.5281/zenodo.8344314.
Full textJames, Salome, N. B. Gayathri, and P. Vasudeva Reddy. "Pairing Free Identity-Based Blind Signature Scheme with Message Recovery." Cryptography 2, no. 4 (2018): 29. http://dx.doi.org/10.3390/cryptography2040029.
Full textShu, Chen, Xie, Sun, Qi, and Huang. "An Aggregate Signature Scheme Based on a Trapdoor Hash Function for the Internet of Things." Sensors 19, no. 19 (2019): 4239. http://dx.doi.org/10.3390/s19194239.
Full textPetrenko, Alexei, and Sergei Petrenko. "Quantum Resilience Estimation Method Blockchain." Voprosy kiberbezopasnosti, no. 3(49) (2022): 2–22. http://dx.doi.org/10.21681/2311-3456-2022-3-2-22.
Full textAntigha, Richard E.E*. "APPLICATION OF AUTO REGRESSIVE INTEGRATED MOVING AVERAGE (ARIMA) IN URBAN STORMWATER DRAINAGE SYSTEMS MODELLING FOR THE CALABAR CATCHMENT, SOUTH-SOUTH, NIGERIA." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 4, no. 11 (2017): 163–74. https://doi.org/10.5281/zenodo.1068882.
Full textDr., Joshua J. Tom, Nlerum P. Anebo Dr., Bukola A. Onyekwelu Dr., Wilfred Adigwe, and E. Eyo Richard. "Quantum Computers and Algorithms: A Threat to Classical Cryptographic Systems." International Journal of Engineering and Advanced Technology (IJEAT) 12, no. 5 (2023): 25–38. https://doi.org/10.5281/zenodo.8073526.
Full textTom, Dr Joshua J., Dr Nlerum P. Anebo, Dr Bukola A. Onyekwelu, Adigwe Wilfred, and Richard E. Eyo. "Quantum Computers and Algorithms: A Threat to Classical Cryptographic Systems." International Journal of Engineering and Advanced Technology 12, no. 5 (2023): 25–38. http://dx.doi.org/10.35940/ijeat.e4153.0612523.
Full textYakubu, Bello Musa, Majid Iqbal Khan, and Pattarasinee Bhattarakosol. "IPChain: Blockchain-Based Security Protocol for IoT Address Management Servers in Smart Homes." Journal of Sensor and Actuator Networks 11, no. 4 (2022): 80. http://dx.doi.org/10.3390/jsan11040080.
Full textS. Ragavi, Dr. D. Banumathy, Dr. M. Rameshkumar, and Dr. G. Madasamyraja. "Efficient Authentication Steps for Vehicle Transmission in Ad-Hoc Networks." International Journal of Scientific Research in Science, Engineering and Technology 11, no. 3 (2024): 294–301. http://dx.doi.org/10.32628/ijsrset24113132.
Full textZou, Wenfeng, Qiang Guo, and Xiaolan Xie. "A Certificateless Aggregated Signcryption Scheme Based on Edge Computing in VANETs." Electronics 14, no. 10 (2025): 1993. https://doi.org/10.3390/electronics14101993.
Full textZhou, Xuan Wu, and Yan Fu. "Blind Signature Based on Discrete Logarithm Type Cryptosystem." Advanced Materials Research 204-210 (February 2011): 1318–21. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.1318.
Full text