Contents
Academic literature on the topic 'Secp256r1'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secp256r1.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Secp256r1"
Houria, Azine, Bencherif Mohamed Abdelkader, and Guessoum Abderezzak. "A comparison between the secp256r1 and the koblitz secp256k1 bitcoin curves." Indonesian Journal of Electrical Engineering and Computer Science 13, no. 3 (2019): 910. http://dx.doi.org/10.11591/ijeecs.v13.i3.pp910-918.
Full textAzine, Houria, Mohamed Abdelkader Bencherif, and Abderezzak Guessoum. "A comparison between the secp256r1 and the koblitz secp256k1 bitcoin curves." Indonesian Journal of Electrical Engineering and Computer Science 13, no. 3 (2019): 910–18. https://doi.org/10.11591/ijeecs.v13.i3.pp910-918.
Full textMajeed, Nomana Ayesha, and Alex Kemloh Kouyem. "Verifying the Elliptic Curve Verifiable Random Function Secp256r1 on Blockchain." Open Conference Proceedings 2 (December 15, 2022): 213–16. http://dx.doi.org/10.52825/ocp.v2i.133.
Full textAbu, Nur Azman, Abderrahmane Nitaj, and Muhammad Rezal Kamel Ariffin. "A Digital Signature on Cubic Pell Cryptosystem CP256-1299." International Journal of Computer Theory and Engineering 17, no. 2 (2025): 91–101. https://doi.org/10.7763/ijcte.2025.v17.1371.
Full textJamali, Mujeeb-ur Rehman, Shahmurad Chandio, and Nadeem Ahmed Kanasro. "Secure Architecture for Electronic Commerce Applications Running over the Cloud." VFAST Transactions on Software Engineering 11, no. 1 (2023): 51–60. http://dx.doi.org/10.21015/vtse.v11i1.1391.
Full textShaaban, Mohamed Ali, Almohammady S. Alsharkawy, Mohammad T. AbouKreisha, and Mohammed Abdel Razek. "Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment." International journal of Computer Networks & Communications 15, no. 04 (2023): 55–71. http://dx.doi.org/10.5121/ijcnc.2023.15404.
Full textBalasubramanian, Dr Kannan. "Security of the Secp256k1 Elliptic Curve used in the Bitcoin Blockchain." Indian Journal of Cryptography and Network Security 4, no. 1 (2024): 1–5. http://dx.doi.org/10.54105/ijcns.a1426.04010524.
Full textDr., Kannan Balasubramanian. "Security of the Secp256k1 Elliptic Curve used in the Bitcoin Blockchain." Indian Journal of Cryptography and Network Security (IJCNS) 4, no. 1 (2024): 1–5. https://doi.org/10.54105/ijcns.A1426.04010524.
Full textJi, Pu. "The Advance of Cryptocurrency Wallet with Digital Signature." Highlights in Science, Engineering and Technology 39 (April 1, 2023): 1098–103. http://dx.doi.org/10.54097/hset.v39i.6714.
Full textDi Scala, Antonio J., Andrea Gangemi, Giuliano Romeo, and Gabriele Vernetti. "Special Subsets of Addresses for Blockchains Using the secp256k1 Curve." Mathematics 10, no. 15 (2022): 2746. http://dx.doi.org/10.3390/math10152746.
Full textBook chapters on the topic "Secp256r1"
Sakkari, Deepak S., and Mohammed Mujeer Ulla. "Design and Implementation of Elliptic Curve Digital Signature Using Bit Coin Curves Secp256K1 and Secp384R1 for Base10 and Base16 Using Java." In Lecture Notes in Electrical Engineering. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-7076-3_28.
Full text