Gotowa bibliografia na temat „Elliptic curve elgamal cryptosystem”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Elliptic curve elgamal cryptosystem”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Elliptic curve elgamal cryptosystem"
Kamthawee, Krissanee, and Bhichate Chiewthanakul. "The Construction of ElGamal over Koblitz Curve." Advanced Materials Research 931-932 (May 2014): 1441–46. http://dx.doi.org/10.4028/www.scientific.net/amr.931-932.1441.
Pełny tekst źródłaIsmail, N. H. M., and M. Y. Misro. "Bézier Coefficients Matrix for ElGamal Elliptic Curve Cryptosystem." Malaysian Journal of Mathematical Sciences 16, no. 3 (2022): 483–99. http://dx.doi.org/10.47836/mjms.16.3.06.
Pełny tekst źródłaLuhaib, Qasim Mohsin, and Ruma Kareem K. Ajeena. "Elliptic curve matrices over group ring to improve elliptic curve–discrete logarithm cryptosystems." Journal of Discrete Mathematical Sciences and Cryptography 26, no. 6 (2023): 1699–704. http://dx.doi.org/10.47974/jdmsc-1616.
Pełny tekst źródłaAbdelhakim, Chillali, and M'hammed Boulagouaz. "Methods of encryption keys, example of elliptic curve." Journal of Communications and Computer Engineering 3, no. 1 (2012): 7. http://dx.doi.org/10.20454/jcce.2013.259.
Pełny tekst źródłaWu, Huangwei. "General analysis on essential mathematical principles of elliptic curve cryptography." Theoretical and Natural Science 10, no. 1 (2023): 123–29. http://dx.doi.org/10.54254/2753-8818/10/20230327.
Pełny tekst źródłaSangeetha, V., T. Anupreethi, and Manju Somanath. "Cryptographic Application of Elliptic Curve Generated through Centered Hexadecagonal Numbers." Indian Journal Of Science And Technology 17, no. 20 (2024): 2074–78. http://dx.doi.org/10.17485/ijst/v17i20.1183.
Pełny tekst źródłaV, Sangeetha, Anupreethi T, and Somanath Manju. "Cryptographic Application of Elliptic Curve Generated through Centered Hexadecagonal Numbers." Indian Journal of Science and Technology 17, no. 20 (2024): 2074–78. https://doi.org/10.17485/IJST/v17i20.1183.
Pełny tekst źródłaSundararajan, Ananiah Durai Durai, and Rajashree R. "A Comprehensive Survey on Lightweight Asymmetric Key Cryptographic Algorithm for Resource Constrained Devices." ECS Transactions 107, no. 1 (2022): 7457–68. http://dx.doi.org/10.1149/10701.7457ecst.
Pełny tekst źródłaPrabhdeep Kaur and Sheetal Kalra. "On Security Analysis of Recent Password Authentication and Key Agreement Schemes Based on Elliptic Curve Cryptography." Journal of Technology Management for Growing Economies 6, no. 1 (2015): 39–52. http://dx.doi.org/10.15415/jtmge.2015.61004.
Pełny tekst źródłaLopez, Maria Isaura, and Ayad Barsoum. "Traditional Public-Key Cryptosystems and Elliptic Curve Cryptography." International Journal of Cyber Research and Education 4, no. 1 (2022): 1–14. http://dx.doi.org/10.4018/ijcre.309688.
Pełny tekst źródłaRozprawy doktorskie na temat "Elliptic curve elgamal cryptosystem"
Abu-Mahfouz, Adnan Mohammed. "Elliptic curve cryptosystem over optimal extension fields for computationally constrained devices." Diss., University of Pretoria, 2004. http://hdl.handle.net/2263/25330.
Pełny tekst źródłaHo, Sun Wah. "A cryptosystem based on chaotic and elliptic curve cryptography /." access full-text access abstract and table of contents, 2005. http://libweb.cityu.edu.hk/cgi-bin/ezdb/thesis.pl?mphil-it-b19886238a.pdf.
Pełny tekst źródłaSingh, Namita. "Secure communication using elliptic curve cryptosystem in ad hoc network." Thesis, University of Ottawa (Canada), 2008. http://hdl.handle.net/10393/27730.
Pełny tekst źródłaAbu, Mahfouz Adnan Mohammed I. "Elliptic curve cryptosystem over optimal extension fields for computationally constrained devices." Pretoria : [s.n.], 2004. http://upetd.up.ac.za/thesis/available/etd-06082005-144557.
Pełny tekst źródłaMan, Kwan Pok. "Security enhancement on the cryptosystem based on chaotic and elliptic curve cryptography /." access abstract and table of contents access full-text, 2006. http://libweb.cityu.edu.hk/cgi-bin/ezdb/thesis.pl?mphil-ee-b21471526a.pdf.
Pełny tekst źródłaCai, Zhi, and 蔡植. "A study on parameters generation of elliptic curve cryptosystem over finite fields." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2001. http://hub.hku.hk/bib/B31225639.
Pełny tekst źródłaKultinov, Kirill. "Software Implementations and Applications of Elliptic Curve Cryptography." Wright State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=wright1559232475298514.
Pełny tekst źródłaArslanian, Samuel Thomas. "An implementation of the El Gamal elliptic curve cryptosystem over a finite field of characteristic P." Fogler Library, University of Maine, 1998. http://www.library.umaine.edu/theses/pdf/ArslanianST1998.pdf.
Pełny tekst źródłaPoni, Sofia. "Le curve ellittiche in crittografia." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2022. http://amslaurea.unibo.it/25677/.
Pełny tekst źródłaHitchcock, Yvonne Roslyn. "Elliptic curve cryptography for lightweight applications." Thesis, Queensland University of Technology, 2003. https://eprints.qut.edu.au/15838/1/Yvonne_Hitchcock_Thesis.pdf.
Pełny tekst źródłaKsiążki na temat "Elliptic curve elgamal cryptosystem"
Martin, Keith M. Public-Key Encryption. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0005.
Pełny tekst źródłaCzęści książek na temat "Elliptic curve elgamal cryptosystem"
Zheng, Zhiyong. "Elliptic Curve." In Financial Mathematics and Fintech. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-0920-7_6.
Pełny tekst źródłaNitaj, Abderrahmane, Willy Susilo, and Joseph Tonien. "Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem." In Provable Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31919-9_12.
Pełny tekst źródłaAkishita, Toru, and Tsuyoshi Takagi. "Zero-Value Point Attacks on Elliptic Curve Cryptosystem." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/10958513_17.
Pełny tekst źródłaWong, M. M., M. L. D. Wong, and Ka Lok Man. "Compact Multiplicative Inverter for Hardware Elliptic Curve Cryptosystem." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35606-3_58.
Pełny tekst źródłaShankar, T. N., G. Sahoo, and S. Niranjan. "Digital Signature of an Image by Elliptic Curve Cryptosystem." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27317-9_35.
Pełny tekst źródłaChiou, C. W., Y. S. Sun, C. M. Lee, Y. L. Chiu, J. M. Lin, and C. Y. Lee. "Problems on Gaussian Normal Basis Multiplication for Elliptic Curve Cryptosystem." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23207-2_20.
Pełny tekst źródłaZhang, Fangguo, and Zhuoran Zhang. "ECC$$^2$$: Error Correcting Code and Elliptic Curve Based Cryptosystem." In Cyberspace Safety and Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37337-5_17.
Pełny tekst źródłaKadu, Rakesh K., and Dattatraya S. Adane. "Hardware Implementation of Elliptic Curve Cryptosystem Using Optimized Scalar Multiplication." In Smart Innovation, Systems and Technologies. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0077-0_32.
Pełny tekst źródłaZheng, Zhiyong, Kun Tian, and Fengxia Liu. "A Generalization of NTRUencrypt." In Financial Mathematics and Fintech. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-7644-5_7.
Pełny tekst źródłaKanda, Guard, Alexander O. A. Antwi, and Kwangki Ryoo. "Hardware Architecture Design of AES Cryptosystem with 163-Bit Elliptic Curve." In Lecture Notes in Electrical Engineering. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1328-8_55.
Pełny tekst źródłaStreszczenia konferencji na temat "Elliptic curve elgamal cryptosystem"
Yang, Ziyao, and Yuan Liu. "Design and Application of an International Trade Trading Platform Based on ElGamal and Elliptic Curve Cryptography." In 2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS). IEEE, 2024. http://dx.doi.org/10.1109/iacis61494.2024.10721931.
Pełny tekst źródłaM. GHADI, Dua. "MODIFICATION OF ELGAMAL ELLIPTIC CURVE CRYPTOSYSTEM ALGORITHM." In VI.International Scientific Congress of Pure,Applied and Technological Sciences. Rimar Academy, 2022. http://dx.doi.org/10.47832/minarcongress6-8.
Pełny tekst źródłaFu Minfeng and Chen Wei. "Elliptic curve cryptosystem ElGamal encryption and transmission scheme." In 2010 International Conference on Computer Application and System Modeling (ICCASM 2010). IEEE, 2010. http://dx.doi.org/10.1109/iccasm.2010.5620105.
Pełny tekst źródłaWong, Tze Jin, Mohd Rushdan Md Said, Mohamed Othman, and Lee Feng Koo. "A Lucas based cryptosystem analog to the ElGamal cryptosystem and elliptic curve cryptosystem." In INTERNATIONAL CONFERENCE ON QUANTITATIVE SCIENCES AND ITS APPLICATIONS (ICOQSIA 2014): Proceedings of the 3rd International Conference on Quantitative Sciences and Its Applications. AIP Publishing LLC, 2014. http://dx.doi.org/10.1063/1.4903592.
Pełny tekst źródłaLee, Narn-Yih, Zih-Ling Chen, and Fu-Kun Chen. "Cloud Server Aided Computation for ElGamal Elliptic Curve Cryptosystem." In 2013 IEEE 37th International Computer Software and Applications Conference Workshops (COMPSACW). IEEE, 2013. http://dx.doi.org/10.1109/compsacw.2013.7.
Pełny tekst źródłaUdin, Md Nizam, Suhaila Abd Halim, Mohd Idris Jayes, and Hailiza Kamarulhaili. "Application of message embedding technique in ElGamal Elliptic Curve Cryptosystem." In 2012 International Conference on Statistics in Science, Business and Engineering (ICSSBE2012). IEEE, 2012. http://dx.doi.org/10.1109/icssbe.2012.6396578.
Pełny tekst źródłaRachmawati, Dian, Mohammad Andri Budiman, and Muhammad Ishan Wardhono. "Hybrid Cryptosystem for Image Security by Using Hill Cipher 4x4 and ElGamal Elliptic Curve Algorithm." In 2018 IEEE International Conference on Communication, Networks and Satellite (Comnetsat). IEEE, 2018. http://dx.doi.org/10.1109/comnetsat.2018.8684121.
Pełny tekst źródłaElhassani, M., A. Chillali, and A. Mouhib. "Elliptic curve and Lattice cryptosystem." In 2019 International Conference on Intelligent Systems and Advanced Computing Sciences (ISACS). IEEE, 2019. http://dx.doi.org/10.1109/isacs48493.2019.9068885.
Pełny tekst źródłaBin Yu. "Establishement of elliptic curve cryptosystem." In 2010 IEEE International Conference on Information Theory and Information Security (ICITIS). IEEE, 2010. http://dx.doi.org/10.1109/icitis.2010.5689767.
Pełny tekst źródłaAli, Sk Subidh, and Ozgur Sinanoglu. "Scan attack on Elliptic Curve Cryptosystem." In 2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS). IEEE, 2015. http://dx.doi.org/10.1109/dft.2015.7315146.
Pełny tekst źródła