A new elliptic curve cryptographic system over the finite fields
Security of the information is the main problem in network communications nowadays. There is no algorithm which ensures the one hundred percent reliability of the transmissions. The current society uses the Internet, to exchange information such as from private images to financial data. The cryptogr...
| Main Authors: | Priyatharsan, U., Rupasinghe, P., Murray, Iain |
|---|---|
| Format: | Conference Paper |
| Published: |
2017
|
| Online Access: | http://hdl.handle.net/20.500.11937/59454 |
Similar Items
Improved arithmetic on elliptic curves over prime field
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014)
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014)
On the wiener's attack into lucas based El-gamal cryptosystem in the elliptic curve over finite field
by: Wong, Tze Jin, et al.
Published: (2018)
by: Wong, Tze Jin, et al.
Published: (2018)
A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali
by: Hilyati Hanina, Zazali
Published: (2012)
by: Hilyati Hanina, Zazali
Published: (2012)
A new encryption algorithm over elliptic curve
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Modular forms and elliptic curves over imaginary
quadratic fields
by: Lingham, Mark Peter
Published: (2005)
by: Lingham, Mark Peter
Published: (2005)
Lucas based el-gamal cryptosystem in the elliptic curve group over finite field under lenstras attack
by: Tze, Jin Wong, et al.
Published: (2018)
by: Tze, Jin Wong, et al.
Published: (2018)
Saturation of Mordell-Weil Groups of Elliptic Curves over Number Fields
by: Prickett, Martin
Published: (2004)
by: Prickett, Martin
Published: (2004)
Improved algorithms of elliptic curve point multiplication over binary and prime fields using elliptic net
by: Muslim, Norliana
Published: (2022)
by: Muslim, Norliana
Published: (2022)
Common modulus attack against Lucas based El-Gamal Cryptosystem in the elliptic curve group over finite field
by: Koo, Lee Feng, et al.
Published: (2018)
by: Koo, Lee Feng, et al.
Published: (2018)
Tripling formulae of elliptic curve over binary field in Lopez-Dahab model
by: Md Yasin, Sharifah, et al.
Published: (2015)
by: Md Yasin, Sharifah, et al.
Published: (2015)
Committal deniable signatures over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
Elliptical curve cryptography-kerberos authentication model for keystone in open stack
by: Shamugam, V., et al.
Published: (2017)
by: Shamugam, V., et al.
Published: (2017)
Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field
by: Sarbini, Izzatul Nabila, et al.
Published: (2018)
by: Sarbini, Izzatul Nabila, et al.
Published: (2018)
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
by: Md Yasin, Sharifah
Published: (2011)
by: Md Yasin, Sharifah
Published: (2011)
A new addition formula for elliptic curves over GF(2/sup n/)
by: Al-Daoud, E., et al.
Published: (2002)
by: Al-Daoud, E., et al.
Published: (2002)
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
Security analysis of Lucas based El-Gamal Cryptosystem in the elliptic curve group over finite field using two types of GMITM attacks
by: Sarbini, Izzatul Nabila, et al.
Published: (2018)
by: Sarbini, Izzatul Nabila, et al.
Published: (2018)
An efficient identity-based group signature scheme over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
On the design of projective binary Edwards elliptic curves over GF (p) benefitting from mapping elliptic curves computation to variable degree of parallel design
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011)
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011)
A survey on elliptic curve cryptography
by: Mohamed, Mohamad Afendee
Published: (2014)
by: Mohamed, Mohamad Afendee
Published: (2014)
Numerical modular symbols for elliptic curves
by: Wuthrich, Christian
Published: (2017)
by: Wuthrich, Christian
Published: (2017)
Anabelian geometry of punctured elliptic curves
by: Porowski, Wojciech
Published: (2020)
by: Porowski, Wojciech
Published: (2020)
Multi-Threading Elliptic Curve Cryptosystems.
by: Kanniah, Uma S., et al.
Published: (2007)
by: Kanniah, Uma S., et al.
Published: (2007)
New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
by: Eghdamian, Arash
Published: (2020)
by: Eghdamian, Arash
Published: (2020)
New quintupling point arithmetic 5P formulas for Lŏpez-Dahab coordinate over binary elliptic curve cryptography
by: Abdul Raheem, Waleed Khalid Amin, et al.
Published: (2019)
by: Abdul Raheem, Waleed Khalid Amin, et al.
Published: (2019)
Kolyvagin Derivatives of Modular Points on Elliptic Curves
by: Hatton, Richard
Published: (2020)
by: Hatton, Richard
Published: (2020)
ECSC-128: New Stream Cipher Based On Elliptic Curve Discrete Logarithm Problem.
by: Suwais, Khaled, et al.
Published: (2007)
by: Suwais, Khaled, et al.
Published: (2007)
A Conceptual Model Using The Elliptic Curve Diffie–Hellman With An Artificial Neural Network Over Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2016)
by: Jaber, Aws Naser, et al.
Published: (2016)
Vanishing of some Galois cohomology groups for elliptic curves
by: Lawson, Tyler, et al.
Published: (2016)
by: Lawson, Tyler, et al.
Published: (2016)
An improved public key cryptography based on the elliptic curve
by: Al-Daoud, Essam Faleh
Published: (2002)
by: Al-Daoud, Essam Faleh
Published: (2002)
Encrypting text data using elliptic curve cryptography
by: Ali, Abas Abdullahi
Published: (2018)
by: Ali, Abas Abdullahi
Published: (2018)
High performance methods of elliptic curve scalar multiplication
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014)
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014)
Addition chain heuristics in application to elliptic curve cryptosystems
by: Mohamed, Mohamad Afendee, et al.
Published: (2024)
by: Mohamed, Mohamad Afendee, et al.
Published: (2024)
Elliptic net scalar multiplication upon Koblitz curves
by: Muslim, Norliana, et al.
Published: (2020)
by: Muslim, Norliana, et al.
Published: (2020)
Enhanced scalar multiplication algorithm over prime field using elliptic net
by: Muslim, Norliana, et al.
Published: (2024)
by: Muslim, Norliana, et al.
Published: (2024)
Trust framework for handling communication using social networks as applied to mobile sensor based indoor navigation system
by: Rupasinghe, L., et al.
Published: (2014)
by: Rupasinghe, L., et al.
Published: (2014)
A new approach in cryptographic systems using fractal image coding
by: Mohammed Ghanim Al - Saidi, Nadia, et al.
Published: (2009)
by: Mohammed Ghanim Al - Saidi, Nadia, et al.
Published: (2009)
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
K1-congruences between L-values of elliptic curves
by: Ward, Thomas
Published: (2009)
by: Ward, Thomas
Published: (2009)
Key exchange in elliptic curve cryptography based on the decomposition problem
by: Hilyati Hanina Zazali,, et al.
Published: (2012)
by: Hilyati Hanina Zazali,, et al.
Published: (2012)
Similar Items
-
Improved arithmetic on elliptic curves over prime field
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014) -
On the wiener's attack into lucas based El-gamal cryptosystem in the elliptic curve over finite field
by: Wong, Tze Jin, et al.
Published: (2018) -
A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali
by: Hilyati Hanina, Zazali
Published: (2012) -
A new encryption algorithm over elliptic curve
by: Han, Song, et al.
Published: (2005) -
Modular forms and elliptic curves over imaginary
quadratic fields
by: Lingham, Mark Peter
Published: (2005)