A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali
This study describes three algorithms for efficient implementations in Elliptic Curve Cryptography (ECC). The first algorithm determines an approach of performing key exchanges between two subgroups for Decomposition Problem and three subgroups for Triple Decomposition Problem. The algorithms wor...
| Main Author: | Hilyati Hanina, Zazali |
|---|---|
| Format: | Thesis |
| Published: |
2012
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/6167/ http://studentsrepo.um.edu.my/6167/1/00%2DCOVER_DEPAN.pdf http://studentsrepo.um.edu.my/6167/2/01%2DCOVER_DEPAN.pdf http://studentsrepo.um.edu.my/6167/3/02%2DDeclaration.pdf http://studentsrepo.um.edu.my/6167/4/FULL_CHAPTER_THESIS.pdf |
Similar Items
Key exchange in elliptic curve cryptography based on the decomposition problem
by: Hilyati Hanina Zazali,, et al.
Published: (2012)
by: Hilyati Hanina Zazali,, et al.
Published: (2012)
Signed decomposition method for scalar multiplication in elliptic curve cryptography
by: Md. Said, Mohamad Rushdan, et al.
Published: (2010)
by: Md. Said, Mohamad Rushdan, et al.
Published: (2010)
A survey on elliptic curve cryptography
by: Mohamed, Mohamad Afendee
Published: (2014)
by: Mohamed, Mohamad Afendee
Published: (2014)
A new elliptic curve cryptographic system over the finite fields
by: Priyatharsan, U., et al.
Published: (2017)
by: Priyatharsan, U., et al.
Published: (2017)
New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
by: Eghdamian, Arash
Published: (2020)
by: Eghdamian, Arash
Published: (2020)
An improved public key cryptography based on the elliptic curve
by: Al-Daoud, Essam Faleh
Published: (2002)
by: Al-Daoud, Essam Faleh
Published: (2002)
Encrypting text data using elliptic curve cryptography
by: Ali, Abas Abdullahi
Published: (2018)
by: Ali, Abas Abdullahi
Published: (2018)
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
Elliptical curve cryptography-kerberos authentication model for keystone in open stack
by: Shamugam, V., et al.
Published: (2017)
by: Shamugam, V., et al.
Published: (2017)
Quantum-Elliptic curve Cryptography for Multihop Communication in 5G Networks
by: Khan, A.S., et al.
Published: (2017)
by: Khan, A.S., et al.
Published: (2017)
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
A new encryption algorithm over elliptic curve
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
New quintupling point arithmetic 5P formulas for Lŏpez-Dahab coordinate over binary elliptic curve cryptography
by: Abdul Raheem, Waleed Khalid Amin, et al.
Published: (2019)
by: Abdul Raheem, Waleed Khalid Amin, et al.
Published: (2019)
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
by: Abdulraheem, Waleed Khalid Amin
Published: (2019)
by: Abdulraheem, Waleed Khalid Amin
Published: (2019)
Integer Sub-Decomposition (Isd)
Method For Elliptic Curve
Scalar Multiplication
by: Ajeena, Ruma Kareem K.
Published: (2015)
by: Ajeena, Ruma Kareem K.
Published: (2015)
Production of polyhydroaxyalkanoate (PHA) from palm oil by Pseudomonas oleovorans and indigenous bacterial isolate, pseudomonas sp. / by Zazali Alias
by: Alias, Zazali
Published: (2000)
by: Alias, Zazali
Published: (2000)
Scalar multiplication via elliptic nets with application to cryptography
by: Muslim, Norliana, et al.
Published: (2018)
by: Muslim, Norliana, et al.
Published: (2018)
ECSC-128: New Stream Cipher Based On Elliptic Curve Discrete Logarithm Problem.
by: Suwais, Khaled, et al.
Published: (2007)
by: Suwais, Khaled, et al.
Published: (2007)
A study on the relationship between internal factors and financial leverage on selected construction company in Malaysia / Nurul Atiqah Zharfa Zazali
by: Zazali, Nurul Atiqah Zharfa
Published: (2017)
by: Zazali, Nurul Atiqah Zharfa
Published: (2017)
Identification of artefact contamination morphological characteristics in minimizing pitfalls in cytology / Nur Hanina Mohd Rahaman
by: Mohd Rahaman, Nur Hanina
Published: (2015)
by: Mohd Rahaman, Nur Hanina
Published: (2015)
Improved algorithms of elliptic curve point multiplication over binary and prime fields using elliptic net
by: Muslim, Norliana
Published: (2022)
by: Muslim, Norliana
Published: (2022)
Domain decomposition preconditioners for discontinuous Galerkin methods for elliptic problems on complicated domains
by: Antonietti, Paola F., et al.
Published: (2014)
by: Antonietti, Paola F., et al.
Published: (2014)
Numerical modular symbols for elliptic curves
by: Wuthrich, Christian
Published: (2017)
by: Wuthrich, Christian
Published: (2017)
Anabelian geometry of punctured elliptic curves
by: Porowski, Wojciech
Published: (2020)
by: Porowski, Wojciech
Published: (2020)
Multi-Threading Elliptic Curve Cryptosystems.
by: Kanniah, Uma S., et al.
Published: (2007)
by: Kanniah, Uma S., et al.
Published: (2007)
Cryptanalysis in cryptographic algorithm design
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
New approach of cryptography algorithm for e- mail applications
by: Khmag, Asem, et al.
Published: (2005)
by: Khmag, Asem, et al.
Published: (2005)
An algorithm to enhance elliptic curves scalar multiplication combining MBNR with point halving
by: M. Ismail, Abdulwahed, et al.
Published: (2010)
by: M. Ismail, Abdulwahed, et al.
Published: (2010)
Laporan kajian akhir cadangan menaiktaraf rekabentuk dalaman Lumut Country Resort di No 331 Jalan Titi Panjang, 32200 Lumut, Perak Darul Ridzuan / Nor Hizza Zazali
by: Zazali, Nor Hizza
Published: (2009)
by: Zazali, Nor Hizza
Published: (2009)
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019)
by: Ali, Mohammed Ahnaf
Published: (2019)
Temu bual Prof Madya Dr Hanina H Hamsan
by: Berita Harian, .
Published: (2024)
by: Berita Harian, .
Published: (2024)
Kolyvagin Derivatives of Modular Points on Elliptic Curves
by: Hatton, Richard
Published: (2020)
by: Hatton, Richard
Published: (2020)
Committal deniable signatures over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
by: Md Yasin, Sharifah
Published: (2011)
by: Md Yasin, Sharifah
Published: (2011)
A new addition formula for elliptic curves over GF(2/sup n/)
by: Al-Daoud, E., et al.
Published: (2002)
by: Al-Daoud, E., et al.
Published: (2002)
Vanishing of some Galois cohomology groups for elliptic curves
by: Lawson, Tyler, et al.
Published: (2016)
by: Lawson, Tyler, et al.
Published: (2016)
High performance methods of elliptic curve scalar multiplication
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014)
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014)
Improved arithmetic on elliptic curves over prime field
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014)
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014)
Addition chain heuristics in application to elliptic curve cryptosystems
by: Mohamed, Mohamad Afendee, et al.
Published: (2024)
by: Mohamed, Mohamad Afendee, et al.
Published: (2024)
Similar Items
-
Key exchange in elliptic curve cryptography based on the decomposition problem
by: Hilyati Hanina Zazali,, et al.
Published: (2012) -
Signed decomposition method for scalar multiplication in elliptic curve cryptography
by: Md. Said, Mohamad Rushdan, et al.
Published: (2010) -
A survey on elliptic curve cryptography
by: Mohamed, Mohamad Afendee
Published: (2014) -
A new elliptic curve cryptographic system over the finite fields
by: Priyatharsan, U., et al.
Published: (2017) -
New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
by: Eghdamian, Arash
Published: (2020)