Multi-base number representation in application to scalar multiplication and pairing computation
Elliptic curves scalar multiplication over finite fields has become a highly active research area. The efficiency of elliptic curves scalar multiplication is about keeping the memory and running time to be as low as possible. Providing new methods using chains beyond the binary chain will increase t...
| Main Author: | Mohammed Ismail, Abdelwahed |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/26781/ http://psasir.upm.edu.my/id/eprint/26781/1/IPM%202011%2018R.pdf |
Similar Items
New Perspectives on Spontaneous Scalarization in Black Holes and Neutron Stars
by: Ventagli, Giulia
Published: (2022)
by: Ventagli, Giulia
Published: (2022)
Astro- and Quantum Physical Tests of Screened Scalar Fields
by: Käding, Christian
Published: (2019)
by: Käding, Christian
Published: (2019)
Saturation of Mordell-Weil Groups of Elliptic Curves over Number Fields
by: Prickett, Martin
Published: (2004)
by: Prickett, Martin
Published: (2004)
Aspects of galileons and generalised scalar-tensor theories
by: Sivanesan, Vishagan
Published: (2014)
by: Sivanesan, Vishagan
Published: (2014)
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
by: Abdulraheem, Waleed Khalid Amin
Published: (2019)
by: Abdulraheem, Waleed Khalid Amin
Published: (2019)
Improved algorithms of elliptic curve point multiplication over binary and prime fields using elliptic net
by: Muslim, Norliana
Published: (2022)
by: Muslim, Norliana
Published: (2022)
Encrypting text data using elliptic curve cryptography
by: Ali, Abas Abdullahi
Published: (2018)
by: Ali, Abas Abdullahi
Published: (2018)
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
by: Md Yasin, Sharifah
Published: (2011)
by: Md Yasin, Sharifah
Published: (2011)
Galois theory of Mordell-Weil groups
by: Vavasour, Thomas
Published: (2019)
by: Vavasour, Thomas
Published: (2019)
On the Improvement of Addition Chain in Applications to Elliptic Curve Cryptosystem
Status: Submitted
by: Mohamed, Mohamad Afendee
Published: (2011)
by: Mohamed, Mohamad Afendee
Published: (2011)
The definition of the scalar product: an analysis and critique of a classroom episode
by: Foster, Colin, et al.
Published: (2015)
by: Foster, Colin, et al.
Published: (2015)
On the fetection of dynamically screened scalar fields using atom interferometry
by: Stevenson, James
Published: (2017)
by: Stevenson, James
Published: (2017)
Examining Non-Linearities with Screened Fifth Forces
by: Thrussell, Ben
Published: (2021)
by: Thrussell, Ben
Published: (2021)
Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem
by: Bafandehkar, Mohsen
Published: (2015)
by: Bafandehkar, Mohsen
Published: (2015)
New perspectives on scalar fields in strong gravity
by: Antoniou, Georgios
Published: (2023)
by: Antoniou, Georgios
Published: (2023)
The Shape Dependence of Chameleon Gravity
by: Briddon, Chad
Published: (2023)
by: Briddon, Chad
Published: (2023)
Anabelian geometry of punctured elliptic curves
by: Porowski, Wojciech
Published: (2020)
by: Porowski, Wojciech
Published: (2020)
Investigations into Local Class Field Theory with General Residue Fields
by: Hall, Christopher Stephen
Published: (2023)
by: Hall, Christopher Stephen
Published: (2023)
An improved public key cryptography based on the elliptic curve
by: Al-Daoud, Essam Faleh
Published: (2002)
by: Al-Daoud, Essam Faleh
Published: (2002)
A pairing-based blind signature scheme with message recovery
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Kolyvagin Derivatives of Modular Points on Elliptic Curves
by: Hatton, Richard
Published: (2020)
by: Hatton, Richard
Published: (2020)
A new encryption algorithm over elliptic curve
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
Properties of pseudo τ- adic non-adjacent form and the expansion of τ-adic non-adjacent form
by: Mohd Suberi, Syahirah
Published: (2017)
by: Mohd Suberi, Syahirah
Published: (2017)
Kembangan pseudotnaf untuk pendaraban skalar di atas lenkuk koblitz
by: Yunos, Faridah
Published: (2014)
by: Yunos, Faridah
Published: (2014)
From eco-urbanism to eco-fusion: an augmented multi-scalar framework in sustainable urbanism
by: Cheshmehzangi, Ali, et al.
Published: (2021)
by: Cheshmehzangi, Ali, et al.
Published: (2021)
Detecting Dark Domain Walls in a Topologically-Tailored Vacuum Chamber
by: Clements, Kate E. A.
Published: (2025)
by: Clements, Kate E. A.
Published: (2025)
Design and performance evaluation of parallel elliptic curve cryptosystem with GF(P) projective coordinates
by: Hussein Fayiz, Mohammad Al-Khatib
Published: (2012)
by: Hussein Fayiz, Mohammad Al-Khatib
Published: (2012)
A pairing-based blind signature scheme with message recovery
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Classical and quantum fluid interfaces as simulators for gravity and the early Universe
by: Barroso Silveira, Vitor
Published: (2023)
by: Barroso Silveira, Vitor
Published: (2023)
Probing scalar effective field theories with the soft limits of scattering amplitudes
by: Padilla, Antonio, et al.
Published: (2017)
by: Padilla, Antonio, et al.
Published: (2017)
Special case of Bloch-Kato conjecture.
by: Shchedrina, Daria
Published: (2022)
by: Shchedrina, Daria
Published: (2022)
General relation between sums of figurate numbers
by: Mohamat Johari, Mohamat Aidil
Published: (2013)
by: Mohamat Johari, Mohamat Aidil
Published: (2013)
Left to right: Representational biases for numbers and the effect of visuomotor adaptation
by: Loftus, Andrea, et al.
Published: (2008)
by: Loftus, Andrea, et al.
Published: (2008)
A Generalization of the Bernoulli Numbers
by: Bahari, Hasmiah
Published: (2006)
by: Bahari, Hasmiah
Published: (2006)
Securing the image through the combination of elliptic curve cryptosystem and hill cipher encryption
by: Sulaiman, Saniah
Published: (2019)
by: Sulaiman, Saniah
Published: (2019)
Asymptotics in the time-dependent Hawking and Unruh effects
by: Juárez Aubry, Benito A.
Published: (2016)
by: Juárez Aubry, Benito A.
Published: (2016)
Pseudoneglect for the bisection of mental number lines
by: Loftus, Andrea, et al.
Published: (2009)
by: Loftus, Andrea, et al.
Published: (2009)
Beberapa Penggunaan Teori Nombor dalam Kriptografi
by: Yunos, Faridah
Published: (2001)
by: Yunos, Faridah
Published: (2001)
Parameterization of nice polynomials
by: Anton, Hozjee
Published: (2018)
by: Anton, Hozjee
Published: (2018)
Similar Items
-
New Perspectives on Spontaneous Scalarization in Black Holes and Neutron Stars
by: Ventagli, Giulia
Published: (2022) -
Astro- and Quantum Physical Tests of Screened Scalar Fields
by: Käding, Christian
Published: (2019) -
Saturation of Mordell-Weil Groups of Elliptic Curves over Number Fields
by: Prickett, Martin
Published: (2004) -
Aspects of galileons and generalised scalar-tensor theories
by: Sivanesan, Vishagan
Published: (2014) -
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
by: Abdulraheem, Waleed Khalid Amin
Published: (2019)