New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
Public-key cryptosystems are broadly used in security protocols such as key agreement, authentication, encryption and others. The two main operations in many public-key algorithms are multiplication and exponentiation of large numbers. The performance and efficiency of these cryptographic primitives...
| Main Author: | Eghdamian, Arash |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2020
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/55545/ http://eprints.usm.my/55545/1/Pages%20from%20Arash%20Eghdamian%20Final%20Version%2027-01-2020%20cut.pdf |
Similar Items
Multi-Threading Elliptic Curve Cryptosystems.
by: Kanniah, Uma S., et al.
Published: (2007)
by: Kanniah, Uma S., et al.
Published: (2007)
ECSC-128: New Stream Cipher Based On Elliptic Curve Discrete Logarithm Problem.
by: Suwais, Khaled, et al.
Published: (2007)
by: Suwais, Khaled, et al.
Published: (2007)
Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography
by: Jahani, Shahram
Published: (2016)
by: Jahani, Shahram
Published: (2016)
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2020)
by: Alawida, Moatsum Khalif Oduh
Published: (2020)
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2022)
by: Alawida, Moatsum Khalif Oduh
Published: (2022)
Zot-mk: A New Algorithm For Big Integer Multiplication
by: Jahani , Shahram
Published: (2009)
by: Jahani , Shahram
Published: (2009)
CSC 535 � CRYPTOGRAPHY FEB 99.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1999)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1999)
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
Efficient Big Integer Multiplication and Squaring Algorithms for Cryptographic Applications
by: Jahani, Shahram, et al.
Published: (2014)
by: Jahani, Shahram, et al.
Published: (2014)
CCS523 – COMPUTER SECURITY AND CRYPTOGRAPHY NOV 2010
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
CCS523- COMPUTER SECURITY AND CRYPTOGRAPHY JANUARI 2012
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
ZOT-MK: a new algorithm for big integer multiplication[QA75].
by: Jahani, Shahram
Published: (2009)
by: Jahani, Shahram
Published: (2009)
CCS528 – Information Security And
Cryptography
(Keselamatan Maklumat Dan
Kriptografi
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
CCS528 – Information Security and Cryptography
(Keselamatan Maklumat dan Kriptografi)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
CCS523 – COMPUTER SECURITY & CRYPTOGRAPHY [KESELAMATAN KOMPUTER & KRIPTOGRAFI] DEC. 2014 - JAN. 2015
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2015)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2015)
CCS523 – COMPUTER SECURITY & CRYPTOGRAPHY [KESELAMATAN KOMPUTER & KRIPTOGRAFI] DEC. 2016 - JAN. 2017
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2017)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2017)
CCS523 – COMPUTER SECURITY & CRYPTOGRAPHY
[KESELAMATAN KOMPUTER & KRIPTOGRAFI] DEC. 2015 - JAN. 2016
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2016)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2016)
Towards Understanding The Protein Structure And Its Problems: Selecting Data Sources And Data Representation.
by: Sallim, Jamaludin, et al.
Published: (2007)
by: Sallim, Jamaludin, et al.
Published: (2007)
Application Of Exact String Matching Algorithms Towards SMILES Representation Of Chemical Structure.
by: Klaib, Ahmad Fadel, et al.
Published: (2007)
by: Klaib, Ahmad Fadel, et al.
Published: (2007)
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
Representation and reasoning of fuzzy temporal knowledge
by: Nor Azlinayati Abdul Manaf,, et al.
Published: (2006)
by: Nor Azlinayati Abdul Manaf,, et al.
Published: (2006)
A survey on elliptic curve cryptography
by: Mohamed, Mohamad Afendee
Published: (2014)
by: Mohamed, Mohamad Afendee
Published: (2014)
Variable order verification use of logic representation
by: Prasad, , PWC, et al.
Published: (2003)
by: Prasad, , PWC, et al.
Published: (2003)
Towards dispersion relations for tapered core dielectric elliptical fibers
by: CHOUDHURY, P, et al.
Published: (2007)
by: CHOUDHURY, P, et al.
Published: (2007)
Industrial Machine Allocation Using Rulebased Knowledge Representation Technique.
by: Wan Rameli, Wan Nur Akmal
Published: (2010)
by: Wan Rameli, Wan Nur Akmal
Published: (2010)
Automatic B-Spline Parameterisation And Scaling Estimation For Rigid Super-Curves Based Skull Registration.
by: Tan, Joi San
Published: (2010)
by: Tan, Joi San
Published: (2010)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
Bers isomorphism on the universal Teichmüller curve
by: Teo, Lee-Peng
Published: (2007)
by: Teo, Lee-Peng
Published: (2007)
A study of fresnel scattered fields for ellipsoidal, and elliptic-disk-shaped scatterers
by: Koay, Jun Yi, et al.
Published: (2008)
by: Koay, Jun Yi, et al.
Published: (2008)
Bipartite Graph Algorithm With Reference Frame Representation For Protein Tertiary Structure Matching
by: Othman, Fazilah
Published: (2010)
by: Othman, Fazilah
Published: (2010)
On the optimal alpha-k curve of the sample myriad
by: Lim, Heng Siong, et al.
Published: (2007)
by: Lim, Heng Siong, et al.
Published: (2007)
Signed decomposition method for scalar multiplication in elliptic curve cryptography
by: Md. Said, Mohamad Rushdan, et al.
Published: (2010)
by: Md. Said, Mohamad Rushdan, et al.
Published: (2010)
A Synchronization Structure Of SSTC And Its Applications In Machine Translation.
by: Al-Adhaileh, Mosler R., et al.
Published: (2002)
by: Al-Adhaileh, Mosler R., et al.
Published: (2002)
A tacit health care knowledge explication info-structure using contrived knowledge acquisition and representation approaches.
by: Cheah, Yu-N
Published: (2004)
by: Cheah, Yu-N
Published: (2004)
Coinware for Multilingual Passphrase Generation and Its Application for Chinese Language Password
by: Lee, Kok-wah, et al.
Published: (2006)
by: Lee, Kok-wah, et al.
Published: (2006)
An Intelligent Method. For Processing String In 3-D Based
On Its Minimum Energy.
by: Budiarto, Rahmat, et al.
Published: (2002)
by: Budiarto, Rahmat, et al.
Published: (2002)
Crisp-fuzzy representation of Allen's temporal logic
by: Nor Azlinayati Abdul Manaf,, et al.
Published: (2007)
by: Nor Azlinayati Abdul Manaf,, et al.
Published: (2007)
Path integral representation of fractional harmonic oscillator
by: EAB, C, et al.
Published: (2006)
by: EAB, C, et al.
Published: (2006)
Segmentation Assisted Object Distinction For Direct
Volume Rendering
by: Irani, Arash Azim Zadeh
Published: (2013)
by: Irani, Arash Azim Zadeh
Published: (2013)
A Systematic Design Method For Modeling
Complex Processes And Interactions
In Web Hypermedia Applications
by: Jantan, Azrul Hazri
Published: (2009)
by: Jantan, Azrul Hazri
Published: (2009)
Similar Items
-
Multi-Threading Elliptic Curve Cryptosystems.
by: Kanniah, Uma S., et al.
Published: (2007) -
ECSC-128: New Stream Cipher Based On Elliptic Curve Discrete Logarithm Problem.
by: Suwais, Khaled, et al.
Published: (2007) -
Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography
by: Jahani, Shahram
Published: (2016) -
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2020) -
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2022)