Multi-Threading Elliptic Curve Cryptosystems.
Elliptic Curve Cryptosystems (ECC) is being widely used in cryptographic systems due to its unique security features. In many cases, ECC had also been crafted onto specialized processor for performance reason. However, building a specialized ECC processor is not only time consuming but also costly...
| Main Authors: | Kanniah, Uma S., Samsudin, Azman |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2007
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/9493/ http://eprints.usm.my/9493/1/Multi-threading_Elliptic_Curve_Cryptosystems.pdf |
Similar Items
ECSC-128: New Stream Cipher Based On Elliptic Curve Discrete Logarithm Problem.
by: Suwais, Khaled, et al.
Published: (2007)
by: Suwais, Khaled, et al.
Published: (2007)
Visual Public-Key Cryptosystems.
by: Samsudin, Azman
Published: (2012)
by: Samsudin, Azman
Published: (2012)
New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
by: Eghdamian, Arash
Published: (2020)
by: Eghdamian, Arash
Published: (2020)
A New Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Enhanced parallel thread scheduling for Java based applications on multi-core architecture
by: Kam-Mun, Chong, et al.
Published: (2008)
by: Kam-Mun, Chong, et al.
Published: (2008)
MaTRU: A new NTRU-based cryptosystem
by: Coglianese, , M, et al.
Published: (2005)
by: Coglianese, , M, et al.
Published: (2005)
A New Approach To Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: A. Alia, Mohammad Ahmad
Published: (2008)
by: A. Alia, Mohammad Ahmad
Published: (2008)
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011)
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011)
Automatic B-Spline Parameterisation And Scaling Estimation For Rigid Super-Curves Based Skull Registration.
by: Tan, Joi San
Published: (2010)
by: Tan, Joi San
Published: (2010)
Towards dispersion relations for tapered core dielectric elliptical fibers
by: CHOUDHURY, P, et al.
Published: (2007)
by: CHOUDHURY, P, et al.
Published: (2007)
Bers isomorphism on the universal Teichmüller curve
by: Teo, Lee-Peng
Published: (2007)
by: Teo, Lee-Peng
Published: (2007)
A study of fresnel scattered fields for ellipsoidal, and elliptic-disk-shaped scatterers
by: Koay, Jun Yi, et al.
Published: (2008)
by: Koay, Jun Yi, et al.
Published: (2008)
On the optimal alpha-k curve of the sample myriad
by: Lim, Heng Siong, et al.
Published: (2007)
by: Lim, Heng Siong, et al.
Published: (2007)
Distributed Hierarchical IDS For MANET Over AODV+.
by: Pahlevanzadeh, Bahareh, et al.
Published: (2007)
by: Pahlevanzadeh, Bahareh, et al.
Published: (2007)
Fast And Simple NEMO Authentication Via Random Number.
by: Tan, Tat Kin, et al.
Published: (2007)
by: Tan, Tat Kin, et al.
Published: (2007)
Generalized Scheme For Fractal Based Digital Signature (GFDS).
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
A New Digital Signature Scheme Based on Mandelbrot and Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Efficient NEMO Security Management Via CAPKI.
by: Tat, Kin Tan, et al.
Published: (2007)
by: Tat, Kin Tan, et al.
Published: (2007)
Securing Telecommunication Based On Speaker Voice As The Public Key.
by: Enayah, Monther Rateb, et al.
Published: (2007)
by: Enayah, Monther Rateb, et al.
Published: (2007)
New Key Exchange Protocol Based on Mandelbrot and Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
A Chaos-Based Authenticated Cipher with Associated Data
by: Je, Sen Teh, et al.
Published: (2017)
by: Je, Sen Teh, et al.
Published: (2017)
A Chaos-Based Authenticated Cipher with Associated Data
by: Je, Sen Teh, et al.
Published: (2017)
by: Je, Sen Teh, et al.
Published: (2017)
Robust incremental growing multi-experts network
by: LOO, C, et al.
Published: (2006)
by: LOO, C, et al.
Published: (2006)
Fuzzy modeling based recognition of multi-font numerals
by: Hanmandlu, Madasu, et al.
Published: (2003)
by: Hanmandlu, Madasu, et al.
Published: (2003)
Stego Keys Performance on Feature Based Coding Method in Text Domain
by: Din, Roshidi, et al.
Published: (2017)
by: Din, Roshidi, et al.
Published: (2017)
Simple Knit Design System; Using Pattern Matching.
by: Budiarto, Rahmat, et al.
Published: (2002)
by: Budiarto, Rahmat, et al.
Published: (2002)
Efficient Big Integer Multiplication and Squaring Algorithms for Cryptographic Applications
by: Jahani, Shahram, et al.
Published: (2014)
by: Jahani, Shahram, et al.
Published: (2014)
Enhanced Micro Genetic
Algorithm-Based Models For
Multi-Objective Optimization
by: Tan, Choo Jun
Published: (2014)
by: Tan, Choo Jun
Published: (2014)
A multi-scale approach for estimating gradient from volumetric data.
by: Belaton, Bahari
Published: (2015)
by: Belaton, Bahari
Published: (2015)
Improved Multi-Verse Optimizer In Text Document Clustering For Topic Extraction
by: Abasi, Ammar Kamal Mousa
Published: (2021)
by: Abasi, Ammar Kamal Mousa
Published: (2021)
lPv6 Transition: Why A New Security Mechanisms Model Is Necessary.
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
Aesthetic measures for assessing graphic screens
by: Chek, David Ling Ngo, et al.
Published: (2000)
by: Chek, David Ling Ngo, et al.
Published: (2000)
Development Of Penetration Testing Model For Increasing Network Security.
by: Budiarto, Rahmat, et al.
Published: (2004)
by: Budiarto, Rahmat, et al.
Published: (2004)
Efficient and fast multi layer statistical approach for colour based image retrieval
by: Odeh, , JQ, et al.
Published: (2003)
by: Odeh, , JQ, et al.
Published: (2003)
ADMI: A Multi-Agent Architecture To Autonomously Generate Data Mining Servrces.
by: Hassan Zaid, Syed Zahid, et al.
Published: (2004)
by: Hassan Zaid, Syed Zahid, et al.
Published: (2004)
Automated Extraction Of Small Structures In Medical Images Based On Multi Scale Approach.
by: Foon, Dah Way, et al.
Published: (2004)
by: Foon, Dah Way, et al.
Published: (2004)
Multi-View Retrieval Of Software Design Specifications Using Similarity Assessment Approach
by: Adamu, Alhassan
Published: (2017)
by: Adamu, Alhassan
Published: (2017)
An Efficient Distributed Slotted Multi-Hop Wireless Mac Protocol For Internet Of Things
by: Sarvghadi, Mohammad Ali
Published: (2021)
by: Sarvghadi, Mohammad Ali
Published: (2021)
Compute Language Interface: A Transparent Wrapper Library For Multi Cpu-Gpu
by: Ooi, Keng Siang
Published: (2013)
by: Ooi, Keng Siang
Published: (2013)
Honeypots: Why We Need A Dynamics Honeypots?
by: Budiarto, Rahmat, et al.
Published: (2004)
by: Budiarto, Rahmat, et al.
Published: (2004)
Similar Items
-
ECSC-128: New Stream Cipher Based On Elliptic Curve Discrete Logarithm Problem.
by: Suwais, Khaled, et al.
Published: (2007) -
Visual Public-Key Cryptosystems.
by: Samsudin, Azman
Published: (2012) -
New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
by: Eghdamian, Arash
Published: (2020) -
A New Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007) -
Enhanced parallel thread scheduling for Java based applications on multi-core architecture
by: Kam-Mun, Chong, et al.
Published: (2008)