intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Elliptic curves

Xem 1-20 trên 71 kết quả Elliptic curves
  • In this paper, we propose a geographically lightweight secure routing protocol (LS-TPGF) in a wireless multimedia sensor network (WMSN) using Cyclic Redundancy Check (CRC) and Elliptic Curve Cryptography (ECC) for node and message authentication.

    pdf10p vithomson 02-07-2024 0 0   Download

  • In this paper, the authors propose a solution to improve the security of the digital signature scheme, this solution is implemented on two levels of digital signature scheme construction.

    pdf8p viambani 18-06-2024 3 1   Download

  • Ebook Advances in elliptic curve cryptography presents the following content: Chapter I: elliptic curve based protocols, chapter II: on the provable security of ECDSA, chapter III: proofs of security for ECIES, chapter IV: side-channel analysis, chapter V: defences against side-channel analysis, chapter VI: advances in point counting, chapter VII: hyperelliptic curves and the HCDLP, chapter VIII: weil descent attacks, chapter IX: pairings, chapter X: cryptography from pairings.

    pdf299p zizaybay1103 29-05-2024 4 2   Download

  • Ebook Fundamentals of cryptology: A professional reference & interactive tutorial presents the following content: Chapter 1 introduction, chapter 2 classical cryptosystems, chapter 3 shift register sequences, chapter 4 block ciphers, chapter 5 shannon theory, chapter 6 data compression techniques, chapter 7 public-key cryptography, chapter 8 discrete logarithm based systems, chapter 9 RSA based systems, chapter 10 elliptic curves based systems, chapter 11 coding theory based systems, chapter 12 knapsack based systems.

    pdf508p zizaybay1103 29-05-2024 5 2   Download

  • This book is intended as a guide for security professionals, developers, and those interested in learning how elliptic curve cryptography can be deployed to secure applications. The presentation is targeted to a diverse audience, and generally assumes no more than an undergraduate degree in computer science, engineering, or mathematics. The book was not written for theoreticians as is evident from the lack of proofs for mathematical statements.

    pdf332p zizaybay1103 29-05-2024 3 2   Download

  • Part 2 of ebook "Software engineering, artificial intelligence, networking and parallel/distributed computing 2011" includes the following main contents: comparison of region based and weighted principal component analysis and locally salient ICA in terms of facial expression recognition; web health portal to enhance patient safety in Australian healthcare systems; peer-based complex profile management; detecting unwanted email using VAT; improving smart card security using elliptic curve cryptography over prime field (Fp);...

    pdf101p khuynhlinhnguyet1009 05-04-2024 2 1   Download

  • In this paper, the authors propose a solution to improve the secure of digital signature schemes, this solution is implemented on two levels of digital signature scheme construction. At the second level, the authors propose a method to construct new digital signature algorithms based on this hard problem.

    pdf10p vigojek 02-02-2024 0 0   Download

  • This paper presents a lightweight digital signature-based routing message and node authentication solution for wireless multimedia sensor networks (WMSNs). The lightweight geographical security routing protocol (ECDSA-TPGF) is proposed on the basis of improving the original two-phase greedy geographical forwarding protocol (TPGF), in which we have added the solution Elliptic curve cryptography (ECC) and cyclic redundancy check (CRC) to create a digital signature for a sensor node attached to a routing message.

    pdf8p vimarillynhewson 02-01-2024 6 3   Download

  • Ebook Computer security and cryptography part 2 includes contents: Chapter 9 block-ciphers: lucifer, DES, and AES; chapter 10 the paradigm of public key cryptography; chapter 11 the knapsack cryptosystem; chapter 12 the rsa cryptosystem; chapter 13 prime numbers and factorization; chapter 14 the discrete logarithm problem; chapter 15 elliptic curve cryptography; chapter 16 key exchange in a network; chapter 17 digital signatures and authentication; chapter 18 applications of cryptography; chapter 19 cryptographic patents.

    pdf239p haojiubujain06 05-09-2023 8 3   Download

  • Ebook Web services security and e-business: Part 2 includes contents: Chapter X Verifiable encryption of digital signatures using elliptic curve digital signature algorithm and its implementation issues; Chapter XI An introductory study on business intelligence security; Chapter XII Secure trust transfer using chain signatures; Chapter XIII Distributed intrusion detection systems: An overview;…

    pdf210p haojiubujain06 06-09-2023 10 3   Download

  • Ebook Wireless network security: Part 1 includes contents: Chapter 1: High performance elliptic curve cryptographic co-processor; Chapter 2: An adaptive encryption protocol in mobile computing; Chapter 3: Pre-authentication and authentication models in ad hoc networks; Chapter 4: Promoting identity-based key management in wireless ad hoc networks; Chapter 5: A survey of attacks and countermeasures in mobile ad hoc networks; Chapter 6: Secure routing in wireless ad-hoc networks; Chapter 7: A survey on intrusion detection in mobile ad hoc networks.

    pdf186p haojiubujain06 06-09-2023 16 3   Download

  • Ebook Information security management handbook: Part 2 includes the following content: Chapter 15: Application Whitelisting; Chapter 16: Design of Information Security for Large System Development Projects; Chapter 17: Building Application Security Testing into the Software Development Life Cycle; Chapter 18: Twenty-Five (or Forty) Years of Malware History; Chapter 19: Format Preserving Encryption; Chapter 20: Elliptic Curve Cryptosystems; Chapter 21: Pirating the Ultimate Killer App: Hacking Military Unmanned Aerial Vehicles; Chapter 22: Service-Oriented Architecture; Chapter 23: Cloud Sec...

    pdf287p haojiubujain01 24-06-2023 6 5   Download

  • Handbook of elliptic and hyperelliptic curve cryptography: Part 1 presents the following content: Chapter 1 introduction to public-key cryptography, chapter 2 algebraic background, chapter 3 background on p-adic numbers, chapter 4 background on curves and jacobians, chapter 5 varieties over special fields, chapter 6 background on pairings, chapter 7 background on weil descent, chapter 8 cohomological backgroundon point counting, chapter 9 exponentiation, chapter 10 integer arithmetic, chapter 11 finite field arithmetic, chapter 12 arithmetic of p-adic numbers, chapter 13 arithmetic of ellip...

    pdf423p runthenight08 12-04-2023 8 5   Download

  • Handbook of elliptic and hyperelliptic curve cryptography: Part 2 presents the following content: Chapter 16 implementation of pairings, chapter 17 point counting on elliptic and hyperelliptic curves, chapter 18 complex multiplication, chapter 19 generic algorithms for computing discrete logarithms, chapter 20 index calculus, chapter 21 index calculus for hyperelliptic curves, chapter 22 transfer of discrete logarithms, chapter 23 algebraic realizations of DL systems, chapter 24 pairing-based cryptography, chapter 25 compositeness and primality testing factoring, chapter 26 fast arithmetic ...

    pdf420p runthenight08 12-04-2023 15 5   Download

  • Schnorr signature schemas and the version on its elliptic curve (EC-Schnorr) are signature schemas that are not only highly secure but are also rated as having the highest performance among signature schemas based on discrete logarithm problems (on the Fp finite field and on the elliptic curve).

    pdf16p viargus 20-02-2023 5 1   Download

  • One option for a digital signature solution for devices with low memory and low bandwidth transmission over channels uses a short digital signature scheme based on Weil bilinear pairing aimed at short processing times, fast computation, and convenient deployment on applications.

    pdf7p vimalfoy 08-02-2023 5 2   Download

  • The article proposes a method for constructing public-key block cipher schemes based on the difficulty of the discrete logarithm problem on elliptic curves. The schemas are construc according to the proposed method and can simultaneously perform security functions and authenticate the origin and integrity of the encrypted message.

    pdf8p visirius 19-01-2023 7 2   Download

  • Bài viết "Phương pháp tấn công phân tích năng lượng đơn giản lên hệ mật dựa trên đường cong elliptich" trình bày kết quả thực hiện tấn công SPA lên phép nhân điểm phương pháp nhị phân của mật mã đường cong Elliptic (Elliptic Curve Cryptography – ECC). Tấn công được thực hiện thông qua việc phân tích và nhận dạng các phép tính cơ bản khi thuật toán thực thi trên phần cứng.

    pdf6p hoabingan205 08-12-2022 15 5   Download

  • Mật mã đường cong Elliptic là một hướng trong mật mã nguyên thủy hạng nhẹ. Bài báo này dựa trên ý tưởng khóa đối xứng của mật mã Affine, hệ mật đường cong Elliptic (ECC- Elliptic Curve Cryptography). Số học đường cong Elliptic có thể được sử dụng để phát triển các sơ đồ mã hóa đường cong Elliptic bao gồm trao đổi khóa, mã hóa và chữ ký số.

    pdf9p vijihyo2711 25-09-2021 34 2   Download

  • "Handbook of Elliptic and hyperelliptic curve cryptography" present introduction to public-key cryptography; mathematical background; algebraic background; background on p-adic numbers; background on curves and jacobians; varieties over special fields; background on pairings; background on weil descent; cohomological background on point counting...

    pdf843p haphuonglan2021 25-04-2021 59 36   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
3=>0