Sciweavers

134 search results - page 4 / 27
» Binary Edwards Curves
Sort
View
CTRSA
2006
Springer
183views Cryptology» more  CTRSA 2006»
14 years 2 months ago
Efficient Doubling on Genus 3 Curves over Binary Fields
The most important and expensive operation in a hyperelliptic curve cryptosystem (HECC) is scalar multiplication by an integer k, i.e., computing an integer k times a divisor D on ...
Xinxin Fan, Thomas J. Wollinger, Yumin Wang
DICTA
2003
14 years 7 days ago
Testing for Curves in a Binary Image
Abstract. Curve detection is viewed as a process of hypothesis generation and hypothesis testing. Of the two, hypothesis generation has received much attention and many sophisticat...
Y. C. Cheng
TC
2011
13 years 5 months ago
Hybrid Binary-Ternary Number System for Elliptic Curve Cryptosystems
—Single and double scalar multiplications are the most computational intensive operations in elliptic curve based cryptosystems. Improving the performance of these operations is ...
Jithra Adikari, Vassil S. Dimitrov, Laurent Imbert
TSMC
2010
13 years 5 months ago
Binary Biometrics: An Analytic Framework to Estimate the Performance Curves Under Gaussian Assumption
In recent years the protection of biometric data has gained increased interest from the scientific community. Methods such as the fuzzy commitment scheme, helper data system, fuzzy...
Emile J. C. Kelkboom, Gary Garcia Molina, Jeroen B...
IJNSEC
2006
94views more  IJNSEC 2006»
13 years 11 months ago
A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems
The main back-bone operation in elliptic curve cryptosystems is scalar point multiplication. The most frequently used method implementing the scalar point multiplication which is ...
Sangook Moon