Sciweavers

38 search results - page 3 / 8
» Huff's Model for Elliptic Curves
Sort
View
WSC
2007
13 years 9 months ago
An elliptical cryptographic algorithm for RF wireless devices
In this paper, we propose a new asymmetric cryptographic algorithm (HOOD CRYPT) based on the Elliptical Curve Cryptographic approach. The algorithm describes how an orthogonal fre...
Robert Steven Owor, Khalil Dajani, Zephyrinus Okon...
PAIRING
2007
Springer
108views Cryptology» more  PAIRING 2007»
14 years 1 months ago
Constructing Pairing-Friendly Genus 2 Curves with Ordinary Jacobians
We provide the first explicit construction of genus 2 curves over finite fields whose Jacobians are ordinary, have large prime-order subgroups, and have small embedding degree. ...
David Freeman
PROVSEC
2010
Springer
13 years 5 months ago
Identity Based Public Verifiable Signcryption Scheme
Abstract. Signcryption as a single cryptographic primitive offers both confidentiality and authentication simultaneously. Generally in signcryption schemes, the message is hidden a...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
ACISP
2011
Springer
12 years 11 months ago
A Generic Variant of NIST's KAS2 Key Agreement Protocol
We propose a generic three-pass key agreement protocol that is based on a certain kind of trapdoor one-way function family. When specialized to the RSA setting, the generic protoco...
Sanjit Chatterjee, Alfred Menezes, Berkant Ustaogl...
ICIP
1997
IEEE
13 years 11 months ago
An axiomatic approach to image interpolation
We discuss possible algorithms for interpolating data given in a set of curves and or points in the plane. We propose a set of basic assumptions to be satis ed by the interpolatio...
Vicent Caselles, Jean-Michel Morel, Catalina Sbert