Sciweavers

173 search results - page 10 / 35
» Overview of Elliptic Curve Cryptography
Sort
View
CONIELECOMP
2005
IEEE
14 years 3 months ago
A Hardware Architecture for Elliptic Curve Cryptography and Lossless Data Compression
Miguel Morales-Sandoval, Claudia Feregrino Uribe
IJNSEC
2007
126views more  IJNSEC 2007»
13 years 9 months ago
Elliptic Curve Cryptography Based Wireless Authentication Protocol
Recently, Aydos et al. proposed an ECC-based wireless authentication protocol. Because their protocol is based on ECC, the protocol has significant advantage including lower comp...
Yongliang Liu, Wen Gao, Hongxun Yao, Xinghua Yu
ASIACRYPT
2001
Springer
14 years 2 months ago
Supersingular Curves in Cryptography
Abstract. Frey and R¨uck gave a method to transform the discrete logarithm problem in the divisor class group of a curve over Fq into a discrete logarithm problem in some finite ...
Steven D. Galbraith