Sciweavers

49 search results - page 5 / 10
» Twisted Edwards Curves
Sort
View
ASIACRYPT
2000
Springer
13 years 11 months ago
Trapdooring Discrete Logarithms on Elliptic Curves over Rings
This paper introduces three new probabilistic encryption schemes using elliptic curves over rings. The cryptosystems are based on three specific trapdoor mechanisms allowing the r...
Pascal Paillier
ACNS
2009
Springer
124views Cryptology» more  ACNS 2009»
14 years 2 months ago
Novel Precomputation Schemes for Elliptic Curve Cryptosystems
We present an innovative technique to add elliptic curve points with the form P Q± , and discuss its application to the generation of precomputed tables for the scalar multiplicat...
Patrick Longa, Catherine H. Gebotys
PAIRING
2009
Springer
124views Cryptology» more  PAIRING 2009»
14 years 2 months ago
Fast Hashing to G2 on Pairing-Friendly Curves
When using pairing-friendly ordinary elliptic curves over prime fields to implement identity-based protocols, there is often a need to hash identities to points on one or both of ...
Michael Scott, Naomi Benger, Manuel Charlemagne, L...
SMI
2007
IEEE
157views Image Analysis» more  SMI 2007»
14 years 1 months ago
Skeleton-based Hierarchical Shape Segmentation
We present an effective framework for segmenting 3D shapes into meaningful components using the curve skeleton. Our algorithm identifies a number of a critical points on the curv...
Dennie Reniers, Alexandru Telea
SI3D
2005
ACM
14 years 1 months ago
Sketching mesh deformations
Techniques for interactive deformation of unstructured polygon meshes are of fundamental importance to a host of applications. Most traditional approaches to this problem have emp...
Youngihn Kho, Michael Garland