Optimal Elliptic-Curve Subspaces for Applications in Double-Authenticated Requests in Mobile Distributed Data Mining
Mathematical models based on elliptic curves have been intensively studied since their applicability in data security systems was discovered. In this article, the authors describe the optimal way to select particular subspaces over which elliptic curves are defined, showing the applicability of thes...
Main Authors: | Daniel Ioan Hunyadi, Oana-Adriana Ticleanu, Nicolae Constantinescu |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-12-01
|
Series: | Mathematics |
Subjects: | |
Online Access: | https://www.mdpi.com/2227-7390/11/1/122 |
Similar Items
-
Differential operators over particular elliptic curves spaces with cryptographic applications
by: Oana Adriana Ticleanu
Published: (2015-12-01) -
Nonlinearities in Elliptic Curve Authentication
by: Ramzi Alsaedi, et al.
Published: (2014-09-01) -
Academic Document Authentication using Elliptic Curve Digital Signature Algorithm and QR Code
by: Theophilus Wellem, et al.
Published: (2022-09-01) -
Elliptic Curve Signcryption-Based Mutual Authentication Protocol for Smart Cards
by: Anuj Kumar Singh, et al.
Published: (2020-11-01) -
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
by: Younsung Choi, et al.
Published: (2014-06-01)