-
1
-
2
Elliptical curve cryptography
Published 2009“…Miller is a method to encrypt data based on algebraic structure of elliptic curves over finite fields. It is a means to encrypt data as a means of achieving computer security. …”
Get full text
Final Year Project (FYP) -
3
-
4
Heuristics for the arithmetic of elliptic curves
Published 2021“…We discuss the theoretical evidence for the model, andwe make predictions about elliptic curves based on corresponding theorems provedabout the model. …”
Get full text
Article -
5
Heuristics for the arithmetic of elliptic curves
Published 2021“…We discuss the theoretical evidence for the model, andwe make predictions about elliptic curves based on corresponding theorems provedabout the model. …”
Get full text
Article -
6
-
7
-
8
-
9
Weak implementations of elliptic curve cryptography
Published 2024Subjects: Get full text
Final Year Project (FYP) -
10
Efficient implementation of elliptic curve cryptosystems
Published 2008“…Efficient implementation of elliptic curve cryptography can be targeted at 2 levels, specifically on the elliptic curve group operations and the underlying finite field arithmetic. …”
Get full text
Thesis -
11
-
12
Elliptic curve cryptosystem and its applications
Published 2010“…Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller and more efficient cryptographic keys. …”
Get full text
Final Year Project (FYP) -
13
Demonstration of elliptic curve cryptography calculations
Published 2018“…The aim is to help students understand the difficult mathematic concepts behind Elliptic Curve Cryptography (ECC) Calculation and Encryption/Decryption by implementing a simple and easy use demonstrator as teaching tools…”
Get full text
Final Year Project (FYP) -
14
Independence of CM points in elliptic curves
Published 2021“…We prove a result which describes, for each n ≥ 1, all linear dependencies among n images in elliptic curves of special points in modular or Shimura curves under parameterizations (or correspondences). …”
Journal article -
15
Independence of CM points in elliptic curves
Published 2020“…We prove a result which describes, for each n≥1, all linear dependencies among n images in elliptic curves of special points in modular or Shimura curves under parameterizations (or correspondences). …”
Working paper -
16
The average analytic rank of elliptic curves
Published 2004“…All the results in this paper are conditional on the Riemann hypothesis for the L-functions of elliptic curves. Under this assumption, we show that the average analytic rank of all elliptic curves over ℚ is at most 2, thereby improving a result of Brumer. …”
Journal article -
17
A survey on elliptic curve cryptography
Published 2014“…This paper provides a ground up survey on elliptic curve cryptography. It tailors the mathematics behind elliptic curve to the applicability within a cryptosystem. …”
Get full text
Article -
18
Multi-Threading Elliptic Curve Cryptosystems.
Published 2007“…Elliptic Curve Cryptosystems (ECC) is being widely used in cryptographic systems due to its unique security features. …”
Get full text
Conference or Workshop Item -
19
-
20
18.783 Elliptic Curves, Spring 2015
Published 2017Subjects: “…elliptic curves…”
Get full text
Learning Object