-
1
Elliptical curve cryptography
Published 2009“…In this report, the author is working on Elliptical Curve Cryptography (ECC) in which this report looks at the math of ECC, the different key agreement and key exchange protocols of ECC and analyst their effectiveness against certain attacks. …”
Get full text
Final Year Project (FYP) -
2
-
3
-
4
-
5
Weak implementations of elliptic curve cryptography
Published 2024“…Elliptic curve cryptography is an approach to public key cryptography based on the algebraic structure of elliptic curves over finite fields. …”
Get full text
Final Year Project (FYP) -
6
-
7
Demonstration of elliptic curve cryptography calculations
Published 2018“…The aim is to help students understand the difficult mathematic concepts behind Elliptic Curve Cryptography (ECC) Calculation and Encryption/Decryption by implementing a simple and easy use demonstrator as teaching tools…”
Get full text
Final Year Project (FYP) -
8
A survey on elliptic curve cryptography
Published 2014“…This paper provides a ground up survey on elliptic curve cryptography. It tailors the mathematics behind elliptic curve to the applicability within a cryptosystem. …”
Get full text
Article -
9
-
10
THEORETICAL ASSUMPTIONS FOR AN INTRODUCTION TO ELLIPTIC CURVE CRYPTOGRAPHY
Published 2023-11-01“…This article provides an overview of the theoretical assumptions that are necessary for the development of cryptographic algorithms based on elliptic curve cryptography, which includes defining elliptic curves, defining the properties of arithmetic operations on elliptic curves used in cryptography with reference to curves defined over finite fields.…”
Get full text
Article -
11
Generalized Fibonacci Sequences for Elliptic Curve Cryptography
Published 2023-11-01Get full text
Article -
12
Speeding-Up Elliptic Curve Cryptography Algorithms
Published 2022-10-01Subjects: Get full text
Article -
13
A survey on the cryptanalysis of elliptic curve cryptography
Published 2010“…Elliptic Curve Cryptography has been introduced in the mid 1980s as a public key cryptographic system to replace block ciphers techniques. …”
Get full text
Final Year Project (FYP) -
14
-
15
JPEG mage encryption with Elliptic Curve Cryptography
Published 2015“…Amongst the cryptographic algorithms, Elliptic Curve Cryptography with suitable characteristics such as low bandwidth usage, low computational time and small key size s satisfactory for mage encryption. …”
Conference or Workshop Item -
16
Error analysis and detection procedures for elliptic curve cryptography
Published 2019-09-01“…In this paper, a fault detection scheme is introduced with the ability to perform with increased protection and reliability of the Elliptic Curve Cryptography (ECC) in realistic environments at a competitive price point. …”
Get full text
Article -
17
Crafting certified elliptic curve cryptography implementations in Coq
Published 2017Get full text
Thesis -
18
Demonstration (web-based) of elliptic curve cryptography calculations
Published 2020“…Therefore, it is important for students studying in the field of cryptography to understand how Elliptic Curve Cryptography (ECC) works as it is a more secure solution given the same key size. …”
Get full text
Final Year Project (FYP) -
19
Encrypting text data using elliptic curve cryptography
Published 2018“…Elliptic curve cryptography has been a hot topic since its birth in 1985. …”
Get full text
Thesis -
20