Showing 1 - 20 results of 539 for search '"elliptic-curve cryptography"', query time: 0.52s Refine Results
  1. 1

    Elliptical curve cryptography by Toh, Zheng Yi.

    Published 2009
    “…In this report, the author is working on Elliptical Curve Cryptography (ECC) in which this report looks at the math of ECC, the different key agreement and key exchange protocols of ECC and analyst their effectiveness against certain attacks. …”
    Get full text
    Final Year Project (FYP)
  2. 2
  3. 3
  4. 4
  5. 5

    Weak implementations of elliptic curve cryptography by Koo, Yu Fang

    Published 2024
    “…Elliptic curve cryptography is an approach to public key cryptography based on the algebraic structure of elliptic curves over finite fields. …”
    Get full text
    Final Year Project (FYP)
  6. 6
  7. 7

    Demonstration of elliptic curve cryptography calculations by Kan, Yao

    Published 2018
    “…The aim is to help students understand the difficult mathematic concepts behind Elliptic Curve Cryptography (ECC) Calculation and Encryption/Decryption by implementing a simple and easy use demonstrator as teaching tools…”
    Get full text
    Final Year Project (FYP)
  8. 8

    A survey on elliptic curve cryptography by Mohamed, Mohamad Afendee

    Published 2014
    “…This paper provides a ground up survey on elliptic curve cryptography. It tailors the mathematics behind elliptic curve to the applicability within a cryptosystem. …”
    Get full text
    Article
  9. 9
  10. 10

    THEORETICAL ASSUMPTIONS FOR AN INTRODUCTION TO ELLIPTIC CURVE CRYPTOGRAPHY by Ognjen Milivojević, Boris Damjanović

    Published 2023-11-01
    “…This article provides an overview of the theoretical assumptions that are necessary for the development of cryptographic algorithms based on elliptic curve cryptography, which includes defining elliptic curves, defining the properties of arithmetic operations on elliptic curves used in cryptography with reference to curves defined over finite fields.…”
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    A survey on the cryptanalysis of elliptic curve cryptography by Mak, Wai Kit.

    Published 2010
    “…Elliptic Curve Cryptography has been introduced in the mid 1980s as a public key cryptographic system to replace block ciphers techniques. …”
    Get full text
    Final Year Project (FYP)
  14. 14
  15. 15

    JPEG mage encryption with Elliptic Curve Cryptography by Bakhtiari, S., Ibrahim, S., Salleh, M., Bakhtiari, M.

    Published 2015
    “…Amongst the cryptographic algorithms, Elliptic Curve Cryptography with suitable characteristics such as low bandwidth usage, low computational time and small key size s satisfactory for mage encryption. …”
    Conference or Workshop Item
  16. 16

    Error analysis and detection procedures for elliptic curve cryptography by Naglaa F. Saudy, Ihab A. Ali, Reda Al Barkouky

    Published 2019-09-01
    “…In this paper, a fault detection scheme is introduced with the ability to perform with increased protection and reliability of the Elliptic Curve Cryptography (ECC) in realistic environments at a competitive price point. …”
    Get full text
    Article
  17. 17
  18. 18

    Demonstration (web-based) of elliptic curve cryptography calculations by Lim, De Quan

    Published 2020
    “…Therefore, it is important for students studying in the field of cryptography to understand how Elliptic Curve Cryptography (ECC) works as it is a more secure solution given the same key size. …”
    Get full text
    Final Year Project (FYP)
  19. 19

    Encrypting text data using elliptic curve cryptography by Ali, Abas Abdullahi

    Published 2018
    “…Elliptic curve cryptography has been a hot topic since its birth in 1985. …”
    Get full text
    Thesis
  20. 20