نتایج جستجو برای: elliptic curve cryptography
تعداد نتایج: 190018 فیلتر نتایج به سال:
The paper analyzes CFVZ, a new public key cryptosystem whose security is based on a matrix version of the discrete logarithm problem over an elliptic curve. It is shown that the complexity of solving the underlying problem for the proposed system is dominated by the complexity of solving a fixed number of discrete logarithm problems in the group of an elliptic curve. Using an adapted Pollard rh...
This paper begins by discussing the foundations of the study of elliptic curves and how a the points on an elliptic curve form an additive group. We then explore some of the interesting features of elliptic curves, including the fact that elliptic curves are complex tori. At the end we briefly discuss how elliptic curves can be used in cryptography.
Algebraic curves over finite fields are being extensively used in the design of public-key cryptographic schemes. This paper surveys some topics in algebraic curve cryptography, with an emphasis on recent developments in algorithms for the elliptic and hyperelliptic curve discrete logarithm problems, and computational problems in pairing-based cryptography.
Quantum Computing (QC). The content of node or sink nodes is processed using the fundamental principles quantum mechanics. However, cryptography techniques face several other issues, such as availability, integrity, and vulnerability, to name a few. researchers have overcome many obstacles, yet security remains crucial concern in QC. experimenters recently discovered that QC has lot more data h...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید