Block technique for enhancing the efficiency of the mutual opposite form
AW Khaled, NFH Al Saffar - AIP Conference Proceedings, 2024 - pubs.aip.org
Because elliptic curve cryptosystems may employ shorter keys than other public key
cryptosystems and have algorithms that are computationally more efficient, they are being …
cryptosystems and have algorithms that are computationally more efficient, they are being …
ECC-based Secure Communication Platform for Unmanned Systems
S Hu, D Yang, L Li, W Zhou, Y He - Proceedings of the 2023 International …, 2023 - dl.acm.org
With the rapid development of information technology, information security has become
particularly important in the field of communication. To address the limited resources and …
particularly important in the field of communication. To address the limited resources and …
[PDF][PDF] Speeding Up the Computation of Elliptic Curve Scalar Multiplication based on CRT and DRM.
In this paper, we study the parallel implementations of elliptic curve scalar multiplication over
prime fields using signed binary representations. Our implementation speeds up the …
prime fields using signed binary representations. Our implementation speeds up the …
Improving the Privacy-Preserving of COVID-19 Bluetooth-Based Contact Tracing Applications Against Tracking Attacks
AM Allam - International Journal of Computer Science & …, 2021 - papers.ssrn.com
Bluetooth is an essential wireless standard for short-distance and low-power wireless
networks. Health departments' contact-tracing applications depended on Bluetooth …
networks. Health departments' contact-tracing applications depended on Bluetooth …
[PDF][PDF] BACHELOR OF SCIENCE in COMPUTER ENGINEERING
CC Masterson - 2022 - dca.ue.ucsc.edu
Abstract Hardware Acceleration For Multi-Scalar Multiplication In Zero-Knowledge Proofs by
Connor C. Masterson As more and more aspects of life begin to rely on the internet, secure …
Connor C. Masterson As more and more aspects of life begin to rely on the internet, secure …
[引用][C] A Design of Elliptic Curve Cryptography Processor Based on SM2 over GF (p)
S Hu, L Li, W Zhou, D Yang - International Journal of Cognitive and Language …, 2023
[引用][C] Parallel Scalar Multiplication Based on Signed Binary Representation of CRT and DRM
M Anagreh - 2018