Block technique for enhancing the efficiency of the mutual opposite form

AW Khaled, NFH Al Saffar - AIP Conference Proceedings, 2024 - pubs.aip.org
Because elliptic curve cryptosystems may employ shorter keys than other public key
cryptosystems and have algorithms that are computationally more efficient, they are being …

ECC-based Secure Communication Platform for Unmanned Systems

S Hu, D Yang, L Li, W Zhou, Y He - Proceedings of the 2023 International …, 2023 - dl.acm.org
With the rapid development of information technology, information security has become
particularly important in the field of communication. To address the limited resources and …

[PDF][PDF] Speeding Up the Computation of Elliptic Curve Scalar Multiplication based on CRT and DRM.

M Anagreh, E Vainikko, P Laud - ICISSP, 2020 - scitepress.org
In this paper, we study the parallel implementations of elliptic curve scalar multiplication over
prime fields using signed binary representations. Our implementation speeds up the …

Improving the Privacy-Preserving of COVID-19 Bluetooth-Based Contact Tracing Applications Against Tracking Attacks

AM Allam - International Journal of Computer Science & …, 2021 - papers.ssrn.com
Bluetooth is an essential wireless standard for short-distance and low-power wireless
networks. Health departments' contact-tracing applications depended on Bluetooth …

[PDF][PDF] BACHELOR OF SCIENCE in COMPUTER ENGINEERING

CC Masterson - 2022 - dca.ue.ucsc.edu
Abstract Hardware Acceleration For Multi-Scalar Multiplication In Zero-Knowledge Proofs by
Connor C. Masterson As more and more aspects of life begin to rely on the internet, secure …

[引用][C] A Design of Elliptic Curve Cryptography Processor Based on SM2 over GF (p)

S Hu, L Li, W Zhou, D Yang - International Journal of Cognitive and Language …, 2023

[引用][C] Parallel Scalar Multiplication Based on Signed Binary Representation of CRT and DRM

M Anagreh - 2018