-
1
On the Search for Supersingular Elliptic Curves and Their Applications
Published 2025-01-01Subjects: “…supersingular elliptic curves…”
Get full text
Article -
2
An Integrated Image Encryption Scheme Based on Elliptic Curve
Published 2023-01-01Subjects: Get full text
Article -
3
A weighted universality theorem for zeta-functions of elliptic curves
Published 2004-12-01Get full text
Article -
4
Average Analytic Ranks of Elliptic Curves over Number Fields
Published 2025-01-01“…We give a conditional bound for the average analytic rank of elliptic curves over an arbitrary number field. In particular, under the assumptions that all elliptic curves over a number field K are modular and have L-functions which satisfy the Generalized Riemann Hypothesis, we show that the average analytic rank of isomorphism classes of elliptic curves over K is bounded above by $(9\deg (K)+1)/2$ , when ordered by naive height. …”
Get full text
Article -
5
An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment
Published 2016-01-01“…This paper investigates how the integrity and secure data transfer are improved based on the Elliptic Curve based Schnorr scheme. This paper proposes a virtual machine based cloud model with Hybrid Cloud Security Algorithm (HCSA) to remove the expired content. …”
Get full text
Article -
6
A weighted discrete universality theorem for L-functions of elliptic curves
Published 2005-12-01Get full text
Article -
7
The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field
Published 2022-01-01Subjects: “…Elliptic curve cryptography…”
Get full text
Article -
8
Corrigendum: Throughput/area optimised pipelined architecture for elliptic curve crypto processor
Published 2021-01-01Get full text
Article -
9
Elliptic-Curve Cryptography Implementation on RISC-V Processors for Internet of Things Applications
Published 2024-01-01“…Elliptic-curve cryptography (ECC) is a popular technique of public-key cryptography used for secure communications in Internet of Things (IoT) applications. …”
Get full text
Article -
10
Cross-chain medical data sharing scheme based on elliptic curve signcryption
Published 2024-12-01Subjects: Get full text
Article -
11
Geometric design of two novel rotor profiles for Roots vacuum pumps with elliptical curve
Published 2025-03-01“…This study proposes two novel elliptical rotor profiles: one designed with an elliptical curve at the top and the other with an elliptical curve at the waist. …”
Get full text
Article -
12
A high speed processor for elliptic curve cryptography over NIST prime field
Published 2022-07-01“…Abstract Elliptic curve cryptography (ECC), as one of the public key cryptography systems, has been widely applied to many security applications. …”
Get full text
Article -
13
-
14
An interesting family of curves of genus 1
Published 2000-01-01Subjects: “…Elliptic curve…”
Get full text
Article -
15
Research on cloud dynamic public key information security based on elliptic curve and primitive Pythagoras
Published 2025-02-01Subjects: “…Elliptic curve…”
Get full text
Article -
16
ECC-Based Authentication Protocol for Military Internet of Drone (IoD): A Holistic Security Framework
Published 2025-01-01Subjects: Get full text
Article -
17
-
18
Analysis of the Fault Attack ECDLP over Prime Field
Published 2011-01-01“…An elliptic curve E is defined over prime field 𝔽p with base point P∈E(𝔽p). …”
Get full text
Article -
19
Private feasible solution determination
Published 2021-01-01“…In this study, the authors propose a protocol based on elliptic curve cryptosystem for this problem and prove that the protocol is secure in the semi‐honest model. …”
Get full text
Article -
20
Kaplansky's ternary quadratic form
Published 2001-01-01“…The proof is modelled on that of a similar theorem by Ono and Soundararajan, in which relations between the number of representations of an integer np2 by two quadratic forms in the same genus, the pth coefficient of an L-function of a suitable elliptic curve, and the class number formula prove the theorem for large primes, leaving 3 cases which are easily numerically verified.…”
Get full text
Article