**Commenced**in January 2007

**Frequency:**Monthly

**Edition:**International

**Paper Count:**954

# Search results for: elliptic curve cryptography

##### 954 Improved of Elliptic Curves Cryptography over a Ring

**Authors:**
Abdelhakim Chillali,
Abdelhamid Tadmori,
Muhammed Ziane

**Abstract:**

**Keywords:**
elliptic curves,
finite ring,
cryptography,
study

##### 953 Arithmetic Operations Based on Double Base Number Systems

**Authors:**
K. Sanjayani,
C. Saraswathy,
S. Sreenivasan,
S. Sudhahar,
D. Suganya,
K. S. Neelukumari,
N. Vijayarangan

**Abstract:**

**Keywords:**
cryptography,
double base number system,
elliptic curve cryptography,
elliptic curve digital signature algorithm

##### 952 Implementation of Elliptic Curve Cryptography Encryption Engine on a FPGA

**Authors:**
Mohamad Khairi Ishak

**Abstract:**

**Keywords:**
elliptic curve cryptography,
FPGA,
key sizes,
memory

##### 951 A Study of General Attacks on Elliptic Curve Discrete Logarithm Problem over Prime Field and Binary Field

**Authors:**
Tun Myat Aung,
Ni Ni Hla

**Abstract:**

**Keywords:**
discrete logarithm problem,
general attacks,
elliptic curve,
prime field,
binary field

##### 950 Fingerprint Image Encryption Using a 2D Chaotic Map and Elliptic Curve Cryptography

**Authors:**
D. M. S. Bandara,
Yunqi Lei,
Ye Luo

**Abstract:**

**Keywords:**
arnold cat map,
biometric encryption,
block cipher,
elliptic curve cryptography,
fingerprint encryption,
Koblitz’s encoding

##### 949 Alternative Key Exchange Algorithm Based on Elliptic Curve Digital Signature Algorithm Certificate and Usage in Applications

**Authors:**
A. Andreasyan,
C. Connors

**Abstract:**

**Keywords:**
cryptography,
elliptic curve digital signature algorithm,
key exchange,
network security protocol

##### 948 Implementation of Integer Sub-Decomposition Method on Elliptic Curves with J-Invariant 1728

**Authors:**
Siti Noor Farwina Anwar,
Hailiza Kamarulhaili

**Abstract:**

**Keywords:**
efficiently computable endomorphism,
elliptic scalar multiplication,
j-invariant 1728,
quadratic field

##### 947 Cryptanalysis of ID-Based Deniable Authentication Protocol Based On Diffie-Hellman Problem on Elliptic Curve

**Authors:**
Eun-Jun Yoon

**Abstract:**

**Keywords:**
deniable authentication,
elliptic curve cryptography,
Diffie-Hellman problem,
cryptanalysis

##### 946 Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing

**Authors:**
H. Parveen Begam,
M. A. Maluk Mohamed

**Abstract:**

**Keywords:**
grid computing,
privacy,
anonymity,
onion routing,
ECC,
RSA

##### 945 An Attack on the Lucas Based El-Gamal Cryptosystem in the Elliptic Curve Group Over Finite Field Using Greater Common Divisor

**Authors:**
Lee Feng Koo,
Tze Jin Wong,
Pang Hung Yiu,
Nik Mohd Asri Nik Long

**Abstract:**

**Keywords:**
decryption,
encryption,
elliptic curve,
greater common divisor

##### 944 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

**Authors:**
Despoina Chochtoula,
Aristidis Ilias,
Yannis Stamatiou

**Abstract:**

**Keywords:**
elliptic curve cryptography,
ICT security,
modbus protocol,
SCADA,
TCP/IP protocol

##### 943 Solving 94-Bit ECDLP with 70 Computers in Parallel

**Authors:**
Shunsuke Miyoshi,
Yasuyuki Nogami,
Takuya Kusaka,
Nariyoshi Yamai

**Abstract:**

**Keywords:**
Pollard's rho method,
BN curve,
Montgomery multiplication

##### 942 Scalable Systolic Multiplier over Binary Extension Fields Based on Two-Level Karatsuba Decomposition

**Authors:**
Chiou-Yng Lee,
Wen-Yo Lee,
Chieh-Tsai Wu,
Cheng-Chen Yang

**Abstract:**

**Keywords:**
digit-serial systolic multiplier,
elliptic curve cryptography (ECC),
Karatsuba algorithm (KA),
shifted polynomial basis (SPB),
pairing computation

##### 941 BAN Logic Proof of E-passport Authentication Protocol

**Authors:**
Safa Saoudi,
Souheib Yousfi,
Riadh Robbana

**Abstract:**

**Keywords:**
e-passport,
elliptic curve cryptography,
identity based encryption,
shared secret,
BAN Logic

##### 940 Key Transfer Protocol Based on Non-invertible Numbers

**Authors:**
Luis A. Lizama-Perez,
Manuel J. Linares,
Mauricio Lopez

**Abstract:**

**Keywords:**
invertible,
non-invertible,
ring,
key transfer

##### 939 Study of Bifurcation Curve with Aspect Ratio at Low Reynolds Number

**Authors:**
Amit K. Singh,
Subhankar Sen

**Abstract:**

**Keywords:**
aspect ratio,
bifurcation curve,
elliptic cylinder,
GMRES,
stabilized finite-element

##### 938 SA-SPKC: Secure and Efficient Aggregation Scheme for Wireless Sensor Networks Using Stateful Public Key Cryptography

**Authors:**
Merad Boudia Omar Rafik,
Feham Mohammed

**Abstract:**

**Keywords:**
secure data aggregation,
wireless sensor networks,
elliptic curve cryptography,
homomorphic encryption

##### 937 Software Quality Assurance in Network Security using Cryptographic Techniques

**Authors:**
Sidra Shabbir,
Ayesha Manzoor,
Mehreen Sirshar

**Abstract:**

**Keywords:**
cryptography,
network security,
encryption,
decryption,
integrity,
confidentiality,
security algorithms,
elliptic curve cryptography

##### 936 Optimized and Secured Digital Watermarking Using Fuzzy Entropy, Bezier Curve and Visual Cryptography

**Authors:**
R. Rama Kishore,
Sunesh

**Abstract:**

**Keywords:**
digital watermarking,
fractional transform,
visual cryptography,
Bezier curve,
fuzzy entropy

##### 935 Efficient Semi-Systolic Finite Field Multiplier Using Redundant Basis

**Authors:**
Hyun-Ho Lee,
Kee-Won Kim

**Abstract:**

**Keywords:**
finite field,
Montgomery multiplication,
systolic array,
cryptography

##### 934 Comparison of the Distillation Curve Obtained Experimentally with the Curve Extrapolated by a Commercial Simulator

**Authors:**
Lívia B. Meirelles,
Erika C. A. N. Chrisman,
Flávia B. de Andrade,
Lilian C. M. de Oliveira

**Abstract:**

**Keywords:**
distillation curve,
petroleum distillation,
simulation,
true boiling point curve

##### 933 Exact Solutions of K(N,N)-Type Equations Using Jacobi Elliptic Functions

**Authors:**
Edamana Krishnan,
Khalil Al-Ghafri

**Abstract:**

**Keywords:**
travelling wave solutions,
solitary wave solutions,
compactons,
Jacobi elliptic functions,
mapping methods

##### 932 Nonlinear Static Analysis of Laminated Composite Hollow Beams with Super-Elliptic Cross-Sections

**Authors:**
G. Akgun,
I. Algul,
H. Kurtaran

**Abstract:**

**Keywords:**
generalized differential quadrature,
geometric nonlinearity,
laminated composite,
super-elliptic cross-section

##### 931 Passive Control of Elliptic Jet by Using Triangular and Truncated Tabs

**Authors:**
Saif Akram,
E. Rathakrishnan

**Abstract:**

**Keywords:**
elliptic jet,
tabs,
truncated,
triangular

##### 930 The Application of Variable Coefficient Jacobian elliptic Function Method to Differential-Difference Equations

**Authors:**
Chao-Qing Dai

**Abstract:**

**Keywords:**
discrete sine-Gordon equation,
variable coefficient Jacobian elliptic function method,
exact solutions,
equation

##### 929 Efficient Internal Generator Based on Random Selection of an Elliptic Curve

**Authors:**
Mustapha Benssalah,
Mustapha Djeddou,
Karim Drouiche

**Abstract:**

**Keywords:**
PRNG,
security,
cryptosystem,
ECC

##### 928 Approximating Maximum Speed on Road from Curvature Information of Bezier Curve

**Authors:**
M. Yushalify Misro,
Ahmad Ramli,
Jamaludin M. Ali

**Abstract:**

**Keywords:**
speed estimation,
path constraints,
reference trajectory,
Bezier curve

##### 927 An Efficient and Provably Secure Three-Factor Authentication Scheme with Key Agreement

**Authors:**
Mohan Ramasundaram,
Amutha Prabakar Muniyandi

**Abstract:**

**Keywords:**
Telecare Medicine Information System,
elliptic curve cryptography,
three-factor,
biometric,
random oracle

##### 926 Cryptography and Cryptosystem a Panacea to Security Risk in Wireless Networking

**Authors:**
Modesta E. Ezema,
Chikwendu V. Alabekee,
Victoria N. Ishiwu,
Ifeyinwa NwosuArize,
Chinedu I. Nwoye

**Abstract:**

**Keywords:**
algorithm,
cryptography,
cryptosystem,
network

##### 925 Hohmann Transfer and Bi-Elliptic Hohmann Transfer in TRAPPIST-1 System

**Authors:**
Jorge L. Nisperuza,
Wilson Sandoval,
Edward. A. Gil,
Johan A. Jimenez

**Abstract:**

**Keywords:**
bi-elliptic Hohmann transfer,
exoplanet,
extrasolar system,
Hohmann transfer,
TRAPPIST-1