**Commenced**in January 2007

**Frequency:**Monthly

**Edition:**International

**Paper Count:**1076

# Search results for: elliptic curve cryptography

##### 1076 Improved of Elliptic Curves Cryptography over a Ring

**Authors:**
Abdelhakim Chillali,
Abdelhamid Tadmori,
Muhammed Ziane

**Abstract:**

**Keywords:**
elliptic curves,
finite ring,
cryptography,
study

##### 1075 Arithmetic Operations Based on Double Base Number Systems

**Authors:**
K. Sanjayani,
C. Saraswathy,
S. Sreenivasan,
S. Sudhahar,
D. Suganya,
K. S. Neelukumari,
N. Vijayarangan

**Abstract:**

**Keywords:**
cryptography,
double base number system,
elliptic curve cryptography,
elliptic curve digital signature algorithm

##### 1074 Implementation of Elliptic Curve Cryptography Encryption Engine on a FPGA

**Authors:**
Mohamad Khairi Ishak

**Abstract:**

**Keywords:**
elliptic curve cryptography,
FPGA,
key sizes,
memory

##### 1073 A Lightweight Authentication and Key Exchange Protocol Design for Smart Homes

**Authors:**
Zhifu Li,
Lei Li,
Wanting Zhou,
Yuanhang He

**Abstract:**

**Keywords:**
authentication,
key exchange,
certificateless public key cryptography,
elliptic curve cryptography

##### 1072 A Study of General Attacks on Elliptic Curve Discrete Logarithm Problem over Prime Field and Binary Field

**Authors:**
Tun Myat Aung,
Ni Ni Hla

**Abstract:**

**Keywords:**
discrete logarithm problem,
general attacks,
elliptic curve,
prime field,
binary field

##### 1071 Fingerprint Image Encryption Using a 2D Chaotic Map and Elliptic Curve Cryptography

**Authors:**
D. M. S. Bandara,
Yunqi Lei,
Ye Luo

**Abstract:**

**Keywords:**
arnold cat map,
biometric encryption,
block cipher,
elliptic curve cryptography,
fingerprint encryption,
Koblitz’s encoding

##### 1070 Alternative Key Exchange Algorithm Based on Elliptic Curve Digital Signature Algorithm Certificate and Usage in Applications

**Authors:**
A. Andreasyan,
C. Connors

**Abstract:**

**Keywords:**
cryptography,
elliptic curve digital signature algorithm,
key exchange,
network security protocol

##### 1069 Implementation of Integer Sub-Decomposition Method on Elliptic Curves with J-Invariant 1728

**Authors:**
Siti Noor Farwina Anwar,
Hailiza Kamarulhaili

**Abstract:**

**Keywords:**
efficiently computable endomorphism,
elliptic scalar multiplication,
j-invariant 1728,
quadratic field

##### 1068 Cryptanalysis of ID-Based Deniable Authentication Protocol Based On Diffie-Hellman Problem on Elliptic Curve

**Authors:**
Eun-Jun Yoon

**Abstract:**

**Keywords:**
deniable authentication,
elliptic curve cryptography,
Diffie-Hellman problem,
cryptanalysis

##### 1067 Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing

**Authors:**
H. Parveen Begam,
M. A. Maluk Mohamed

**Abstract:**

**Keywords:**
grid computing,
privacy,
anonymity,
onion routing,
ECC,
RSA

##### 1066 Cryptosystems in Asymmetric Cryptography for Securing Data on Cloud at Various Critical Levels

**Authors:**
Sartaj Singh,
Amar Singh,
Ashok Sharma,
Sandeep Kaur

**Abstract:**

**Keywords:**
cryptography,
symmetric key cryptography,
asymmetric key cryptography

##### 1065 An Attack on the Lucas Based El-Gamal Cryptosystem in the Elliptic Curve Group Over Finite Field Using Greater Common Divisor

**Authors:**
Lee Feng Koo,
Tze Jin Wong,
Pang Hung Yiu,
Nik Mohd Asri Nik Long

**Abstract:**

**Keywords:**
decryption,
encryption,
elliptic curve,
greater common divisor

##### 1064 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

**Authors:**
Despoina Chochtoula,
Aristidis Ilias,
Yannis Stamatiou

**Abstract:**

**Keywords:**
elliptic curve cryptography,
ICT security,
modbus protocol,
SCADA,
TCP/IP protocol

##### 1063 Scalable Systolic Multiplier over Binary Extension Fields Based on Two-Level Karatsuba Decomposition

**Authors:**
Chiou-Yng Lee,
Wen-Yo Lee,
Chieh-Tsai Wu,
Cheng-Chen Yang

**Abstract:**

**Keywords:**
digit-serial systolic multiplier,
elliptic curve cryptography (ECC),
Karatsuba algorithm (KA),
shifted polynomial basis (SPB),
pairing computation

##### 1062 Solving 94-Bit ECDLP with 70 Computers in Parallel

**Authors:**
Shunsuke Miyoshi,
Yasuyuki Nogami,
Takuya Kusaka,
Nariyoshi Yamai

**Abstract:**

**Keywords:**
Pollard's rho method,
BN curve,
Montgomery multiplication

##### 1061 BAN Logic Proof of E-passport Authentication Protocol

**Authors:**
Safa Saoudi,
Souheib Yousfi,
Riadh Robbana

**Abstract:**

**Keywords:**
e-passport,
elliptic curve cryptography,
identity based encryption,
shared secret,
BAN Logic

##### 1060 A Design of Elliptic Curve Cryptography Processor based on SM2 over GF(p)

**Authors:**
Shiji Hu,
Lei Li,
Wanting Zhou,
DaoHong Yang

**Abstract:**

**Keywords:**
Elliptic curve cryptosystems,
SM2,
modular multiplication,
point multiplication.

##### 1059 Key Transfer Protocol Based on Non-invertible Numbers

**Authors:**
Luis A. Lizama-Perez,
Manuel J. Linares,
Mauricio Lopez

**Abstract:**

**Keywords:**
invertible,
non-invertible,
ring,
key transfer

##### 1058 Study of Bifurcation Curve with Aspect Ratio at Low Reynolds Number

**Authors:**
Amit K. Singh,
Subhankar Sen

**Abstract:**

**Keywords:**
aspect ratio,
bifurcation curve,
elliptic cylinder,
GMRES,
stabilized finite-element

##### 1057 Identity-Based Encryption: A Comparison of Leading Classical and Post-Quantum Implementations in an Enterprise Setting

**Authors:**
Emily Stamm,
Neil Smyth,
Elizabeth O'Sullivan

**Abstract:**

**Keywords:**
identity-based encryption,
post-quantum cryptography,
lattice-based cryptography,
IBE

##### 1056 SA-SPKC: Secure and Efficient Aggregation Scheme for Wireless Sensor Networks Using Stateful Public Key Cryptography

**Authors:**
Merad Boudia Omar Rafik,
Feham Mohammed

**Abstract:**

**Keywords:**
secure data aggregation,
wireless sensor networks,
elliptic curve cryptography,
homomorphic encryption

##### 1055 Software Quality Assurance in Network Security using Cryptographic Techniques

**Authors:**
Sidra Shabbir,
Ayesha Manzoor,
Mehreen Sirshar

**Abstract:**

**Keywords:**
cryptography,
network security,
encryption,
decryption,
integrity,
confidentiality,
security algorithms,
elliptic curve cryptography

##### 1054 Optimized and Secured Digital Watermarking Using Fuzzy Entropy, Bezier Curve and Visual Cryptography

**Authors:**
R. Rama Kishore,
Sunesh

**Abstract:**

**Keywords:**
digital watermarking,
fractional transform,
visual cryptography,
Bezier curve,
fuzzy entropy

##### 1053 Efficient Semi-Systolic Finite Field Multiplier Using Redundant Basis

**Authors:**
Hyun-Ho Lee,
Kee-Won Kim

**Abstract:**

**Keywords:**
finite field,
Montgomery multiplication,
systolic array,
cryptography

##### 1052 Comparison of the Distillation Curve Obtained Experimentally with the Curve Extrapolated by a Commercial Simulator

**Authors:**
Lívia B. Meirelles,
Erika C. A. N. Chrisman,
Flávia B. de Andrade,
Lilian C. M. de Oliveira

**Abstract:**

**Keywords:**
distillation curve,
petroleum distillation,
simulation,
true boiling point curve

##### 1051 Exact Solutions of K(N,N)-Type Equations Using Jacobi Elliptic Functions

**Authors:**
Edamana Krishnan,
Khalil Al-Ghafri

**Abstract:**

**Keywords:**
travelling wave solutions,
solitary wave solutions,
compactons,
Jacobi elliptic functions,
mapping methods

##### 1050 Nonlinear Static Analysis of Laminated Composite Hollow Beams with Super-Elliptic Cross-Sections

**Authors:**
G. Akgun,
I. Algul,
H. Kurtaran

**Abstract:**

**Keywords:**
generalized differential quadrature,
geometric nonlinearity,
laminated composite,
super-elliptic cross-section

##### 1049 Passive Control of Elliptic Jet by Using Triangular and Truncated Tabs

**Authors:**
Saif Akram,
E. Rathakrishnan

**Abstract:**

**Keywords:**
elliptic jet,
tabs,
truncated,
triangular

##### 1048 The Application of Variable Coefficient Jacobian elliptic Function Method to Differential-Difference Equations

**Authors:**
Chao-Qing Dai

**Abstract:**

**Keywords:**
discrete sine-Gordon equation,
variable coefficient Jacobian elliptic function method,
exact solutions,
equation

##### 1047 Efficient Internal Generator Based on Random Selection of an Elliptic Curve

**Authors:**
Mustapha Benssalah,
Mustapha Djeddou,
Karim Drouiche

**Abstract:**

**Keywords:**
PRNG,
security,
cryptosystem,
ECC