A Study of General Attacks on Elliptic Curve Discrete Logarithm Problem Over Prime Field and Binary Field (original) (raw)

A Study of General Attacks on Elliptic Curve Discrete Logarithm Problem over Prime Field and Binary Field 2017

Ni Ni Hla, Dr. Tun Myat Aung

View PDFchevron_right

A Study of General Attacks on Elliptic Curve Discrete Logarithm Problem over Prime Field and Binary Field 2017 waset

Ni Ni Hla, Dr. Tun Myat Aung

View PDFchevron_right

Attack Experiments on Elliptic Curves of Prime and Binary Fields

Dr. Tun Myat Aung

Emerging Technologies in Data Mining and Information Security, 2018

View PDFchevron_right

Attacks on Elliptic Curve Cryptography Discrete Logarithm Problem (EC-DLP)

Jayashree Katti

IJIREEICE, 2015

View PDFchevron_right

THE DISCRETE LOG PROBLEM AND ELLIPTIC CURVE CRYPTOGRAPHY

Nolan Winkler

View PDFchevron_right

A variant of Pollard's Rho attack on elliptic curve cryptosystems

mohammed Elamrani

2014

View PDFchevron_right

A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography -Extended Abstract

Francesco Sica

Proceedings of the Second International Conference on Cryptology in India Progress in Cryptology, 2001

View PDFchevron_right

A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography

Jean-jacques Quisquater

Lecture Notes in Computer Science, 2001

View PDFchevron_right

Security Analysis of Elliptic Curve Cryptography and RSA

Dindayal Mahto

2016

View PDFchevron_right

AN APPROACH TO ELLIPTIC CURVES AND DISCRETE LOGARITHMIC PROBLEM.

IJAR Indexing

View PDFchevron_right

Elliptic Curves and their use in Cryptography

Victor Miller

1997

View PDFchevron_right

Cryptanalysis and improvement of an encryption scheme that uses elliptic curves over finite fields

malik zia

Kuwait Journal of Science, 2021

View PDFchevron_right

Elliptic Curve Cryptography and Security Protocol

vasu srungaram

GIS SCIENCE

View PDFchevron_right

A Novel And Efficient Algorithm To Enhance The Complexity Of Elliptic Curve Cryptography

Akshay Atrey

2009

View PDFchevron_right

Elliptic Curves and Cryptography

Aleksandar Jurisic

Undergraduate Texts in Mathematics, 2014

View PDFchevron_right

On Assurance of Information Security using Elliptic Curves Cryptosystems

Ion Tutanescu

Journal of Internet Technology and Secured Transaction, 2012

View PDFchevron_right

A New Signing Algorithm Based on Elliptic Curve Discrete Logarithms and Quadratic Residue Problems

Nedal tahat

2014

View PDFchevron_right

Algorithms and cryptographic protocols using elliptic curves

Jordi Pujolàs

2008

View PDFchevron_right

A New Method for Geometric Interpretation of Elliptic Curve Discrete Logarithm Problem

ANKAN PAL

IACR Cryptol. ePrint Arch., 2019

View PDFchevron_right

Implementation of Elliptic Curve Digital Signature Algorithm Using Variable Text Based Message Encryption with Message Digest

Independent IJCEROnline

View PDFchevron_right

The University of Adelaide Elliptic Curve Cryptography

Raja Ghosal

2006

View PDFchevron_right

An Application of Discrete Algorithms in Asymmetric Cryptography

Abdelhakim Chillali

View PDFchevron_right

IJERT-An Implementation Of Elliptic Curve Cryptography

IJERT Journal

International Journal of Engineering Research and Technology (IJERT), 2013

View PDFchevron_right

A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems

Louis Goubin

Lecture Notes in Computer Science, 2002

View PDFchevron_right

Primality proofs with elliptic curves: heuristics and analysis

W. Bosma

View PDFchevron_right

Finding Cryptographically Strong Elliptic Curves: A Technical Report

Robert Rolland

View PDFchevron_right

Implementation of Elliptic Curve Arithmetic Operations for Prime Field and Binary Field using java BigInteger Class

Ni Ni Hla, Dr. Tun Myat Aung

IJERT.ORG, 2017

View PDFchevron_right

A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS

Computer Science & Information Technology (CS & IT) Computer Science Conference Proceedings (CSCP)

View PDFchevron_right

Prospective Utilization of Elliptic Curve Cryptography for Security: Authentication, Encryption and Decryption

somesh dewangan

IOSR Journal of Computer Engineering, 2014

View PDFchevron_right