Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Recent progress on the elliptic curve discrete logarithm problem
Recent progress on the elliptic curve discrete logarithm problem | Designs, Codes and
Cryptography Skip to main content SpringerLink Account Menu Find a journal Publish with us …
Cryptography Skip to main content SpringerLink Account Menu Find a journal Publish with us …
Flexible architectures for cryptographic algorithms—A systematic literature review
Symmetric and asymmetric cryptographic algorithms are used for a secure transmission of
data over an unsecured public channel. In order to use these algorithms in real-time …
data over an unsecured public channel. In order to use these algorithms in real-time …
Elliptic curve lightweight cryptography: A survey
CA Lara-Nino, A Diaz-Perez… - Ieee …, 2018 - ieeexplore.ieee.org
Since it was invented in 1986, elliptic curve cryptography (ECC) has been studied widely in
industry and academy from different perspectives. Some of these aspects include …
industry and academy from different perspectives. Some of these aspects include …
Lightweight elliptic curve cryptography accelerator for internet of things applications
Authentication, encryption, signatures, and key agreements are public key cryptography
(PKC) services required in certain Internet of Things (IoT) applications (such as healthcare …
(PKC) services required in certain Internet of Things (IoT) applications (such as healthcare …
Huff's model for elliptic curves
This paper revisits a model for elliptic curves over ℚ introduced by Huff in 1948 to study a
diophantine problem. Huff's model readily extends over fields of odd characteristic. Every …
diophantine problem. Huff's model readily extends over fields of odd characteristic. Every …
Online template attacks
Template attacks are a special kind of side-channel attacks that work in two stages. In a first
stage, the attacker builds up a database of template traces collected from a device which is …
stage, the attacker builds up a database of template traces collected from a device which is …
Efficient arithmetic on Hessian curves
This paper considers a generalized form for Hessian curves. The family of generalized
Hessian curves covers more isomorphism classes of elliptic curves. Over a finite field F_q, it …
Hessian curves covers more isomorphism classes of elliptic curves. Over a finite field F_q, it …
Efficient FPGA implementations of point multiplication on binary Edwards and generalized Hessian curves using Gaussian normal basis
R Azarderakhsh… - IEEE Transactions on Very …, 2011 - ieeexplore.ieee.org
Efficient implementation of point multiplication is crucial for elliptic curve cryptographic
systems. This paper presents the implementation results of an elliptic curve crypto-processor …
systems. This paper presents the implementation results of an elliptic curve crypto-processor …
Architectural review of polynomial bases finite field multipliers over GF(2m)
In elliptic curve cryptography (ECC), hardware architectures of finite field (FF) multipliers are
frequently proposed for polynomial as well as for normal bases representations over GF (2 …
frequently proposed for polynomial as well as for normal bases representations over GF (2 …
ACryp-Proc: Flexible asymmetric crypto processor for point multiplication
Flexibility is one of the driving agents for 5G architecture development to incorporate
enhanced mobile broad band, machine type communication (MTC), and ultra-reliable MTC …
enhanced mobile broad band, machine type communication (MTC), and ultra-reliable MTC …