X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
computer information security (4) 4
torsion (4) 4
algorithms (3) 3
cryptography (3) 3
encryption (3) 3
logarithms (3) 3
digital signatures (2) 2
authentication (1) 1
communication system security (1) 1
computation (1) 1
computer systems (1) 1
cryptographic protocols (1) 1
digital multi-signature scheme (1) 1
elliptic curve cryptosystem (1) 1
elliptic curve discrete logarithm problem (1) 1
elliptic curves (1) 1
gain (1) 1
integrity (1) 1
keys (1) 1
mathematical analysis (1) 1
messages (1) 1
origins (1) 1
public key cryptography (1) 1
security (1) 1
signatures (1) 1
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


International Journal of Advanced Networking and Applications, ISSN 0975-0290, 09/2013, Volume 5, Issue 2, pp. 1883 - 1883
In the year 1987 Koblitz and Miller first proposed public key cryptosystems using the group of points of an elliptic curve over a finite field. The security of... 
Computation | Mathematical analysis | Logarithms | Computer information security | Torsion
Journal Article
International Journal of Computer Applications, ISSN 0975-8887, 01/2014, Volume 85, Issue 3
  Qin Yanlin and Wu Xiaoping proposed a digital signature scheme based on elliptic curve discrete logarithm problem and factoring a composite integer. They... 
Algorithms | Keys | Encryption | Logarithms | Signatures | Computer information security | Cryptography | Digital signatures
Journal Article
International Journal of Network Security, ISSN 1816-353X, 2010, Volume 11, Issue 2, pp. 118 - 120
Journal Article
International Journal of Advanced Networking and Applications, ISSN 0975-0290, 09/2013, Volume 5, Issue 2, pp. 1893 - 1893
Digital signature is an essential component in cryptography. Digital signaturesguarantee end-to-end message integrity and authentication information about the... 
Origins | Messages | Authentication | Computer information security | Cryptography | Torsion | Digital signatures | Integrity
Journal Article
International Journal of Advanced Networking and Applications, ISSN 0975-0290, 09/2013, Volume 5, Issue 2, p. 1893
  Digital signature is an essential component in cryptography. Digital signaturesguarantee end-to-end message integrity and authentication information about... 
Journal Article
International Journal of Computer Applications, ISSN 0975-8887, 01/2013, Volume 83, Issue 2
  Many identification schemes have been proposed in which security are based on the intractability of factoring or DLP (Discrete Logarithm Problem). In 2009,... 
Algorithms | Encryption | Logarithms | Computer information security | Torsion
Journal Article
International Journal of Advanced Networking and Applications, ISSN 0975-0290, 09/2013, Volume 5, Issue 2, p. 1883
  In the year 1987 Koblitz and Miller first proposed public key cryptosystems using the group of points of an elliptic curve over a finite field. The security... 
Journal Article
8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), 12/2013, pp. 524 - 527
In 1976 Diffie and Hellman gave the path breaking concept of public key cryptosystem. After that many public key cryptographic algorithms have been proposed... 
Public key cryptography | Elliptic curves | Encryption | Cryptography | Communication system security | Cryptographic protocols | Computer systems | Algorithms | Security | Torsion | Gain
Conference Proceeding
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.