X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (1617) 1617
Conference Proceeding (1032) 1032
Dissertation (165) 165
Publication (77) 77
Book Chapter (68) 68
Book / eBook (18) 18
Magazine Article (1) 1
Reference (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
elliptic curve cryptography (1200) 1200
cryptography (716) 716
elliptic curves (645) 645
elliptic curve cryptosystem (500) 500
security (418) 418
engineering, electrical & electronic (375) 375
elliptic curve (347) 347
computer science (327) 327
computer science, theory & methods (319) 319
computer science, information systems (298) 298
public key cryptography (284) 284
algorithms (282) 282
authentication (264) 264
elliptic curve cryptosystems (248) 248
encryption (238) 238
hardware (228) 228
computer science, hardware & architecture (211) 211
scalar multiplication (197) 197
telecommunications (184) 184
mathematics, applied (169) 169
galois fields (163) 163
multiplication (156) 156
mathematics (151) 151
data encryption (149) 149
public key (147) 147
algorithm design and analysis (145) 145
computer communication networks (139) 139
digital signatures (138) 138
analysis (135) 135
cryptosystems (129) 129
protocols (129) 129
polynomials (128) 128
computation (118) 118
field programmable gate arrays (112) 112
elliptic-curves (109) 109
wireless sensor networks (107) 107
arithmetic (104) 104
computer science, software engineering (104) 104
communications engineering, networks (102) 102
elliptic functions (102) 102
information security (102) 102
privacy (100) 100
smart cards (99) 99
computer architecture (98) 98
ecc (95) 95
kryptographie (94) 94
verschlüsselung (87) 87
protocol (86) 86
data security (85) 85
engineering (85) 85
computer information security (84) 84
cryptanalysis (84) 84
digital signature (83) 83
curves (78) 78
scheme (77) 77
efficient (76) 76
algorithm (75) 75
computer security (75) 75
fpga (75) 75
橢圓曲線密碼系統 (75) 75
mathematical analysis (74) 74
data structures, cryptology and information theory (73) 73
coding and information theory (69) 69
equations (69) 69
computational efficiency (67) 67
rsa (67) 67
computer systems (66) 66
internet (66) 66
cryptosystem (64) 64
key agreement (64) 64
combinatorics (63) 63
networks (61) 61
servers (61) 61
mutual authentication (59) 59
access control (58) 58
discrete logarithm problem (58) 58
楕円 (57) 57
computer network protocols (56) 56
cryptography and security (56) 56
smart card (56) 56
wireless networks (56) 56
finite field (55) 55
methods (55) 55
side channel attacks (55) 55
usage (55) 55
curves, elliptic (54) 54
discrete logarithm (54) 54
identity-based encryption (54) 54
implementation (54) 54
research (53) 53
gf (52) 52
曲線 (51) 51
educational institutions (50) 50
logarithms (50) 50
scalars (49) 49
authentifizierung (47) 47
cryptographic protocols (47) 47
energy consumption (47) 47
public key cryptosystem (47) 47
public key infrastructure (47) 47
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Gerstein Science - Stacks (4) 4
Mathematical Sciences - Stacks (4) 4
Collection Dvlpm't (Acquisitions) - Vendor file (3) 3
Engineering & Comp. Sci. - Stacks (3) 3
UofT at Mississauga - Stacks (3) 3
Mathematical Sciences - Missing (2) 2
Collection Dvlpm't (Acquisitions) - Closed Orders (1) 1
Online Resources - Online (1) 1
UofT at Scarborough - Stacks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (2503) 2503
Japanese (113) 113
Chinese (93) 93
Korean (10) 10
Portuguese (3) 3
Czech (2) 2
Russian (2) 2
French (1) 1
German (1) 1
Lithuanian (1) 1
Spanish (1) 1
Turkish (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


IEEE Transactions on Very Large Scale Integration (VLSI) Systems, ISSN 1063-8210, 11/2015, Volume 23, Issue 11, pp. 2753 - 2756
Journal Article
Microprocessors and Microsystems, ISSN 0141-9331, 08/2016, Volume 45, pp. 10 - 22
Journal Article
International Journal of Nonlinear Analysis and Applications, 06/2018, Volume 9, Issue 1, pp. 161 - 174
Journal Article
Information Sciences, ISSN 0020-0255, 11/2012, Volume 209, pp. 80 - 92
In a key management scheme for hierarchy based access control, each security class having higher clearance can derive the cryptographic secret keys of its... 
Hierarchical access control | Key management | Elliptic curve | Security | Polynomial interpolation | Exterior root finding attacks | KEY-MANAGEMENT SCHEME | COMPUTER SCIENCE, INFORMATION SYSTEMS | ASSIGNMENT SCHEME | Algorithms | Access control | Hierarchies | Roots | Remedies | Clearances | Management | Computer information security
Journal Article
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, ISSN 1063-8210, 09/2005, Volume 13, Issue 9, pp. 1048 - 1059
Journal Article
International Journal of Distributed Sensor Networks, ISSN 1550-1477, 10/2019, Volume 15, Issue 10, p. 155014771987904
Recently, cyber-physical system is widely used for smart system control in various fields. Various functions of the cyber-physical system must overcome the... 
elliptic curve | security | SCALAR MULTIPLICATION | ARCHITECTURE | COMPUTER SCIENCE, INFORMATION SYSTEMS | cyber-physical system | TELECOMMUNICATIONS | Cryptography | m-folding
Journal Article
Computers & Security, ISSN 0167-4048, 2009, Volume 28, Issue 3, pp. 138 - 143
Recently, remote user authentication schemes are implemented on elliptic curve cryptosystem (ECC) to reduce the computation loads for mobile devices. However,... 
Key agreement | Mutual authentication | ID-based | Elliptic curve | Cryptosystem | PROTOCOL | COMPUTER SCIENCE, INFORMATION SYSTEMS | Computer science | Mobile devices
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2002, Volume 2442, pp. 354 - 369
We describe fast new algorithms to implement recent cryptosystems based on the Tate pairing. In particular, our techniques improve pairing evaluation speed by... 
FINITE-FIELD | ELLIPTIC CURVE CRYPTOSYSTEMS | COMPUTER SCIENCE, THEORY & METHODS | LOGARITHMS
Conference Proceeding
Security and Communication Networks, ISSN 1939-0114, 12/2016, Volume 9, Issue 18, pp. 5363 - 5375
Elliptic curve cryptography is used as a public‐key cryptosystem for encryption and decryption in such a way that if one has to encrypt a message, then they... 
security analysis | elliptic curve | encryption | public key cryptosystem | message mapping | decryption | elliptic curve cryptography | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | Cryptography | Investment analysis | Analysis | Computer systems | Messages | Algorithms | Robustness | Mapping | Encryption | Guidelines
Journal Article
Journal of Applied Mathematics and Computing, ISSN 1598-5865, 10/2019, Volume 61, Issue 1, pp. 431 - 450
The elliptic curve cryptography plays a central role in various cryptographic schemes and protocols. For efficiency reasons, Edwards curves and twisted Edwards... 
KMOV cryptosystem | Computational Mathematics and Numerical Analysis | Elliptic curves | Mathematics of Computing | Twisted Edwards curves | Mathematical and Computational Engineering | RSA cryptosystem | Mathematics | Theory of Computation | 94A60 | MATHEMATICS | MATHEMATICS, APPLIED | Cryptography | Curves
Journal Article
Journal of Mathematical Cryptology, ISSN 1862-2976, 09/2014, Volume 8, Issue 3, pp. 209 - 247
We present new candidates for quantum-resistant public-key cryptosystems based on the conjectured difficulty of finding isogenies between supersingular... 
14K02 | Elliptic curves | 14G50 | 11Y16 | 94A60 | quantum-resistant cryptosystems | isogenies | Usage | Ellipse | Curves, Elliptic | Analysis | Public key encryption | Data encryption | Algorithms | Network security | Computer systems | Asymptotic properties | Mathematical analysis | Security | Cryptography | Torsion | Optimization | Rings (mathematics)
Journal Article
IEEE Access, ISSN 2169-3536, 2018, Volume 6, pp. 70025 - 70034
With the increasing use of media in communications, the content security of digital images attracts much attention in both the academia and the industry.... 
Image encryption | big integer | elliptic curve cryptosystem (ECC) | Elliptic curves | Digital images | Elliptic curve cryptography | Encryption | chaotic system | HYPER-CHAOTIC SYSTEM | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | COMBINATION | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
The Journal of Systems & Software, ISSN 0164-1212, 2011, Volume 84, Issue 11, pp. 1892 - 1898
Journal Article
IEEE Transactions on Computers, ISSN 0018-9340, 05/2019, Volume 68, Issue 5, pp. 688 - 701
Journal Article
Chinese Physics B, ISSN 1674-1056, 03/2018, Volume 27, Issue 3, p. 30502
We propose a new fractional two-dimensional triangle function combination discrete chaotic map (2D-TFCDM) with the discrete fractional difference. Moreover,... 
Menezes-Vanstone elliptic curve cryptosystem | chaos | image encryption | fractional two-dimensional triangle function combination discrete chaotic map | SYNCHRONIZATION | PHYSICS, MULTIDISCIPLINARY | PERMUTATION
Journal Article
The Journal of Systems & Software, ISSN 0164-1212, 2010, Volume 83, Issue 10, pp. 1917 - 1929
The elliptic curve cryptosystem (ECC) has recently received significant attention by researchers due to its high performance, low computational cost, and small... 
Access control | Key management | Elliptic curve cryptosystems | Security | User hierarchy | COMPUTER SCIENCE, SOFTWARE ENGINEERING | MANAGEMENT SCHEME | ASSIGNMENT SCHEME | COMPUTER SCIENCE, THEORY & METHODS | ASSIGNING CRYPTOGRAPHIC KEYS | Hierarchies | Dynamics | Keys | Derivation | Computational efficiency | Dynamical systems | Complexity | Computer programs
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.