Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,321 papers from all fields of science
Search
Sign In
Create Free Account
Elliptic curve cryptography
Known as:
ECC
, Elliptic curve cryptography (ECC)
, Elliptic-curve cryptography
Expand
Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Bitwise operation
Centre for Applied Cryptographic Research
Cipher
Comparison of cryptography libraries
Expand
Broader (1)
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
A Lightweight RFID Authentication Protocol based on Elliptic Curve Cryptography
Ya-li Liu
,
X. Qin
,
Chao Wang
,
Bohan Li
Journal of Computers
2013
Corpus ID: 1346570
The security and privacy of the tag carrier has become the bottle neck of Radio Frequency Identification (RFID) system…
Expand
2010
2010
Smart Elliptic Curve Cryptography for Smart Dust
J. Großschädl
,
Matthias Hudler
,
Manuel Koschuch
,
Michael Krüger
,
Alexander Szekely
Quality of Service in Heterogeneous Wired…
2010
Corpus ID: 16571975
Wireless ad-hoc and sensor networks play a vital role in an ever-growing number of applications ranging from environmental…
Expand
2008
2008
Elliptic curve cryptography on embedded multicore systems
Junfeng Fan
,
K. Sakiyama
,
I. Verbauwhede
Design automation for embedded systems
2008
Corpus ID: 3816606
The increasing use of network-connected embedded devices and online transactions creates a growing demand of network security for…
Expand
2008
2008
An elliptic curve cryptography based on authentication and key agreement protocol for wireless communication
Zhi-meng Liu
2008
Corpus ID: 63897445
Aydos et al.and Mangipudi et al.proposed an ECC-based wireless authentication and key agreement protocol respectively…
Expand
2007
2007
WM-ECC: an Elliptic Curve Cryptography Suite on Sensor Motes
Haodong Wang
,
Bo Sheng
,
C. C. Tan
,
Qun A. Li
2007
Corpus ID: 11724843
While symmetric-key schemes, which have been investigated extensively for sensor network security, can fulfill many security…
Expand
2007
2007
Formalized Elliptic Curve Cryptography
Joe Hurd
,
M. Gordon
2007
Corpus ID: 11565717
Formalizing a mathematical theory is a necessary first step to proving the correctness of programs that refer to that theory in…
Expand
2005
2005
Architectural Extensions for Elliptic Curve Cryptography over GF ( 2 m )
H. Eberle
,
A. Wander
,
N. Gura
,
She Sun
,
Casey Aveneue
2005
Corpus ID: 8214705
We describe data path extensions for general-purpose microprocessors to accelerate the emerging public-key cryptosystem Elliptic…
Expand
Highly Cited
2002
Highly Cited
2002
Parallel scalar multiplication on general elliptic curves over Fp hedged against Non-Differential Side-Channel Attacks
Wieland Fischer
,
Christophe Giraud
,
E. Knudsen
,
Jean-Pierre Seifert
IACR Cryptology ePrint Archive
2002
Corpus ID: 16995694
. Abstract. For speeding up elliptic curve scalar multiplication and making it secure against side-channel attacks such as timing…
Expand
Highly Cited
2001
Highly Cited
2001
On the Mathematical Description and Simulation of Turbulent Flow in a Porous Medium Formed by an Array of Elliptic Rods
Marcos H. J. Pedras
,
M. D. Lemos
2001
Corpus ID: 56421716
Many engineering and environmental system analyses can benefit from appropriate modeling of turbulent flow in porous media…
Expand
2000
2000
Elliptic Curve Cryptography Support in Entrust
R. Zuccherato
2000
Corpus ID: 18022480
Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. Entrust is a registered…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE