Skip to search formSkip to main contentSkip to account menu

Elliptic curve cryptography

Known as: ECC, Elliptic curve cryptography (ECC), Elliptic-curve cryptography 
Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
The security and privacy of the tag carrier has become the bottle neck of Radio Frequency Identification (RFID) system… 
2010
2010
Wireless ad-hoc and sensor networks play a vital role in an ever-growing number of applications ranging from environmental… 
2008
2008
The increasing use of network-connected embedded devices and online transactions creates a growing demand of network security for… 
2008
2008
Aydos et al.and Mangipudi et al.proposed an ECC-based wireless authentication and key agreement protocol respectively… 
2007
2007
While symmetric-key schemes, which have been investigated extensively for sensor network security, can fulfill many security… 
2007
2007
Formalizing a mathematical theory is a necessary first step to proving the correctness of programs that refer to that theory in… 
2005
2005
We describe data path extensions for general-purpose microprocessors to accelerate the emerging public-key cryptosystem Elliptic… 
Highly Cited
2002
Highly Cited
2002
. Abstract. For speeding up elliptic curve scalar multiplication and making it secure against side-channel attacks such as timing… 
Highly Cited
2001
Highly Cited
2001
Many engineering and environmental system analyses can benefit from appropriate modeling of turbulent flow in porous media… 
2000
2000
Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. Entrust is a registered…