Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,668,849 papers from all fields of science
Search
Sign In
Create Free Account
Elliptic curve cryptography
Known as:
ECC
, Elliptic curve cryptography (ECC)
, Elliptic-curve cryptography
Expand
Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Bitwise operation
Centre for Applied Cryptographic Research
Cipher
Comparison of cryptography libraries
Expand
Broader (1)
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2011
Review
2011
Elliptic Curve Cryptography in Constrained Environments: A Review
R. Pateriya
,
Shreeja Vasudevan
International Conference on Communication Systems…
2011
Corpus ID: 14255830
In order to provide security in constrained environments, Public Key cryptography is being used extensively. Elliptic Curve…
Expand
2010
2010
Smart Elliptic Curve Cryptography for Smart Dust
J. Großschädl
,
Matthias Hudler
,
Manuel Koschuch
,
Michael Krüger
,
Alexander Szekely
Quality of Service in Heterogeneous Wired…
2010
Corpus ID: 16571975
Wireless ad-hoc and sensor networks play a vital role in an ever-growing number of applications ranging from environmental…
Expand
2010
2010
Signcryption Schemes With Forward Secrecy Based on Elliptic Curve Cryptography
R. Mohapatra
2010
Corpus ID: 60457719
In this thesis two efficient signcryption schemes based on elliptic curve cryptosystem are proposed which can effectively combine…
Expand
2009
2009
Elliptic Curve Cryptography over the Real Number Plane
Eun-Hee Goo
,
Joonmo Kim
2009
Corpus ID: 123936200
This paper introduces an implementation method for Elliptic Curve Cryptography (ECC) over the field of real numbers. Mostly, ECC…
Expand
2007
2007
WM-ECC: an Elliptic Curve Cryptography Suite on Sensor Motes
Haodong Wang
,
Bo Sheng
,
C. C. Tan
,
Qun A. Li
2007
Corpus ID: 11724843
While symmetric-key schemes, which have been investigated extensively for sensor network security, can fulfill many security…
Expand
2007
2007
Formalized Elliptic Curve Cryptography
Joe Hurd
,
M. Gordon
2007
Corpus ID: 11565717
Formalizing a mathematical theory is a necessary first step to proving the correctness of programs that refer to that theory in…
Expand
2005
2005
Architectural Extensions for Elliptic Curve Cryptography over GF ( 2 m )
H. Eberle
,
A. Wander
,
N. Gura
,
She Sun
,
Casey Aveneue
2005
Corpus ID: 8214705
We describe data path extensions for general-purpose microprocessors to accelerate the emerging public-key cryptosystem Elliptic…
Expand
Highly Cited
2002
Highly Cited
2002
Parallel scalar multiplication on general elliptic curves over Fp hedged against Non-Differential Side-Channel Attacks
Wieland Fischer
,
Christophe Giraud
,
E. Knudsen
,
Jean-Pierre Seifert
IACR Cryptology ePrint Archive
2002
Corpus ID: 16995694
. Abstract. For speeding up elliptic curve scalar multiplication and making it secure against side-channel attacks such as timing…
Expand
Highly Cited
2001
Highly Cited
2001
On the Mathematical Description and Simulation of Turbulent Flow in a Porous Medium Formed by an Array of Elliptic Rods
Marcos H. J. Pedras
,
M. D. Lemos
2001
Corpus ID: 56421716
Many engineering and environmental system analyses can benefit from appropriate modeling of turbulent flow in porous media…
Expand
2000
2000
Elliptic Curve Cryptography Support in Entrust
R. Zuccherato
2000
Corpus ID: 18022480
Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. Entrust is a registered…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE