Zobrazeno 1 - 10
of 2 588
pro vyhledávání: '"Scalar Multiplication"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 4 (2024)
Zero-knowledge proof (ZKP) is a cryptographic primitive that enables a prover to convince a verifier that a statement is true, without revealing any other information beyond the correctness of the statement itself. Due to its powerful capabilities, i
Externí odkaz:
https://doaj.org/article/531b819b7f574f3083f36b9dd3bf17f7
Publikováno v:
Micromachines, Vol 15, Iss 10, p 1238 (2024)
With the development of mobile communication, digital signatures with low latency, low area, and high security are in increasing demand. Elliptic curve cryptography (ECC) is widely used because of its security and lightweight. Elliptic curve scalar m
Externí odkaz:
https://doaj.org/article/8b3095f7fbb9463e86193c6c05db4ed2
Autor:
Said Broumi, S. Krishna Prabha
Publikováno v:
Neutrosophic Sets and Systems, Vol 58, Pp 572-595 (2023)
This paper aims to define a special case of neutrosophic matrices referred to as Fermatean neutrosophic matrices (FNMs). FNMs were introduced as generalization of Fermatean fuzzy matrices, intuitionistic fuzzy matrices, and Pythagorean neutrosophic m
Externí odkaz:
https://doaj.org/article/0f58348f32494f2981a0ebeb2a527fc8
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 2 (2024)
Multi-scalar multiplication (MSM) is an important building block in most of elliptic-curve-based zero-knowledge proof systems, such as Groth16 and PLONK. Recently, Lu et al. proposed cuZK, a new parallel MSM algorithm on GPUs. In this paper, we revis
Externí odkaz:
https://doaj.org/article/df6bfa3f19d743d79697f1d07e91d49d
Autor:
Jingqi Zhang, Zhiming Chen, Xiang He, Kuanhao Liu, Yue Hao, Mingzhi Ma, Weijiang Wang, Hua Dang, Xiangnan Li
Publikováno v:
Micromachines, Vol 15, Iss 4, p 552 (2024)
Physically unclonable functions (PUFs) are crucial for enhancing cybersecurity by providing unique, intrinsic identifiers for electronic devices, thus ensuring their authenticity and preventing unauthorized cloning. The SRAM-PUF, characterized by its
Externí odkaz:
https://doaj.org/article/8956b5004c2142f4a77d7259c6dd952c
Publikováno v:
Cryptography, Vol 8, Iss 1, p 11 (2024)
This paper is aimed at using a lookup table method to improve the scalar multiplication performance of elliptic curve cryptography. The lookup table must be divided into two polynomials and requires two iterations of point doubling operation, for whi
Externí odkaz:
https://doaj.org/article/4170d6d2e13d40b09139bb6c77932140
Autor:
Nawras H. Sabbry, Alla B. Levina
Publikováno v:
Mathematics, Vol 12, Iss 6, p 881 (2024)
Elliptic curve cryptography (ECC) is widely acknowledged as a method for implementing public key cryptography on devices with limited resources thanks to its use of small keys. A crucial and complex operation in ECC calculations is scalar point multi
Externí odkaz:
https://doaj.org/article/fa1cb82477c84db19fed1cb56fb34de6
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.