Spelling suggestions: "subject:"cryptography. curves, elliptic."" "subject:"cryptography. curves, el·liptic.""
1 |
Computer architectures for cryptosystems based on hyperelliptic curves.Wollinger, Thomas. January 2001 (has links)
Thesis (M.S.)--Worcester Polytechnic Institute. / Keywords: binary field arithmetic, gcd, hardware architectures, polynomial arithmetic, cryptosystem, hyperelliptic curves. Includes bibliographical references (leaves 82-87).
|
2 |
Genus 2 curves in pairing-based cryptography and the minimal embedding fieldHitt, Laura Michelle, January 1900 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2007. / Vita. Includes bibliographical references.
|
3 |
Efficient and tamper-resilient architectures for pairing based cryptographyOzturk, Erdinc. January 2009 (has links)
Dissertation (Ph.D.)--Worcester Polytechnic Institute. / Keywords: Pairing Based Cryptography; Identity Based Cryptography; Tate Pairing; Montgomery Multiplication; Robust Codes; Fault Detection; Tamper-Resilient Architecture. Includes bibliographical references (leaves 97-104).
|
4 |
Low Power Elliptic Curve CryptographyOzturk, Erdinc. January 2004 (has links)
Thesis (M.S.) -- Worcester Polytechnic Institute. / Keywords: low power; montgomery multiplication; elliptic curve crytography; modulus scaling; unified architecture; inversion; redundant signed digit. Includes bibliographical references (p.55-59).
|
5 |
A cryptosystem based on chaotic and elliptic curve cryptography /Ho, Sun Wah. January 2005 (has links) (PDF)
Thesis (M.Phil.)--City University of Hong Kong, 2005. / "Submitted to Department of Computer Engineering and Information Technology in partial fulfillment of the requirements for the degree of Master of Philosophy" Includes bibliographical references (leaves 109-111)
|
6 |
Security enhancement on the cryptosystem based on chaotic and elliptic curve cryptography /Man, Kwan Pok. January 2006 (has links) (PDF)
Thesis (M.Phil.)--City University of Hong Kong, 2006. / "Submitted to Department of Electronic Engineering in partial fulfillment of the requirements for the degree of Master of Philosophy" Includes bibliographical references (leaves 93-97)
|
7 |
Efficient algorithms for elliptic curve cryptosystems on embedded systems.Woodbury, Adam D. January 2001 (has links)
Thesis (M.S.)--Worcester Polytechnic Institute. / Includes bibliographical references (leaves 50-54).
|
Page generated in 0.0544 seconds