Search Result

6149

Results Found

Relevance

Filter

Newest

Filter

Most Viewed

Filter

Most Downloaded

Filter

Most Cited

Filter

Pages Count

615

Go To Page

Search Results/Filters    

Filters

Year

Banks



Expert Group











Full-Text


مرکز اطلاعات علمی SID1
اسکوپوس
دانشگاه غیر انتفاعی مهر اروند
ریسرچگیت
strs
Author(s): 

Darweesh Kamal | Saleh Mohammad

Issue Info: 
  • Year: 

    2018
  • Volume: 

    9
  • Issue: 

    1
  • Pages: 

    161-174
Measures: 
  • Citations: 

    0
  • Views: 

    48517
  • Downloads: 

    36452
Abstract: 

ELLIPTIC CURVE cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on ELLIPTIC CURVE is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation, which allow e cient implementations of ECC. In this paper, we improve e cient algorithm for exponentiation on ELLIPTIC CURVEs de ned over Fp in terms of a ne coordinates. The algorithm computes 2n2(2n1P +Q) directly from random points P and Q on an ELLIPTIC CURVE, without computing the intermediate points. Moreover, we apply the algorithm to exponentiation on ELLIPTIC CURVEs with width{w Mutual Opposite Form (wMOF) and analyze their computational complexity. This algorithm can speed up the wMOF exponentiation of ELLIPTIC CURVEs of size 160{bit about (21. 7%) as a result of its implementation with respect to a ne coordinates.

Yearly Impact:

View 48517

Download 36452 Citation 0 Refrence 0
Author(s): 

MIRGHADRI A.R. | RAHIMI S.

Issue Info: 
  • Year: 

    2015
  • Volume: 

    3
  • Issue: 

    3 (11)
  • Pages: 

    9-17
Measures: 
  • Citations: 

    0
  • Views: 

    1657
  • Downloads: 

    467
Abstract: 

ELLIPTIC CURVE cryptography system due to the short key length and high level of security is most important encryption system for use in electronic voting. The problem with this system is a lot of computation time due to the complexity of computational operations on ELLIPTIC CURVE is over. Multiplication of ELLIPTIC CURVE cryptography system is time consuming operations that about 85% of the time spent implementing the encryption algorithm stems. Hence, we propose an optimal method to reduce the cost of providing time of multiplication operations. The proposed method improved in two main parts, the parts of the control and computing encryption algorithm, has the good performance. The result of evaluation and comparison of the proposed method with some conserned algorithms, shows that this method compared to other algorithms, is faster and very good performance.

Yearly Impact:

View 1657

Download 467 Citation 0 Refrence 0
Author(s): 

Mirghadri a. | Rahimi S. | Rahimi a.

Issue Info: 
  • Year: 

    2017
  • Volume: 

    5
  • Issue: 

    2 (18)
  • Pages: 

    67-74
Measures: 
  • Citations: 

    0
  • Views: 

    1942
  • Downloads: 

    475
Abstract: 

According to the spread of various elections and the need for safety and confidence of the voting process، electronic voting has been of considerable attention. Numerous studies show that the electronic voting system can be proved to the requirements of a voting process. One suitable method for the implementation of electronic voting can be homomorphic encryption. Homomorphic encryption method is an encryption system that is isomorphic to the operation. In this paper، using ELLIPTIC CURVE encryption، a new electronic voting protocol is provided، which can be monitored by all. The system is based on the difficulty of solving discrete logarithm problem on ELLIPTIC CURVE and provides voters and key safety. The proposed protocol was tested for 100 milion voters in a referendum in which the total number of votes was counted in the 30 seconds.

Yearly Impact:

View 1942

Download 475 Citation 0 Refrence 0
گارگاه ها آموزشی
Author(s): 

DAN Y. | ZOU X. | LIU Z.

Issue Info: 
  • Year: 

    2009
  • Volume: 

    10
  • Issue: 

    2
  • Pages: 

    301-310
Measures: 
  • Citations: 

    449
  • Views: 

    21211
  • Downloads: 

    26833
Keywords: 
Abstract: 

Yearly Impact:

View 21211

Download 26833 Citation 449 Refrence 0
Author(s): 

REZAI A. | KESHAVARZI P.

Issue Info: 
  • Year: 

    2011
  • Volume: 

    -
  • Issue: 

    -
  • Pages: 

    1323-1327
Measures: 
  • Citations: 

    466
  • Views: 

    19459
  • Downloads: 

    30210
Keywords: 
Abstract: 

Yearly Impact:

View 19459

Download 30210 Citation 466 Refrence 0
Issue Info: 
  • Year: 

    2013
  • Volume: 

    1
  • Issue: 

    2
  • Pages: 

    119-129
Measures: 
  • Citations: 

    0
  • Views: 

    112745
  • Downloads: 

    55162
Abstract: 

This paper presents a new and efficient implementation approach for the ELLIPTIC CURVE cryptosystem (ECC) based on a novel finite field multiplication in GF (2m) and an efficient scalar multiplication algorithm. This new finite field multiplication algorithm performs zero chain multiplication and required additions in only one clock cycle instead of several clock cycles. Using modified (limited number of shifts) Barrel shifter, the partial result is also shifted in one clock cycle instead of several clock cycles. Both the canonical recoding technique and the sliding window method are applied to the multiplier to reduce the average number of required clock cycles. In the scalar multiplication algorithm of the proposed implementation approach, the point addition and point doubling operations are computed in parallel. The sliding window method and the signed-digit representation are also used to reduce the average number of point operations. Based on our analysis, the computation cost (the average number of required clock cycles) is effectively reduced in both the proposed finite field multiplication algorithm and the proposed implementation approach of ECC in comparison with other ECC finite field multiplication algorithms and implementation approaches.

Yearly Impact:

View 112745

Download 55162 Citation 0 Refrence 8358
strs
Author(s): 

AHMADI H.R. | AFZALI KUSHA A.

Issue Info: 
  • Year: 

    2010
  • Volume: 

    11
  • Issue: 

    9
  • Pages: 

    724-736
Measures: 
  • Citations: 

    449
  • Views: 

    27075
  • Downloads: 

    26833
Keywords: 
Abstract: 

Yearly Impact:

View 27075

Download 26833 Citation 449 Refrence 0
Author(s): 

GROBSCHADI J. | KAMENDJE G.A.

Issue Info: 
  • Year: 

    2003
  • Volume: 

    -
  • Issue: 

    14
  • Pages: 

    455-468
Measures: 
  • Citations: 

    425
  • Views: 

    14895
  • Downloads: 

    22459
Keywords: 
Abstract: 

Yearly Impact:

View 14895

Download 22459 Citation 425 Refrence 0
Issue Info: 
  • Year: 

    2004
  • Volume: 

    -
  • Issue: 

    18
  • Pages: 

    144-144
Measures: 
  • Citations: 

    454
  • Views: 

    21681
  • Downloads: 

    27847
Keywords: 
Abstract: 

Yearly Impact:

View 21681

Download 27847 Citation 454 Refrence 0
Author(s): 

Karamali Gh.R. | Kavand e.

Issue Info: 
  • Year: 

    2017
  • Volume: 

    5
  • Issue: 

    3 (19)
  • Pages: 

    69-77
Measures: 
  • Citations: 

    0
  • Views: 

    1145
  • Downloads: 

    319
Abstract: 

Sending and receiving information confidentially has always been very important. The cryptography Plays a major role in exchanging information securely. For this purpose, several encryption algorithms are designed and implemented. Among the designed algorithms, the old RSA and Diffie-Hellman algorithms have been superseded by the ELLIPTIC CURVE encryption algorithm, due to its unique features. The proposed method has higher speed for image encryption and decryption in comparison with the current method. For this purpose, the grouping of pixels by remainder Chinese theorem has been employed. The proposed method is applicable on other data such as text, sound and video.

Yearly Impact:

View 1145

Download 319 Citation 0 Refrence 0
litScript