فیلترها/جستجو در نتایج    

فیلترها

سال

بانک‌ها




گروه تخصصی










متن کامل


اطلاعات دوره: 
  • سال: 

    2014
  • دوره: 

    1
تعامل: 
  • بازدید: 

    183
  • دانلود: 

    0
چکیده: 

IN THIS PAPER WE PROPOSE A SECRET SHARING SCHEME BASED ON ELLIPTIC CURVES OVER UNSECURED CHANNEL. THE SECURITY OF THIS METHOD IS BASED ON HARDNESS OF DISCRETE LOGARITHM PROBLEM (DLP) OF ELLIPTIC CURVES. IN ADDITION WE USE EDWARDS CURVE BECAUSE IT PROVIDES A TIME EFFIECIENT FOR POINT ADDITION FORMULA.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 183

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0
اطلاعات دوره: 
  • سال: 

    2015
  • دوره: 

    46
تعامل: 
  • بازدید: 

    251
  • دانلود: 

    0
چکیده: 

IN CRYPTOGRAPHY, IT HAS BEEN AN IMPORTANT PROBLEM TO TRANSFORM A RANDOM VALUE IN FQ INTO A RANDOM POINT ON AN ELLIPTIC CURVE IN A DETERMINISTIC AND EFFICIENT METHOD.IN THIS PAPER WE PROPOSE A SIMPLER FORM OF SHALLUE-WOESTIJNE-ULAS ALGORITHM IN ORDER TO HASH AN ELEMENT OF FINITE FIELD TO A POINT OF AN ELLIPTIC CURVES. THIS SUBJECT CAN BE USED IN CRYPTOSYSTEMS BASED ON ELLIPTIC CURVES.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 251

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0
اطلاعات دوره: 
  • سال: 

    2014
  • دوره: 

    1
تعامل: 
  • بازدید: 

    303
  • دانلود: 

    0
چکیده: 

IN THIS PAPER WE GENERALIZE THE ALGORITHM OF CONSTRUCTING ELLIPTIC CURVE WITH A PRESCRIBED N-TORSION POINT TO THE EFFICIENTLY GENERATING AN ELLIPTIC CURVE WITH A POINT OF ORDER 2SN, WITH THE METHOD OF SUCCESSIVE HALVING. IN THIS METHOD WE SEARCH AMONG THE CURVES GENERATED WITH THE MODULAR CURVESY1 (2IN) FOR I=1,…, S-1; TO FIND THE EQUATION OF A CURVE WITH A POINT OF ORDER 2SN- WHICH IS CRYPTOGRAPHICALLY MORE EFFICIENT THAN USING Y1 (2SN).

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 303

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
نویسندگان: 

Rezaei Kashi Maryam | Bahramian Mojtaba

اطلاعات دوره: 
  • سال: 

    2023
  • دوره: 

    15
  • شماره: 

    2
  • صفحات: 

    260-273
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    0
  • دانلود: 

    0
چکیده: 

‎Oblivious transfer is one of the important tools in cryptography‎, ‎in which a sender sends a message to a receiver with a probability between 0 and 1‎, ‎while the sender remains oblivious that the receiver has received the message‎.‎A flavor of $OT$ schemes is chosen $t$-out-of-$k$ oblivious transfer ($OT^t_k$)‎. ‎In an $OT^t_k$ scheme‎, ‎a sender transfers $k$ messages to a receiver‎, ‎the receiver can learn only $t$ of them‎, ‎and the sender remains oblivious to which secrets are extracted by the receiver‎. ‎In this paper‎, ‎we first propose a type of Diffie-Hellman key exchange protocol using the generalized Jacobian of elliptic curves‎. ‎Next‎, ‎we introduce simple‎, ‎secure two-round algorithms for $OT$‎, ‎$OT^1_2$‎, ‎$OT^t_k$‎.‎The security of proposed protocols is based on the intractability assumption of solving discrete logarithm problem; furthermore‎, ‎in our $OT$ schemes‎, ‎it is not necessary to map the messages to the points on the elliptic curve‎.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 0

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
نویسنده: 

Yazdani Kashani A.M. | DAGHIGH H.

اطلاعات دوره: 
  • سال: 

    2015
  • دوره: 

    2
تعامل: 
  • بازدید: 

    129
  • دانلود: 

    0
چکیده: 

SOME ELLIPTIC CURVE CRYPTOSYSTEMS FOR INSTANCE BONEH-FRANKLIN IDENTITY BASED SCHEME [1] REQUIRE TO HASH INTO AN ELLIPTIC CURVE. IN THIS PAPER WE INTRODUCE AN EFFICIENT METHOD FOR ENCODING TO ELLIPTIC CURVES OVER FINITE FIELD AND COMPARE IT WITH ICART METHOD. THIS SUBJECT CAN BE USED IN CRYPTOSYSTEMS BASED ON ELLIPTIC CURVES.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 129

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0
نویسنده: 

Jimenez Jorge

اطلاعات دوره: 
  • سال: 

    2015
  • دوره: 

    46
تعامل: 
  • بازدید: 

    119
  • دانلود: 

    0
کلیدواژه: 
چکیده: 

AN ELLIPTIC CURVE E OVER THE RATIONALS GIVES, IN A NATURAL WAY, A FAMILY OF ELLIPTIC CURVES OVER FINITE FIELDS SIMPLY CONSIDERING THE REDUCTION EP OF THE CURVE MODULO PRIME NUMBERS. AND MANY INTERESTING QUESTION ARISES REGARDING THIS FAMILY...

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 119

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
نویسندگان: 

Goodarzi Leila | Daghigh Hassan

اطلاعات دوره: 
  • سال: 

    2026
  • دوره: 

    7
  • شماره: 

    1
  • صفحات: 

    19-31
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    4
  • دانلود: 

    0
چکیده: 

Many researchers have explored the construction of isogenies between particular elliptic curves, largely due to the extensive range of their practical applications. In this paper, we use the relationship between supersingular elliptic curves over $\mathbb{F}_{p}$ and binary quadratic forms to generate isogenies connecting supersingular elliptic curves over $\mathbb{F}_{p}$.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 4

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
نویسندگان: 

DAGHIGH H. | BAHRAMIAN M.

اطلاعات دوره: 
  • سال: 

    2009
  • دوره: 

    4
  • شماره: 

    2
  • صفحات: 

    55-64
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    293
  • دانلود: 

    0
چکیده: 

Let E be an elliptic curve over the finite field Fq, P a point in E(Fq) of order n, and Q a point in the group generated by P. The discrete logarithm problem on E is to find the number k such that Q = kP. In this paper we reduce the discrete logarithm problem on E[n] to the discrete logarithm on the group F*q , the multiplicative group of nonzero elements of Fq, in the case where n ï q - 1, using generalized jacobian of E.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 293

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
نویسندگان: 

IZADI F. | KHOSHNAM F.

اطلاعات دوره: 
  • سال: 

    2014
  • دوره: 

    8
  • شماره: 

    3
  • صفحات: 

    17-26
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    279
  • دانلود: 

    0
چکیده: 

In this article, we construct families of elliptic curves arising from the Heron triangles and Diophantine triples with the Mordell-Weil torsion subgroup of Z/2Z´Z/2Z. These families have ranks at least 2 and 3, respectively, and contain particular examples with rank equal to 7.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 279

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
نویسندگان: 

GHAMGOSAR M. | AKBARI F. | MAHDAVI M.

اطلاعات دوره: 
  • سال: 

    2007
  • دوره: 

    3
  • شماره: 

    11
  • صفحات: 

    23-36
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    363
  • دانلود: 

    0
چکیده: 

This paper provides an overview of elliptic curves and their use in cryptography. The focus of the paper is on the performance advantages obtained in the wireless environments by using elliptic curve cryptography instead of traditional cryptosystems such as RSA. Specific applications to secure messaging and identity-based encryption are also discussed.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 363

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
litScript
email sharing button
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
sharethis sharing button