-
1por Xiaorong Ren, Manna Gu, Xiangyu Zeng, Rui Sun, Yuqin Zhang, Zijun Zhan, Lianmeng Li, Dawei Li, Hong Ma, Chuanfu Cheng, Chunxiang Liu“... on elliptic curves was proposed to generate the dual-channel focused vector beams (FVBs). Each set...”
Publicado 2021
Enlace del recurso
article -
2
-
3por Muhammad Ramzan, Tariq Shah, Mohammad Mazyad Hazzazi, Amer Aljaedi, Adel R. AlharbiMaterias: “...Elliptic curves...”
Publicado 2021
Enlace del recurso
article -
4por Muhammad Rashid, Mohammad Mazyad Hazzazi, Sikandar Zulqarnain Khan, Adel R. Alharbi, Asher Sajid, Amer AljaediMaterias: “...elliptic-curve cryptography...”
Publicado 2021
Enlace del recurso
article -
5
-
6“... the security perspective, the concept of Elliptic-Curve Cryptography (ECC) is taken into consideration. So...”
Enlace del recurso
article -
7“... preparation between the Hessburg-Barron and Hanna punch and trephine systems by using elliptical curve fitting...”
Enlace del recurso
article -
8
-
9“... processed by the inversion of the Horizontal to Vertical Spectral Ratio (HVSR) technique of the ellipticity...”
Enlace del recurso
article -
10
-
11
-
12por LICANIC,SERGIO“... holomorphic foliation in CP² with a dicritical compact elliptic curve has rational first integral...”
Publicado 2005
Enlace del recurso
-
13“... (SECCESPP) in which scalar multiplication of elliptic curves is used to replace inefficient bilinear pairing...”
Enlace del recurso
article -
14“... (SECCESPP) in which scalar multiplication of elliptic curves is used to replace inefficient bilinear pairing...”
Enlace del recurso
article -
15“...-dimension 2 defect operators and eigenvalues to co-dimension 4 Wilson surfaces wrapping the elliptic curve...”
Enlace del recurso
article -
16“... operation over elliptic curves. Due to the heavy computational cost of a pairing, the pairing based schemes...”
Enlace del recurso
article -
17“.... The proposed mechanism can resist a variety of attacks and is computationally lighter than the elliptic curve...”
Enlace del recurso
article -
18“... signature cryptography algorithm (elliptic curve and signcryption). Lastly, we compared the proposed...”
Enlace del recurso
article -
19por Junaid Hassan, Danish Shehzad, Insaf Ullah, Fahad Algarni, Muhammad Umar Aftab, Muhammad Asghar Khan, M. Irfan Uddin“... schemes based on expensive bilinear pairing and elliptic curve techniques. The proposed scheme shows...”
Publicado 2021
Enlace del recurso
article -
20“... signature cryptography algorithm (elliptic curve and signcryption). Lastly, we compared the proposed...”
Enlace del recurso
article