𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Use of elliptic curve cryptography for multimedia encryption

✍ Scribed by Mowafi, Moad; Tawalbeh, Lo'ai; Aljoby, Walid


Book ID
120599792
Publisher
The Institution of Engineering and Technology
Year
2013
Tongue
English
Weight
1000 KB
Volume
7
Category
Article
ISSN
1751-8709

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


The State of Elliptic Curve Cryptography
✍ Neal Koblitz; Alfred Menezes; Scott Vanstone πŸ“‚ Article πŸ“… 2000 πŸ› Springer 🌐 English βš– 106 KB
Next generation security for wireless: e
✍ S.A Vanstone πŸ“‚ Article πŸ“… 2003 πŸ› Elsevier Science 🌐 English βš– 100 KB

## Scott Vanstone, from Certicom, polemicizes for elliptic curve cryptography. He advances his company's view that ECC is the next generation of public-key cryptography for wireless. Recent cryptanalytic advances have caused increased discussion about public key sizes and the security required. One

Ramanujan’s class invariants and their u
✍ Elisavet Konstantinou; Aristides Kontogeorgis πŸ“‚ Article πŸ“… 2010 πŸ› Elsevier Science 🌐 English βš– 581 KB

The Complex Multiplication (CM) method is a method frequently used for the generation of elliptic curves (ECs) over a prime field F p . The most demanding and complex step of this method is the computation of the roots of a special type of class polynomials, called Hilbert polynomials. However, ther