Javascript must be enabled to continue!
Elliptic Curve Cryptography: Secure Digital Communication
View through CrossRef
The goal of this article is to explain the basic operations of elliptic curves in modular arithmetic. Knowing the principles behind elliptic curves is important for understanding the cryptographic security they provide. The widespread use of elliptic curves in cryptocurrencies and devices of the Fourth Industrial Revolution, both defining movements of our day, demonstrates its real-world significance. The target audience is early-year undergraduate students. We include appropriate formulas and figures to present elliptic curves both mathematically and geometrically. We conclude by illustrating elliptic curve applications in cryptography.
Title: Elliptic Curve Cryptography: Secure Digital Communication
Description:
The goal of this article is to explain the basic operations of elliptic curves in modular arithmetic.
Knowing the principles behind elliptic curves is important for understanding the cryptographic security they provide.
The widespread use of elliptic curves in cryptocurrencies and devices of the Fourth Industrial Revolution, both defining movements of our day, demonstrates its real-world significance.
The target audience is early-year undergraduate students.
We include appropriate formulas and figures to present elliptic curves both mathematically and geometrically.
We conclude by illustrating elliptic curve applications in cryptography.
Related Results
Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A.
Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A.
With the growing interest in cryptography --- from students and
researchers as well as from the general public --- there has been a
corresponding increase in the number of cryptogr...
A Survey about Post Quantum Cryptography Methods
A Survey about Post Quantum Cryptography Methods
Cryptography is an art of hiding the significant data or information with some other codes. It is a practice and study of securing information and communication. Thus, cryptography...
Efficient Elliptic Curve Arithmetic for Lightweight Cryptographic Schemes for IoT Applications
Efficient Elliptic Curve Arithmetic for Lightweight Cryptographic Schemes for IoT Applications
The Internet of Things’ (IoT) market is expected to grow exponentially at the global level in the coming years, due to the proliferation of more reliable and faster networks result...
Hyper Elliptical Curve Cryptography (Hecc) For Cloud
Hyper Elliptical Curve Cryptography (Hecc) For Cloud
This system provides an insight into developing a distributed system which is secure, robust and user friendly. This thesis suggests a design and implementation of a digital envelo...
Curve Shape Modification and Fairness Evaluation
Curve Shape Modification and Fairness Evaluation
A method to generate a quintic NURBS curve which passes through the given points is described. In this case, there are four more equations than there are positions of the control p...
Elliptic Curves in Cryptography
Elliptic Curves in Cryptography
In the past few years elliptic curve cryptography has moved from a fringe activity to a major challenger to the dominant RSA/DSA systems. Elliptic curves offer major advances on ol...
A Research Paper on Cryptography
A Research Paper on Cryptography
Cryptography is a fundamental aspect of modern information security, encompassing techniques for securing communication and data privacy. This abstract provides an overview of cryp...
New Encryption Using Braille Codes and Elliptic Curves
New Encryption Using Braille Codes and Elliptic Curves
This work focuses on secure communication for visually impaired individuals by integrating Braille encoding with elliptic curve cryptography. We propose a novel encryption algorith...

