Journal ArticleDOI
The elliptic scalar multiplication graph and its application in elliptic curve cryptography
Reads0
Chats0
TLDR
In this article, a new graph has been defined as a main point to design a new version of an asymmetric encryption scheme, which is formed based on the scalar multiplication operation on elliptic surfaces.Abstract:
In this work, a new graph has been defined as a main point to design a new version of an asymmetric encryption scheme. This graph is formed based on the scalar multiplication operation on elliptic ...read more
Citations
More filters
Journal ArticleDOI
Characterization of a cubic interpolation scheme dependent on two parameters and applications
TL;DR: In this paper , a characterization diagram for a family of B\'{e}zier flexible interpolation curves is presented for finding certain subspaces over which particular elliptic sub-curves are defined.
Proceedings ArticleDOI
Mersenne Weighted Graph for Increasing the Symmetric Encryption Schemes Security
TL;DR: In this paper , a new contribution has been proposed by using the Mersenne numbers, which are used to define new weighted graphs which are named by MERSenne weight graphs (MWG).
Journal ArticleDOI
Optimal Elliptic-Curve Subspaces for Applications in Double-Authenticated Requests in Mobile Distributed Data Mining
TL;DR: In this paper , the authors proposed a double-authentication method based on particular elliptic-curve systems for secure data transfer, where the computing power required to authenticate both the users and the answering entities determines the efficiency of the proposed solution.
Proceedings ArticleDOI
The Corona Graph for Symmetric Encryption Schemes
TL;DR: In this article , a special graph is defined as new concept of graph theory to design new versions of the symmetric encryption (SE) schemes, and the ciphertexts of the plaintexts on designed versions are sent to the receiver entity as the CG.
Proceedings ArticleDOI
Mersenne Weighted Graph for Increasing the Symmetric Encryption Schemes Security
TL;DR: In this paper , a new contribution has been proposed by using the Mersenne numbers, which are used to define new weighted graphs which are named by the MWG and an efficient symmetric encryption scheme using MWG has been formed.
References
More filters
BookDOI
Handbook of Graph Theory, Second Edition
TL;DR: This second edition of Handbook of Graph Theory, Second Edition is over 400 pages longer than its predecessor and incorporates 14 new sections, and is the most comprehensive single-source guide to graph theory.
Journal ArticleDOI
A hybrid chaotic system and cyclic elliptic curve for image encryption
TL;DR: An efficient hybrid image encryption scheme based on a cyclic elliptic curve and chaotic system that overcomes these disadvantages and ascertains efficacy of the proposed encryption scheme.
Journal ArticleDOI
Expander graphs based on GRH with an application to elliptic curve cryptography
TL;DR: A construction of expander graphs obtained from Cayley graphs of narrow ray class groups, whose eigenvalue bounds follow from the Generalized Riemann Hypothesis is presented, which implies that the Cayley graph of ( Z / q Z ) with respect to small prime generators is an expander.
Journal ArticleDOI
Computational problems in supersingular elliptic curve isogenies
TL;DR: In this article, the authors present an overview of supersingular isogeny cryptography and how it fits into the broad theme of post-quantum public-key crypto and give a brief tutorial of elliptic curve isogenies.
Journal ArticleDOI
New secure routing protocol with elliptic curve cryptography for military heterogeneous wireless sensor networks
TL;DR: A new secure multipath routing protocol (NSRP) for military heterogeneous wireless sensor network (MHTWSN) for secure data transmission that has achieved low communication overhead, memory requirement and energy consumption as compared with existing key management schemes.