scispace - formally typeset
Journal ArticleDOI

The elliptic scalar multiplication graph and its application in elliptic curve cryptography

Reads0
Chats0
TLDR
In this article, a new graph has been defined as a main point to design a new version of an asymmetric encryption scheme, which is formed based on the scalar multiplication operation on elliptic surfaces.
Abstract
In this work, a new graph has been defined as a main point to design a new version of an asymmetric encryption scheme. This graph is formed based on the scalar multiplication operation on elliptic ...

read more

Citations
More filters
Journal ArticleDOI

Characterization of a cubic interpolation scheme dependent on two parameters and applications

TL;DR: In this paper , a characterization diagram for a family of B\'{e}zier flexible interpolation curves is presented for finding certain subspaces over which particular elliptic sub-curves are defined.
Proceedings ArticleDOI

Mersenne Weighted Graph for Increasing the Symmetric Encryption Schemes Security

TL;DR: In this paper , a new contribution has been proposed by using the Mersenne numbers, which are used to define new weighted graphs which are named by MERSenne weight graphs (MWG).
Journal ArticleDOI

Optimal Elliptic-Curve Subspaces for Applications in Double-Authenticated Requests in Mobile Distributed Data Mining

TL;DR: In this paper , the authors proposed a double-authentication method based on particular elliptic-curve systems for secure data transfer, where the computing power required to authenticate both the users and the answering entities determines the efficiency of the proposed solution.
Proceedings ArticleDOI

The Corona Graph for Symmetric Encryption Schemes

TL;DR: In this article , a special graph is defined as new concept of graph theory to design new versions of the symmetric encryption (SE) schemes, and the ciphertexts of the plaintexts on designed versions are sent to the receiver entity as the CG.
Proceedings ArticleDOI

Mersenne Weighted Graph for Increasing the Symmetric Encryption Schemes Security

TL;DR: In this paper , a new contribution has been proposed by using the Mersenne numbers, which are used to define new weighted graphs which are named by the MWG and an efficient symmetric encryption scheme using MWG has been formed.
References
More filters
BookDOI

Handbook of Graph Theory, Second Edition

TL;DR: This second edition of Handbook of Graph Theory, Second Edition is over 400 pages longer than its predecessor and incorporates 14 new sections, and is the most comprehensive single-source guide to graph theory.
Journal ArticleDOI

A hybrid chaotic system and cyclic elliptic curve for image encryption

TL;DR: An efficient hybrid image encryption scheme based on a cyclic elliptic curve and chaotic system that overcomes these disadvantages and ascertains efficacy of the proposed encryption scheme.
Journal ArticleDOI

Expander graphs based on GRH with an application to elliptic curve cryptography

TL;DR: A construction of expander graphs obtained from Cayley graphs of narrow ray class groups, whose eigenvalue bounds follow from the Generalized Riemann Hypothesis is presented, which implies that the Cayley graph of ( Z / q Z ) with respect to small prime generators is an expander.
Journal ArticleDOI

Computational problems in supersingular elliptic curve isogenies

TL;DR: In this article, the authors present an overview of supersingular isogeny cryptography and how it fits into the broad theme of post-quantum public-key crypto and give a brief tutorial of elliptic curve isogenies.
Journal ArticleDOI

New secure routing protocol with elliptic curve cryptography for military heterogeneous wireless sensor networks

TL;DR: A new secure multipath routing protocol (NSRP) for military heterogeneous wireless sensor network (MHTWSN) for secure data transmission that has achieved low communication overhead, memory requirement and energy consumption as compared with existing key management schemes.
Related Papers (5)