Printer Friendly

Methods of encryption keys: example of elliptic curve.

[TEXT NOT REPRODUCIBLE IN ASCII]

References

[1.] A. Chillali, Ellipic curve over ring, International Mathematical Forum, Vol. 6, No. 31, 1501-1505, 2011.

[2.] K. Akiyama and A. Goto, A Public-key Cryptosystem using Algebraic Surfaces: Extended Abstract, PQCrypto Workshop Record, 2006.

[3.] K. Akiyama and A. Goto, An improvement of the algebric surface Public-key Cryptosystem, Proceedings of SCIS, 2008.

[4.] V. Miller, Use of elliptic curves in cryptography in Advances in cryptography-CRYPTO 85, Lecture Notes In Computer Science Springer-Verlag, vol. 218,, 417-426. 1989.

[5.] N. Koblitz, Elliptic Curve Cryptosystems, Mathematics of Computation, Vol 48, 203-209, 1987.

Chillali Abdelhakim * M'hammed Boulagouaz

Department of Mathematics and Computer, Faculty of Science, FST, Fez, Morocco.

E-mail: Chil2015@yahoo.fr

COPYRIGHT 2013 Modern Science Publishers
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2013 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Author:Abdelhakim, Chillali; Boulagouaz, M'hammed
Publication:Journal of Communications and Computer Engineering
Article Type:Report
Date:Jan 1, 2013
Words:114
Next Article:Building and evaluating an adaptive smart web page.
Topics:

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters |