Open Access
Issue
BIO Web Conf.
Volume 97, 2024
Fifth International Scientific Conference of Alkafeel University (ISCKU 2024)
Article Number 00168
Number of page(s) 10
DOI https://doi.org/10.1051/bioconf/20249700168
Published online 05 April 2024
  • Yan, S.Y., 2013. Computational number theory and modern cryptography. John Wiley & Sons. [Google Scholar]
  • Szudzik, M., 2006. An elegant pairing function. In Wolfram Research (ed.) Special NKS 2006 Wolfram Science Conference (pp. 1–12). [Google Scholar]
  • Miller, V.S., 1985, August. Use of elliptic curves in cryptography. In Conference on the theory and application of cryptographic techniques (pp. 417–426). Berlin, Heidelberg: Springer Berlin Heidelberg. [Google Scholar]
  • Koblitz, N., 1987. Elliptic curve cryptosystems. Mathematics of computation, 48(177), pp.203–209. [CrossRef] [Google Scholar]
  • Zhang, P., Li, Y. and Chi, H., 2022. An elliptic curve signcryption scheme and its application. Wireless Communications and Mobile Computing, 2022. [Google Scholar]
  • Bao, J., 2022, April. Research on the security of elliptic curve cryptography. In 2022 7th International Conference on Social Sciences and Economic Development (ICSSED 2022) (pp. 984–988). Atlantis Press. [Google Scholar]
  • Szudzik, M.P., 2017. The rosenberg-strong pairing function. arXiv preprint 1706.04129. [Google Scholar]
  • Rosenberg, A.L. and Strong, H.R., 1972. Addressing arrays by shells. IBM Technical Disclosure Bulletin, 14(10), pp.3026–3028. [Google Scholar]
  • Rosenberg, A.L., 1974. Allocating storage for extendible arrays. Journal of the ACM (JACM), 21(4), pp.652–670. [CrossRef] [Google Scholar]
  • Goubin, L., Guilley, S., Fournier, J., Jauvart, D., Moreau, M., Rauzy, P. and Rondepierre, F., 2017. Nadia El Mrabet. Guide to Pairing-Based Cryptography. [Google Scholar]
  • Szudzik, M.P., 2018. Binary Proportional Pairing Functions. arXiv preprint 1809.06876. [Google Scholar]
  • Hankerson, D. and Menezes, A., 2021. Elliptic curve cryptography. In Encyclopedia of Cryptography, Security and Privacy (pp. 1–2). Berlin, Heidelberg: Springer Berlin Heidelberg. [Google Scholar]
  • Koblitz, N., Menezes, A. and Vanstone, S., 2000. The state of elliptic curve cryptography. Designs, codes and cryptography, 19, pp.173–193. [CrossRef] [Google Scholar]
  • Natanael, D. and Suryani, D., 2018. Text encryption in android chat applications using elliptical curve cryptography (ECC). Procedia Computer Science, 135, pp.283–291. [CrossRef] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.