Protecting information that is being communicated between two parties overunsecured channels is of huge importance in today’s world. The use of mathematical concepts to achieve high levels of security when communicating over these unsecured platforms is cryptography. The world of cryptography is always expanding and growing. In this paper, we set out to explore the use of elliptic curves in the cryptography of today, as well as the cryptography of the future.We also offer our own original cryptosystem, CSDH. This system on its ownoffers some moderate level of security. It shares many similarities to the post-quantum, SIDH system. The parallels between these two systems can lead to a deeper understanding of the systems offered for our post-q...
In this expository thesis we study elliptic curves and their role in cryptography. In doing so we e...
This paper introduces "hyper-and-elliptic-curve cryptography", in which a single high-security group...
<p>- Cryptography is the technique of transforming an intelligible message into unintelligible forma...
In today\u27s digital age of conducting large portions of daily life over the Internet, privacy in c...
Since the earliest times, individuals and groups of individuals have been interested in communicatin...
In the year 2007, a slightly nerdy girl fell in love with all things math. Even though she only was ...
Although elliptic curves have been studied for hundreds of years, the inception of elliptic curve cr...
Cryptography is an evolving field that research into discreet mathematical equation that is represen...
Elliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of ...
We present an overview of supersingular isogeny cryptography and how it fits into the broad theme of...
In cryptography, encryption is the process of encoding messages in such a way that only authorized p...
In the recent years, the need of information security has rapidly increased due to an enormous growt...
Elliptic curves (EC) are widely studied due to their mathematical and cryptographic properties. Cryp...
This thesis is a basic overview of elliptic curves and their applications to Cryptography. We begin ...
At its core, cryptography relies on problems that are simple to construct but difficult to solve unl...
In this expository thesis we study elliptic curves and their role in cryptography. In doing so we e...
This paper introduces "hyper-and-elliptic-curve cryptography", in which a single high-security group...
<p>- Cryptography is the technique of transforming an intelligible message into unintelligible forma...
In today\u27s digital age of conducting large portions of daily life over the Internet, privacy in c...
Since the earliest times, individuals and groups of individuals have been interested in communicatin...
In the year 2007, a slightly nerdy girl fell in love with all things math. Even though she only was ...
Although elliptic curves have been studied for hundreds of years, the inception of elliptic curve cr...
Cryptography is an evolving field that research into discreet mathematical equation that is represen...
Elliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of ...
We present an overview of supersingular isogeny cryptography and how it fits into the broad theme of...
In cryptography, encryption is the process of encoding messages in such a way that only authorized p...
In the recent years, the need of information security has rapidly increased due to an enormous growt...
Elliptic curves (EC) are widely studied due to their mathematical and cryptographic properties. Cryp...
This thesis is a basic overview of elliptic curves and their applications to Cryptography. We begin ...
At its core, cryptography relies on problems that are simple to construct but difficult to solve unl...
In this expository thesis we study elliptic curves and their role in cryptography. In doing so we e...
This paper introduces "hyper-and-elliptic-curve cryptography", in which a single high-security group...
<p>- Cryptography is the technique of transforming an intelligible message into unintelligible forma...