Results 11 to 20 of about 55,338 (230)
Advanced collision-based single trace attacks which can be applied on simple power analysis resistant scalar multiplications become virtual threat on elliptic curve cryptosystems recently as their practical experimental results are increasingly reported ...
Sangyub Lee +3 more
doaj +1 more source
HARDWARE SUPPORT PROCEDURES FOR ASYMMETRIC AUTHENTICATION OF THE INTERNET OF THINGS
Subject of research: procedures of asymmetric authentication of Internet of Things nodes to ensure the highest level of security using cryptographic chips.
Петро Сергійович Клімушин +5 more
doaj +1 more source
Digital Signature Based on Quantum Key Exchange Algorithm [PDF]
Digital signatures are growing in importance as a legal standing with traditional handwritten signatures, most secure web transactions today are already dependent on digital signatures, which are included as part of the digital certificates a server ...
Samer Saeed Essa
doaj +1 more source
Adaptable Cryptographic Primitives in Blockchains via Smart Contracts
Blockchain-based platforms utilise cryptographic protocols to enforce the correct behaviour of users, as well as to guarantee a sufficient level of protection against malicious adversaries.
Riccardo Longo +4 more
doaj +1 more source
An e-voting system for Android Smartphones
Electoral processes using electronic devices allow voters to cast electronically. Devices such as personal computers, Direct Record Machines (DRE) voting machines, and smartcards, among others, in conjunction with private nets or the Internet have been ...
Lourdes López García +3 more
doaj +1 more source
New number-theoretic cryptographic primitives
This paper introduces new prq-based one-way functions and companion signature schemes. The new signature schemes are interesting because they do not belong to the two common design blueprints, which are the inversion of a trapdoor permutation and the ...
Brier Éric +3 more
doaj +1 more source
The fast growth in Internet‐of‐Things (IoT) applications has increased the number of end‐devices communicating over the Internet. As these resource‐constrained devices are connected over the Internet, they are exposed to various security and privacy ...
Vidya Rao, Prema K. V.
doaj +1 more source
The paper discusses possibilities for use of message authentication signatures schemes based on error-correcting coding which may be candidates for use in post-quantum cryptography.
Aleksandr Aleksandrovich Kuznetsov +2 more
doaj
An Enhanced Threshold RSA-Based Aggregate Signature Scheme to Reduce Blockchain Size
The transformative potential of blockchain technology has resulted in its widespread adoption, bringing about numerous advantages such as enhanced data integrity, transparency, and decentralization.
Khaled Chait +5 more
doaj +1 more source
Orthogonal Latin square theory based group and batch verification for digital signatures
In order to solve the problem of fast security verification of massive and time-intensive messages on a central node in situational awareness networks, orthogonal Latin square theory based scheme was considered.Considering efficiency promotion of ...
Hong WANG +3 more
doaj +2 more sources

