Results 11 to 20 of about 55,338 (230)

A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure

open access: yesIEEE Access, 2020
Advanced collision-based single trace attacks which can be applied on simple power analysis resistant scalar multiplications become virtual threat on elliptic curve cryptosystems recently as their practical experimental results are increasingly reported ...
Sangyub Lee   +3 more
doaj   +1 more source

HARDWARE SUPPORT PROCEDURES FOR ASYMMETRIC AUTHENTICATION OF THE INTERNET OF THINGS

open access: yesСучасний стан наукових досліджень та технологій в промисловості, 2021
Subject of research: procedures of asymmetric authentication of Internet of Things nodes to ensure the highest level of security using cryptographic chips.
Петро Сергійович Клімушин   +5 more
doaj   +1 more source

Digital Signature Based on Quantum Key Exchange Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2015
Digital signatures are growing in importance as a legal standing with traditional handwritten signatures, most secure web transactions today are already dependent on digital signatures, which are included as part of the digital certificates a server ...
Samer Saeed Essa
doaj   +1 more source

Adaptable Cryptographic Primitives in Blockchains via Smart Contracts

open access: yesCryptography, 2022
Blockchain-based platforms utilise cryptographic protocols to enforce the correct behaviour of users, as well as to guarantee a sufficient level of protection against malicious adversaries.
Riccardo Longo   +4 more
doaj   +1 more source

An e-voting system for Android Smartphones

open access: yesRevista Facultad de Ingeniería Universidad de Antioquia, 2014
Electoral processes using electronic devices allow voters to cast electronically. Devices such as personal computers, Direct Record Machines (DRE) voting machines, and smartcards, among others, in conjunction with private nets or the Internet have been ...
Lourdes López García   +3 more
doaj   +1 more source

New number-theoretic cryptographic primitives

open access: yesJournal of Mathematical Cryptology, 2020
This paper introduces new prq-based one-way functions and companion signature schemes. The new signature schemes are interesting because they do not belong to the two common design blueprints, which are the inversion of a trapdoor permutation and the ...
Brier Éric   +3 more
doaj   +1 more source

DEC‐LADE: Dual elliptic curve‐based lightweight authentication and data encryption scheme for resource constrained smart devices

open access: yesIET Wireless Sensor Systems, 2021
The fast growth in Internet‐of‐Things (IoT) applications has increased the number of end‐devices communicating over the Internet. As these resource‐constrained devices are connected over the Internet, they are exposed to various security and privacy ...
Vidya Rao, Prema K. V.
doaj   +1 more source

Mathematical models of message authentication in the post-quantum cryptosystems based on error-correcting coding

open access: yesНаука. Инновации. Технологии, 2022
The paper discusses possibilities for use of message authentication signatures schemes based on error-correcting coding which may be candidates for use in post-quantum cryptography.
Aleksandr Aleksandrovich Kuznetsov   +2 more
doaj  

An Enhanced Threshold RSA-Based Aggregate Signature Scheme to Reduce Blockchain Size

open access: yesIEEE Access, 2023
The transformative potential of blockchain technology has resulted in its widespread adoption, bringing about numerous advantages such as enhanced data integrity, transparency, and decentralization.
Khaled Chait   +5 more
doaj   +1 more source

Orthogonal Latin square theory based group and batch verification for digital signatures

open access: yesTongxin xuebao, 2022
In order to solve the problem of fast security verification of massive and time-intensive messages on a central node in situational awareness networks, orthogonal Latin square theory based scheme was considered.Considering efficiency promotion of ...
Hong WANG   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy