Results 91 to 100 of about 1,761 (191)
Digitalni potpisi u komunikaciji osiguravaju autentičnost, integritet i neporecivost - svojstva koja su u doba internetske trgovine, sklapanja ugovora na daljinu i školovanja preko interneta neizmjerno važna.
Magjarević, Vesna
core +2 more sources
Session Initiation Protocol Attacks and Challenges
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP).
Keshavarz, Hassan +2 more
core
Algorithm based on Booth's Encoding Pattern for Fast Scalar Point Multiplication for ECC in Wireless Sensor Networks [PDF]
With the rapid increase of small devices and its usage, a better suitable security providing mechanism must be incorported keeping the resource constraints of the devices in mind. Elliptic Curve Cryptography (ECC) serves the best and highly suitable for
Levaka, Ravi Teja Reddy
core
A Comparison of the Standardized Versions of ECIES [PDF]
Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures or performing key exchanges. In relation to encryption, the Elliptic Curve Integrated Encryption Scheme (ECIES) is the best known scheme based on ECC,
Gayoso Martínez, Víctor +3 more
core
Solving 94-Bit Ecdlp With 70 Computers In Parallel
Elliptic curve discrete logarithm problem(ECDLP) is one of problems on which the security of pairing-based cryptography is based. This paper considers Pollard's rho method to evaluate the security of ECDLP on Barreto-Naehrig(BN) curve that is an efficient pairing-friendly curve. Some techniques are proposed to make the rho method efficient. Especially,
Miyoshi, Shunsuke +3 more
openaire +1 more source
Smart home systems can provide health care services for people with special needs in their own homes. Briefly defined, such a smart home has special electronics to enable the remote control of automated devices specifically designed for remote health ...
Shaheena Khatoon +3 more
doaj +1 more source
Brace for impact: ECDLP challenges for quantum cryptanalysis
Precise suites of benchmarks are required to assess the progress of early fault-tolerant quantum computers at economically impactful applications such as cryptanalysis. Appropriate challenges exist for factoring but those for elliptic curve cryptography are either too sparse or inadequate for standard applications of Shor's algorithm.
Dallaire-Demers, Pierre-Luc +2 more
openaire +2 more sources
Last Fall Degree, HFE, and Weil Descent Attacks on ECDLP [PDF]
Weil descent methods have recently been applied to attack the Hidden Field Equation (HFE) public key systems and solve the elliptic curve discrete logarithm problem (ECDLP) in small characteristic. However the claims of quasi-polynomial time attacks on the HFE systems and the subexponential time algorithm for the ECDLP depend on various heuristic ...
Ming-Deh A. Huang +2 more
openaire +1 more source
Enkripsi SMS menggunakan ECC (Elliptic Curve Cryptography) [PDF]
SMS or Short Message Service is a short messaging service via mobile phone. Although it is part of the first phase of the GSM standard capabilities, SMS is still a service that is widely used by many people.
Mardianto, Eko +2 more
core
Vehicle-Infrastructure Cooperative Systems (VICS) are widely used in the safe driving and management of operating vehicles (OV). To preserve privacy and resist harmful attacks, digital certificates and signatures are used during vehicle communication ...
Jiasheng Yuan +3 more
doaj +1 more source

