Results 11 to 20 of about 1,761 (191)
Analysis of the Fault Attack ECDLP over Prime Field [PDF]
In 2000, Biehl et al. proposed a fault-based attack on elliptic curve cryptography. In this paper, we refined the fault attack method. An elliptic curve E is defined over prime field đ˝p with base point PâE(đ˝p).
Mingqiang Wang, Tao Zhan
doaj +4 more sources
A Hardware-Accelerated ECDLP with High-Performance Modular Multiplication [PDF]
Elliptic curve cryptography (ECC) has become a popular public key cryptography standard. The security of ECC is due to the difficulty of solving the elliptic curve discrete logarithm problem (ECDLP).
Lyndon Judge +2 more
doaj +3 more sources
SPRA: Scalable policyâbased regulatory architecture for blockchain transactions
Most of the current regulatory schemes for blockchain transactions are customized for specific blockchain applications and lack generality and scalability. To address these problems, this paper proposes a scalable policyâbased layered blockchain transaction regulation architecture (SPRA), and also designs a regulatory policy description language (XRPL)
Chuntang Yu +3 more
wiley +1 more source
A Lightweight ThreeâParty Mutual Authentication Protocol for Internet of Health Things Systems
In Internet of Health Things (IoHT) systems, there is a twoâhop network structure between the authentication server TA, Internet of Things Connector (IotC), and wearable sensor (WS). Attackers can use the sensor layer network (the first hop) between the IotC and WS to steal patientâs healthârelated information and undermine the security of the system ...
Zhihui Wang +6 more
wiley +1 more source
With the development of wireless technology, people increasingly rely on mobile devices. Since most mobile devices transmit sensitive information via insecure public channels, it is important to design multiauthentication key agreement protocols for security protection.
Xiang Xu +4 more
wiley +1 more source
With the advancement in information and communication technology (ICT), secure farmâtoâhome communication has become an emerging concept. Food is the most basic essential commodity for the survival of human beings which is produced by farmers. However, because of the presence of intermediaries, farmers/producers do not make a sufficient profit and also
Arun Sekar Rajasekaran +3 more
wiley +1 more source
At the moment, digital documents are just as important as paper documents. As a result, authenticity is essential, especially in legal situations and digital forensics. As technology advances, these digital signature algorithms become weaker, necessitating the development of digital authentication schemes capable of withstanding current security ...
Gauri Shankar +8 more
wiley +1 more source
This paper proposes a blockchainâbased identity authentication (BA) scheme for IoT devices to solve the authentication security problem of IoT devices. The BA scheme uses hashing and digital signature algorithms to achieve integrity and nonrepudiation of authentication messages.
Lei Wang +3 more
wiley +1 more source
Efficient Secure Computation from SM Series Cryptography
The wireless network suffers from many security problems, and computation in a wireless network environment may fail to preserve privacy as well as correctness when the adversaries conduct attacks through backdoors, steganography, kleptography, etc. Secure computation ensures the execution security in such an environment, and compared with computation ...
Yibiao Lu +4 more
wiley +1 more source
An Efficient Double Parameter Elliptic Curve Digital Signature Algorithm for Blockchain
The classic Elliptic curve digital Signature Algorithm (ECDSA) uses one inversion operation in the process of signature and verification, which greatly reduces the efficiency of digital signatures.
Shuang-Gen Liu, Wan-Qi Chen, Jia-Lu Liu
doaj +1 more source

