Results 11 to 20 of about 1,761 (191)

Analysis of the Fault Attack ECDLP over Prime Field [PDF]

open access: yesJournal of Applied Mathematics, 2011
In 2000, Biehl et al. proposed a fault-based attack on elliptic curve cryptography. In this paper, we refined the fault attack method. An elliptic curve E is defined over prime field 𝔽p with base point P∈E(𝔽p).
Mingqiang Wang, Tao Zhan
doaj   +4 more sources

A Hardware-Accelerated ECDLP with High-Performance Modular Multiplication [PDF]

open access: yesInternational Journal of Reconfigurable Computing, 2012
Elliptic curve cryptography (ECC) has become a popular public key cryptography standard. The security of ECC is due to the difficulty of solving the elliptic curve discrete logarithm problem (ECDLP).
Lyndon Judge   +2 more
doaj   +3 more sources

SPRA: Scalable policy‐based regulatory architecture for blockchain transactions

open access: yesIET Blockchain, Volume 3, Issue 4, Page 265-282, December 2023., 2023
Most of the current regulatory schemes for blockchain transactions are customized for specific blockchain applications and lack generality and scalability. To address these problems, this paper proposes a scalable policy‐based layered blockchain transaction regulation architecture (SPRA), and also designs a regulatory policy description language (XRPL)
Chuntang Yu   +3 more
wiley   +1 more source

A Lightweight Three‐Party Mutual Authentication Protocol for Internet of Health Things Systems

open access: yesJournal of Healthcare Engineering, Volume 2023, Issue 1, 2023., 2023
In Internet of Health Things (IoHT) systems, there is a two‐hop network structure between the authentication server TA, Internet of Things Connector (IotC), and wearable sensor (WS). Attackers can use the sensor layer network (the first hop) between the IotC and WS to steal patient’s health‐related information and undermine the security of the system ...
Zhihui Wang   +6 more
wiley   +1 more source

A Novel High‐Efficiency Password Authentication and Key Agreement Protocol for Mobile Client‐Server

open access: yesSecurity and Communication Networks, Volume 2023, Issue 1, 2023., 2023
With the development of wireless technology, people increasingly rely on mobile devices. Since most mobile devices transmit sensitive information via insecure public channels, it is important to design multiauthentication key agreement protocols for security protection.
Xiang Xu   +4 more
wiley   +1 more source

[Retracted] FHAAPS: Efficient Anonymous Authentication with Privacy Preservation Scheme for Farm‐to‐Home Communication

open access: yesSecurity and Communication Networks, Volume 2023, Issue 1, 2023., 2023
With the advancement in information and communication technology (ICT), secure farm‐to‐home communication has become an emerging concept. Food is the most basic essential commodity for the survival of human beings which is produced by farmers. However, because of the presence of intermediaries, farmers/producers do not make a sufficient profit and also
Arun Sekar Rajasekaran   +3 more
wiley   +1 more source

Improved Multisignature Scheme for Authenticity of Digital Document in Digital Forensics Using Edward‐Curve Digital Signature Algorithm

open access: yesSecurity and Communication Networks, Volume 2023, Issue 1, 2023., 2023
At the moment, digital documents are just as important as paper documents. As a result, authenticity is essential, especially in legal situations and digital forensics. As technology advances, these digital signature algorithms become weaker, necessitating the development of digital authentication schemes capable of withstanding current security ...
Gauri Shankar   +8 more
wiley   +1 more source

Analysis and Design of Identity Authentication for IoT Devices in the Blockchain Using Hashing and Digital Signature Algorithms

open access: yesInternational Journal of Distributed Sensor Networks, Volume 2023, Issue 1, 2023., 2023
This paper proposes a blockchain‐based identity authentication (BA) scheme for IoT devices to solve the authentication security problem of IoT devices. The BA scheme uses hashing and digital signature algorithms to achieve integrity and nonrepudiation of authentication messages.
Lei Wang   +3 more
wiley   +1 more source

Efficient Secure Computation from SM Series Cryptography

open access: yesWireless Communications and Mobile Computing, Volume 2023, Issue 1, 2023., 2023
The wireless network suffers from many security problems, and computation in a wireless network environment may fail to preserve privacy as well as correctness when the adversaries conduct attacks through backdoors, steganography, kleptography, etc. Secure computation ensures the execution security in such an environment, and compared with computation ...
Yibiao Lu   +4 more
wiley   +1 more source

An Efficient Double Parameter Elliptic Curve Digital Signature Algorithm for Blockchain

open access: yesIEEE Access, 2021
The classic Elliptic curve digital Signature Algorithm (ECDSA) uses one inversion operation in the process of signature and verification, which greatly reduces the efficiency of digital signatures.
Shuang-Gen Liu, Wan-Qi Chen, Jia-Lu Liu
doaj   +1 more source

Home - About - Disclaimer - Privacy