Results 41 to 50 of about 1,761 (191)

Quantum attacks on Bitcoin, and how to protect against them [PDF]

open access: yes, 2017
The key cryptographic protocols used to secure the internet and financial transactions of today are all susceptible to attack by the development of a sufficiently large quantum computer.
Aggarwal, Divesh   +4 more
core   +3 more sources

I2PA : An Efficient ABC for IoT [PDF]

open access: yes, 2019
Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preserving and lightweight cryptography.
Ciss, Abdoul Aziz   +2 more
core   +3 more sources

A Las Vegas algorithm to solve the elliptic curve discrete logarithm problem [PDF]

open access: yes, 2018
In this paper, we describe a new Las Vegas algorithm to solve the elliptic curve discrete logarithm problem. The algorithm depends on a property of the group of rational points of an elliptic curve and is thus not a generic algorithm.
Mahalanobis, Ayan, Mallick, Vivek
core   +2 more sources

Efficient and Secure Identity-based Strong Key-Insulated Signature Scheme without Pairings

open access: yesJournal of King Saud University: Computer and Information Sciences, 2021
Public Key Cryptosystem (PKC) completely relies under the assumption that user’s private key is absolutely secure. Exposure of private key may lead to disastrous situations in the communication network.
P. Vasudeva Reddy   +2 more
doaj   +1 more source

Comparative Study of Digital Signature Standards Based on Discrete Logarithm [PDF]

open access: yesJisuanji gongcheng, 2016
As Chinese state encryption administration is seeking the next generation of Digital Signature Standard(DSS),this paper analyzes and compares seven DSS listed in ISO/IEC 14888-3 and SM2 which are based on Discrete Logarithm Problem(DLP) or Elliptic Curve
FENG Zeyu,GONG Boru,ZHAO Yunlei
doaj   +1 more source

An Elliptic Curve-based Signcryption Scheme with Forward Secrecy

open access: yes, 2012
An elliptic curve-based signcryption scheme is introduced in this paper that effectively combines the functionalities of digital signature and encryption, and decreases the computational costs and communication overheads in comparison with the ...
Ali Asghar Beheshti S   +2 more
core   +2 more sources

IPChain: Blockchain-Based Security Protocol for IoT Address Management Servers in Smart Homes

open access: yesJournal of Sensor and Actuator Networks, 2022
The dynamic host configuration protocol (DHCP) servers are forms of an Internet of Things (IoT) address management server (IoTAMS) that gives network configuration settings to newly connected hosts.
Bello Musa Yakubu   +2 more
doaj   +1 more source

The order elliptic curves over finite fields of characteristic two using the Schoof algorithm [PDF]

open access: yes, 2007
The elliptic curve cryptosystem is a popular cryptosystem. Its safety depends on the difficulty of the elliptic curve discrete logarithm problem (ECDLP). From the viewpoint of ECDLP, it is very interesting to determine the order of elliptic curves.
Imura, Keigo   +2 more
core   +1 more source

Depth-Optimization of Quantum Cryptanalysis on Binary Elliptic Curves

open access: yesIEEE Access, 2023
This paper presents quantum cryptanalysis for binary elliptic curves from a time-efficient implementation perspective (i.e., reducing the circuit depth), complementing the previous research that focuses on the space-efficiency perspective (i.e., reducing
Dedy Septono Catur Putranto   +4 more
doaj   +1 more source

Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes [PDF]

open access: yes, 2012
Wireless Sensor Networks (WSNs) pose a number of unique security challenges that demand innovation in several areas including the design of cryptographic primitives and protocols.
Chu, Dalin   +4 more
core   +3 more sources

Home - About - Disclaimer - Privacy