Results 71 to 80 of about 1,761 (191)

Comparative Analysis of Energy Costs of Asymmetric vs Symmetric Encryption-Based Security Applications

open access: yesIEEE Access, 2022
Public key algorithms are heavily used in many digital applications including key establishment schemes, secure messaging apps, and digital signature schemes in cryptocurrencies.
Basel Halak   +2 more
doaj   +1 more source

A Novel Blind Signature Based Upon ECDLP [PDF]

open access: yes, 2011
Encryption and decryption techniques protect the condentiality of information exchanged in a network whereas digital signature is electronic signing of data that provide senders authentication using its secret key and verication using its public key and
Chhotaray, Animesh Chhotaray   +1 more
core  

An Efficient Elliptic Curve Cryptography‐Based Secure Communication with Privacy Preserving for Autonomous Vehicle

open access: yesJournal of Advanced Transportation, Volume 2024, Issue 1, 2024.
Internet of Vehicles can improve driving and riding experience, provide information needs, reduce environmental pollution, and improve transportation efficiency, thereby promoting the rapid development and application of intelligent transportation. Especially through the advantages of the rapidity of information exchange and the flexibility of real ...
Jiongen Xiao   +5 more
wiley   +1 more source

An Improved GN-AK Protocol Using Double-Base Scalar Multiplication and Point Halving over Elliptic Curves

open access: yesApplied Sciences
Starting from the basic form of GN-authenticated key agreement (GN-AK), the current research proposes an improved protocol by integrating a new scalar multiplication technique based on a dual-base chain representation with bases 1/2 and 3.
Nicolae Constantinescu   +2 more
doaj   +1 more source

Topological analysis of number theory and its applications in quantum cryptography [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة
This study investigates the application of algebraic topology, in particular homology theory and persistent homology. It includes the analysis of elliptic curves and their use in cryptographic systems and cybersecurity.
Noor Kadhim, Ruaa Abd, Saja AL-Khafaji
doaj   +1 more source

Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors [PDF]

open access: yes, 2015
Resource constraints in smart devices demand an efficient cryptosystem that allows for low power and memory consumption. This has led to popularity of comparatively efficient Elliptic curve cryptog-raphy (ECC).
Malik, Yasir
core   +1 more source

Pairing Free Identity-Based Blind Signature Scheme with Message Recovery

open access: yesCryptography, 2018
With the rapid development of modern technology, personal privacy has become a critical concern in many applications. Various digitalized applications such as online voting systems and the electronic cash systems need authenticity and anonymity.
Salome James   +2 more
doaj   +1 more source

(t, n) threshold secret sharing scheme without SDC

open access: yesTongxin xuebao, 2006
By means of the intractability of ellipse curve discrete logarithm problem(ECDLP),a(t,n) secret sharing threshold scheme based on ellipse curve cryptography was proposed.Generally speaking,there are two kinds of threshold schemes: a threshold scheme with
ZHOU Fu-cai   +3 more
doaj   +2 more sources

Efficient and flexible password authenticated key agreement for Voice over Internet Protocol session initiation protocol using smart card [PDF]

open access: yes, 2013
Providing a suitable key agreement protocol for session initiation protocol is crucial to protecting the communication among the users over the open channel.
Cai, Zhihua, Tang, Shanyu, Zhang, Liping
core   +1 more source

A Method for Generating Prime Order Elliptic Curves over F(q(2c)) [PDF]

open access: yes, 2005
This paper proposes an algorithm for generating prime order elliptic curves over extension field whose extension degree is a power of 2. The proposed algorithm is based on the fact that the order of the twisted elliptic curve is able to be a prime number
Morikawa, Yoshitaka, Nogami, Yasuyuki
core   +1 more source

Home - About - Disclaimer - Privacy