Results 71 to 80 of about 1,761 (191)
Public key algorithms are heavily used in many digital applications including key establishment schemes, secure messaging apps, and digital signature schemes in cryptocurrencies.
Basel Halak +2 more
doaj +1 more source
A Novel Blind Signature Based Upon ECDLP [PDF]
Encryption and decryption techniques protect the condentiality of information exchanged in a network whereas digital signature is electronic signing of data that provide senders authentication using its secret key and verication using its public key and
Chhotaray, Animesh Chhotaray +1 more
core
Internet of Vehicles can improve driving and riding experience, provide information needs, reduce environmental pollution, and improve transportation efficiency, thereby promoting the rapid development and application of intelligent transportation. Especially through the advantages of the rapidity of information exchange and the flexibility of real ...
Jiongen Xiao +5 more
wiley +1 more source
Starting from the basic form of GN-authenticated key agreement (GN-AK), the current research proposes an improved protocol by integrating a new scalar multiplication technique based on a dual-base chain representation with bases 1/2 and 3.
Nicolae Constantinescu +2 more
doaj +1 more source
Topological analysis of number theory and its applications in quantum cryptography [PDF]
This study investigates the application of algebraic topology, in particular homology theory and persistent homology. It includes the analysis of elliptic curves and their use in cryptographic systems and cybersecurity.
Noor Kadhim, Ruaa Abd, Saja AL-Khafaji
doaj +1 more source
Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors [PDF]
Resource constraints in smart devices demand an efficient cryptosystem that allows for low power and memory consumption. This has led to popularity of comparatively efficient Elliptic curve cryptog-raphy (ECC).
Malik, Yasir
core +1 more source
Pairing Free Identity-Based Blind Signature Scheme with Message Recovery
With the rapid development of modern technology, personal privacy has become a critical concern in many applications. Various digitalized applications such as online voting systems and the electronic cash systems need authenticity and anonymity.
Salome James +2 more
doaj +1 more source
(t, n) threshold secret sharing scheme without SDC
By means of the intractability of ellipse curve discrete logarithm problem(ECDLP),a(t,n) secret sharing threshold scheme based on ellipse curve cryptography was proposed.Generally speaking,there are two kinds of threshold schemes: a threshold scheme with
ZHOU Fu-cai +3 more
doaj +2 more sources
Efficient and flexible password authenticated key agreement for Voice over Internet Protocol session initiation protocol using smart card [PDF]
Providing a suitable key agreement protocol for session initiation protocol is crucial to protecting the communication among the users over the open channel.
Cai, Zhihua, Tang, Shanyu, Zhang, Liping
core +1 more source
A Method for Generating Prime Order Elliptic Curves over F(q(2c)) [PDF]
This paper proposes an algorithm for generating prime order elliptic curves over extension field whose extension degree is a power of 2. The proposed algorithm is based on the fact that the order of the twisted elliptic curve is able to be a prime number
Morikawa, Yoshitaka, Nogami, Yasuyuki
core +1 more source

