Lightweight Authentication Mechanism for Industrial IoT Environment Combining Elliptic Curve Cryptography and Trusted Token. [PDF]
Yang YS+5 more
europepmc +1 more source
Phase-Image-Encryption-Based Elliptic Curve and Double-Random-Phase Encoding
In this paper, we proposed an enhanced asymmetric cryptosystem scheme for image encryption using a combination of Elliptic Curve and Fourier transformations. Our proposed encryption and decryption process is highly secure with a smaller key size compared
Arabind Kumar, Sanjay Yadav, Tarul Garg
doaj +1 more source
An elementary proof of the Riemann hypothesis for an elliptic curve over a finite field [PDF]
Horst G. Zimmer
openalex +1 more source
Authenticated Public Key Elliptic Curve Based on Deep Convolutional Neural Network for Cybersecurity Image Encryption Application. [PDF]
Hagras EAA+3 more
europepmc +1 more source
On the conductor of an elliptic curve with a rational point of order 2 [PDF]
Toshihiro Hadano
openalex +1 more source
Elliptic Curve-Based Query Authentication Protocol for IoT Devices Aided by Blockchain. [PDF]
Nita SL, Mihailescu MI.
europepmc +1 more source
The non-existence of elliptic curves with everywhere good reduction over certain imaginary quadratic fields [PDF]
Hidenori ISHII
openalex +1 more source
FPGA Implementation for Elliptic Curve Cryptography Algorithm and Circuit with High Efficiency and Low Delay for IoT Applications. [PDF]
Wang D, Lin Y, Hu J, Zhang C, Zhong Q.
europepmc +1 more source
Two-Descent for Elliptic Curves in Characteristic Two [PDF]
Kenneth Kramer
openalex +1 more source
Correction: Cryptanalysis and improvement of an elliptic curve based signcryption scheme for firewalls. [PDF]
Bashir MZU, Ali R.
europepmc +1 more source