Results 311 to 320 of about 2,214,189 (355)
Some of the next articles are maybe not open access.

Elliptic-Curve Cryptography

2020
Elliptic-curve cryptography (ECC) represents a public-key cryptography approach. It is based on the algebraic structure of elliptic curves over finite fields. ECC can be used in cryptography applications and primitives, such as key agreement, digital signature, and pseudo-random generators.
Marius Iulian Mihailescu   +1 more
openaire   +2 more sources

RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography

China Communications, 2017
In visual cryptography, many shares are generated which are illogical containing certain message within themselves. When all shares are piled jointly, they tend to expose the secret of the image. The notion of visual secret sharing scheme is to encrypt a
K. Shankar, P. Eswaran
semanticscholar   +1 more source

An Efficient Elliptic Curve Cryptography Signature Server With GPU Acceleration

IEEE Transactions on Information Forensics and Security, 2017
Over the Internet, digital signature has been an indispensable approach to securing e-commerce and other online transactions requiring authentication. Concerning the computing costs of signature generation and verification, it has become a more and more ...
Wuqiong Pan   +4 more
semanticscholar   +1 more source

High-performance elliptic curve cryptography processor over NIST prime fields

IET Computers & Digital Techniques, 2017
This study presents a description of an efficient hardware implementation of an elliptic curve cryptography processor (ECP) for modern security applications. A high-performance elliptic curve scalar multiplication (ECSM), which is the key operation of an
Md. Selim Hossain   +3 more
semanticscholar   +1 more source

Applications of elliptic curve cryptography: a light introduction to elliptic curves and a survey of their applications

Cyber and Information Security Research Conference, 2017
Elliptic curve cryptography (ECC) is a relatively newer form of public key cryptography that provides more security per bit than other forms of cryptography still being used today.
Russell Harkanson, Yoohwan Kim
semanticscholar   +1 more source

Analysis of standard elliptic curves for the implementation of elliptic curve cryptography in resource-constrained E-commerce applications

IEEE International Conference on Microwaves, Communications, Antennas and Electronic Systems, 2017
In the public key cryptography infrastructure of electronic commerce (E-commerce), use of the Rivest, Shamir, and Adleman (RSA) algorithm is very common. Due to the security requirements, the necessary key size of RSA is increasing exponentially. Because
Javed Shaikh   +3 more
semanticscholar   +1 more source

Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes

IEEE Transactions on Information Forensics and Security, 2016
In this paper, we introduce a highly optimized software implementation of standards-compliant elliptic curve cryptography (ECC) for wireless sensor nodes equipped with an 8-bit AVR microcontroller.
Zhe Liu   +3 more
semanticscholar   +1 more source

An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography

IEEE Internet of Things Journal, 2015
Advances in information and communication technologies have led to the emergence of Internet of Things (IoT). In the healthcare environment, the use of IoT technologies brings convenience to physicians and patients as they can be applied to various ...
De-biao He, S. Zeadally
semanticscholar   +1 more source

Scalable Elliptic Curve Cryptosystem FPGA Processor for NIST Prime Curves

IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2015
The architecture and the implementation of a high-performance scalable elliptic curve cryptography processor (ECP) are presented. The proposed ECP is able to support all five prime field elliptic curves recommended by the National Institute of Standards ...
K. C. C. Loi, S. Ko
semanticscholar   +1 more source

Chaos and elliptic curves

Computers & Graphics, 1994
Abstract The escape time behavior of a function associated with elliptic curves is studied via Julia sets and composite Mandelbrot sets. The Mandelbrot sets are composite in the sense that two critical points are followed.
Clifford A. Reiter   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy