Results 311 to 320 of about 2,214,189 (355)
Some of the next articles are maybe not open access.
2020
Elliptic-curve cryptography (ECC) represents a public-key cryptography approach. It is based on the algebraic structure of elliptic curves over finite fields. ECC can be used in cryptography applications and primitives, such as key agreement, digital signature, and pseudo-random generators.
Marius Iulian Mihailescu+1 more
openaire +2 more sources
Elliptic-curve cryptography (ECC) represents a public-key cryptography approach. It is based on the algebraic structure of elliptic curves over finite fields. ECC can be used in cryptography applications and primitives, such as key agreement, digital signature, and pseudo-random generators.
Marius Iulian Mihailescu+1 more
openaire +2 more sources
RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography
China Communications, 2017In visual cryptography, many shares are generated which are illogical containing certain message within themselves. When all shares are piled jointly, they tend to expose the secret of the image. The notion of visual secret sharing scheme is to encrypt a
K. Shankar, P. Eswaran
semanticscholar +1 more source
An Efficient Elliptic Curve Cryptography Signature Server With GPU Acceleration
IEEE Transactions on Information Forensics and Security, 2017Over the Internet, digital signature has been an indispensable approach to securing e-commerce and other online transactions requiring authentication. Concerning the computing costs of signature generation and verification, it has become a more and more ...
Wuqiong Pan+4 more
semanticscholar +1 more source
High-performance elliptic curve cryptography processor over NIST prime fields
IET Computers & Digital Techniques, 2017This study presents a description of an efficient hardware implementation of an elliptic curve cryptography processor (ECP) for modern security applications. A high-performance elliptic curve scalar multiplication (ECSM), which is the key operation of an
Md. Selim Hossain+3 more
semanticscholar +1 more source
Cyber and Information Security Research Conference, 2017
Elliptic curve cryptography (ECC) is a relatively newer form of public key cryptography that provides more security per bit than other forms of cryptography still being used today.
Russell Harkanson, Yoohwan Kim
semanticscholar +1 more source
Elliptic curve cryptography (ECC) is a relatively newer form of public key cryptography that provides more security per bit than other forms of cryptography still being used today.
Russell Harkanson, Yoohwan Kim
semanticscholar +1 more source
IEEE International Conference on Microwaves, Communications, Antennas and Electronic Systems, 2017
In the public key cryptography infrastructure of electronic commerce (E-commerce), use of the Rivest, Shamir, and Adleman (RSA) algorithm is very common. Due to the security requirements, the necessary key size of RSA is increasing exponentially. Because
Javed Shaikh+3 more
semanticscholar +1 more source
In the public key cryptography infrastructure of electronic commerce (E-commerce), use of the Rivest, Shamir, and Adleman (RSA) algorithm is very common. Due to the security requirements, the necessary key size of RSA is increasing exponentially. Because
Javed Shaikh+3 more
semanticscholar +1 more source
IEEE Transactions on Information Forensics and Security, 2016
In this paper, we introduce a highly optimized software implementation of standards-compliant elliptic curve cryptography (ECC) for wireless sensor nodes equipped with an 8-bit AVR microcontroller.
Zhe Liu+3 more
semanticscholar +1 more source
In this paper, we introduce a highly optimized software implementation of standards-compliant elliptic curve cryptography (ECC) for wireless sensor nodes equipped with an 8-bit AVR microcontroller.
Zhe Liu+3 more
semanticscholar +1 more source
IEEE Internet of Things Journal, 2015
Advances in information and communication technologies have led to the emergence of Internet of Things (IoT). In the healthcare environment, the use of IoT technologies brings convenience to physicians and patients as they can be applied to various ...
De-biao He, S. Zeadally
semanticscholar +1 more source
Advances in information and communication technologies have led to the emergence of Internet of Things (IoT). In the healthcare environment, the use of IoT technologies brings convenience to physicians and patients as they can be applied to various ...
De-biao He, S. Zeadally
semanticscholar +1 more source
Scalable Elliptic Curve Cryptosystem FPGA Processor for NIST Prime Curves
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2015The architecture and the implementation of a high-performance scalable elliptic curve cryptography processor (ECP) are presented. The proposed ECP is able to support all five prime field elliptic curves recommended by the National Institute of Standards ...
K. C. C. Loi, S. Ko
semanticscholar +1 more source
Computers & Graphics, 1994
Abstract The escape time behavior of a function associated with elliptic curves is studied via Julia sets and composite Mandelbrot sets. The Mandelbrot sets are composite in the sense that two critical points are followed.
Clifford A. Reiter+2 more
openaire +2 more sources
Abstract The escape time behavior of a function associated with elliptic curves is studied via Julia sets and composite Mandelbrot sets. The Mandelbrot sets are composite in the sense that two critical points are followed.
Clifford A. Reiter+2 more
openaire +2 more sources