Results 1 to 10 of about 44,817 (175)

Elliptic Curve Cryptography for Wireless Sensor Networks Using the Number Theoretic Transform [PDF]

open access: yesSensors, 2020
We implement elliptic curve cryptography on the MSP430 which is a commonly used microcontroller in wireless sensor network nodes. We use the number theoretic transform to perform finite field multiplication and squaring as required in elliptic curve ...
Utku Gulen, Selcuk Baktir
doaj   +3 more sources

Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems. [PDF]

open access: yesSensors (Basel), 2023
Securing critical infrastructures and manufacturing plants in the Industrial-Internet-Of-Things and Industry 4.0 is a challenge today due to the increased number of attacks against automation and SCADA systems.
Tidrea A, Korodi A, Silea I.
europepmc   +2 more sources

Practical Three-Factor Authentication Protocol Based on Elliptic Curve Cryptography for Industrial Internet of Things. [PDF]

open access: yesSensors (Basel), 2022
Because the majority of information in the industrial Internet of things (IIoT) is transmitted over an open and insecure channel, it is indispensable to design practical and secure authentication and key agreement protocols.
Zhao X, Li D, Li H.
europepmc   +2 more sources

Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET. [PDF]

open access: yesWirel Pers Commun, 2021
Numerous network can be connected by using the mobile ad hoc network. It can have security attacks like the worm hole, denial of service attack, jellyfish and also the blackhole.
Shukla M, Joshi BK, Singh U.
europepmc   +2 more sources

Attribute-Based Blind Signature Scheme Based on Elliptic Curve Cryptography

open access: yesIEEE Access, 2022
Blind signature is a special digital signature that allows the signer to sign a document without knowing its content. However, in many situations, multiple people need to blindly sign messages.
Rui Ma, Linyue Du
doaj   +2 more sources

Armed with Faster Crypto: Optimizing Elliptic Curve Cryptography for ARM Processors [PDF]

open access: yesSensors
Elliptic curve cryptography is a widely deployed technology for securing digital communication. It is the basis of many cryptographic primitives such as key agreement protocols, digital signatures, and zero-knowledge proofs.
Ruben De Smet   +4 more
doaj   +2 more sources

Design of an Elliptic Curve Cryptography Processor for RFID Tag Chips [PDF]

open access: yesSensors, 2014
Radio Frequency Identification (RFID) is an important technique for wireless sensor networks and the Internet of Things. Recently, considerable research has been performed in the combination of public key cryptography and RFID.
Zilong Liu   +4 more
doaj   +2 more sources

Secure Image Transmission Using Chaotic-Enhanced Elliptic Curve Cryptography

open access: yesIEEE Access, 2020
In this paper, a novel scheme for secure and real time image transmission is introduced. The scheme uses a block-based elliptic curve (BBEC) public key encryption as a first stage of encryption so it solves the key distribution and management problem of ...
Roayat Ismail Abdelfatah
doaj   +2 more sources

SE-Enc: A Secure and Efficient Encoding Scheme Using Elliptic Curve Cryptography

open access: yesIEEE Access, 2019
Many applications use asymmetric cryptography to secure communications between two parties. One of the main issues with asymmetric cryptography is the need for vast amounts of computation and storage.
Hisham N. Almajed, Ahmad S. Almogren
doaj   +2 more sources

Elliptic curve cryptography [PDF]

open access: yesUbiquity, 2008
This paper describes the Elliptic Curve Cryptography algorithm and its suitability for smart cards.
Vivek Kapoor   +2 more
  +4 more sources

Home - About - Disclaimer - Privacy