Results 1 to 10 of about 24,382 (331)

Elliptic Curve Cryptography for Wireless Sensor Networks Using the Number Theoretic Transform [PDF]

open access: yesSensors, 2020
We implement elliptic curve cryptography on the MSP430 which is a commonly used microcontroller in wireless sensor network nodes. We use the number theoretic transform to perform finite field multiplication and squaring as required in elliptic curve ...
Utku Gulen, Selcuk Baktir
doaj   +2 more sources

Implementasi dan Pengukuran Kinerja Operasi Aritmatika Finite Field Berbasis Polinomial Biner [PDF]

open access: yesJuTISI (Jurnal Teknik Informatika dan Sistem Informasi), 2015
Cryptography is one of the security techniques that secure information confidentiality and information integrity while electronic transaction processing.
Wenny Franciska Senjaya, Budi Rahardjo
doaj   +4 more sources

Armed with Faster Crypto: Optimizing Elliptic Curve Cryptography for ARM Processors [PDF]

open access: yesSensors
Elliptic curve cryptography is a widely deployed technology for securing digital communication. It is the basis of many cryptographic primitives such as key agreement protocols, digital signatures, and zero-knowledge proofs.
Ruben De Smet   +4 more
doaj   +2 more sources

Design of an Elliptic Curve Cryptography Processor for RFID Tag Chips [PDF]

open access: yesSensors, 2014
Radio Frequency Identification (RFID) is an important technique for wireless sensor networks and the Internet of Things. Recently, considerable research has been performed in the combination of public key cryptography and RFID.
Zilong Liu   +4 more
doaj   +2 more sources

SE-Enc: A Secure and Efficient Encoding Scheme Using Elliptic Curve Cryptography [PDF]

open access: goldIEEE Access, 2019
Many applications use asymmetric cryptography to secure communications between two parties. One of the main issues with asymmetric cryptography is the need for vast amounts of computation and storage.
Hisham N. Almajed, Ahmad S. Almogren
doaj   +2 more sources

A Decentralized Signcryption Scheme Based on CFL [PDF]

open access: yesSensors
The rapid advancement of quantum computing technology poses a significant threat to conventional public key cryptographic infrastructure. The SM2 (state key cryptography algorithm no.
Leyi Shi, Mengting Liu
doaj   +2 more sources

On the Application of Noiseless Steganography and Elliptic Curves Cryptography Digital Signature Algorithm Methods in Securing Text Messages

open access: yesCauchy: Jurnal Matematika Murni dan Aplikasi, 2022
Elliptic curve cryptography includes symmetric key cryptography systems that base their security on mathematical problems of elliptic curves. There are several ways that can be used to define the elliptic curve equation that depends on the infinite field
Juhari Juhari, Mohamad Febry Andrean
doaj   +1 more source

Speeding-Up Elliptic Curve Cryptography Algorithms

open access: yesMathematics, 2022
In recent decades there has been an increasing interest in Elliptic curve cryptography (ECC) and, especially, the Elliptic Curve Digital Signature Algorithm (ECDSA) in practice.
Diana MaimuĊ£, Alexandru Cristian Matei
doaj   +1 more source

Home - About - Disclaimer - Privacy