Results 1 to 10 of about 24,382 (331)
Elliptic Curve Cryptography for Wireless Sensor Networks Using the Number Theoretic Transform [PDF]
We implement elliptic curve cryptography on the MSP430 which is a commonly used microcontroller in wireless sensor network nodes. We use the number theoretic transform to perform finite field multiplication and squaring as required in elliptic curve ...
Utku Gulen, Selcuk Baktir
doaj +2 more sources
Implementasi dan Pengukuran Kinerja Operasi Aritmatika Finite Field Berbasis Polinomial Biner [PDF]
Cryptography is one of the security techniques that secure information confidentiality and information integrity while electronic transaction processing.
Wenny Franciska Senjaya, Budi Rahardjo
doaj +4 more sources
Armed with Faster Crypto: Optimizing Elliptic Curve Cryptography for ARM Processors [PDF]
Elliptic curve cryptography is a widely deployed technology for securing digital communication. It is the basis of many cryptographic primitives such as key agreement protocols, digital signatures, and zero-knowledge proofs.
Ruben De Smet +4 more
doaj +2 more sources
Design of an Elliptic Curve Cryptography Processor for RFID Tag Chips [PDF]
Radio Frequency Identification (RFID) is an important technique for wireless sensor networks and the Internet of Things. Recently, considerable research has been performed in the combination of public key cryptography and RFID.
Zilong Liu +4 more
doaj +2 more sources
SE-Enc: A Secure and Efficient Encoding Scheme Using Elliptic Curve Cryptography [PDF]
Many applications use asymmetric cryptography to secure communications between two parties. One of the main issues with asymmetric cryptography is the need for vast amounts of computation and storage.
Hisham N. Almajed, Ahmad S. Almogren
doaj +2 more sources
Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems. [PDF]
Tidrea A, Korodi A, Silea I.
europepmc +3 more sources
A Decentralized Signcryption Scheme Based on CFL [PDF]
The rapid advancement of quantum computing technology poses a significant threat to conventional public key cryptographic infrastructure. The SM2 (state key cryptography algorithm no.
Leyi Shi, Mengting Liu
doaj +2 more sources
Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids. [PDF]
Zhang L, Tang S, Luo H.
europepmc +3 more sources
Elliptic curve cryptography includes symmetric key cryptography systems that base their security on mathematical problems of elliptic curves. There are several ways that can be used to define the elliptic curve equation that depends on the infinite field
Juhari Juhari, Mohamad Febry Andrean
doaj +1 more source
Speeding-Up Elliptic Curve Cryptography Algorithms
In recent decades there has been an increasing interest in Elliptic curve cryptography (ECC) and, especially, the Elliptic Curve Digital Signature Algorithm (ECDSA) in practice.
Diana MaimuĊ£, Alexandru Cristian Matei
doaj +1 more source

