Results 1 to 10 of about 4,746 (306)
Hardware Accelerators for Elliptic Curve Cryptography [PDF]
In this paper we explore different hardware accelerators for cryptography based on elliptic curves. Furthermore, we present a hierarchical multiprocessor system-on-chip (MPSoC) platform that can be used for fast integration and evaluation of novel ...
C. Puttmann +3 more
doaj +7 more sources
Elliptic Curve Cryptography for Wireless Sensor Networks Using the Number Theoretic Transform [PDF]
We implement elliptic curve cryptography on the MSP430 which is a commonly used microcontroller in wireless sensor network nodes. We use the number theoretic transform to perform finite field multiplication and squaring as required in elliptic curve ...
Utku Gulen, Selcuk Baktir
doaj +2 more sources
Armed with Faster Crypto: Optimizing Elliptic Curve Cryptography for ARM Processors [PDF]
Elliptic curve cryptography is a widely deployed technology for securing digital communication. It is the basis of many cryptographic primitives such as key agreement protocols, digital signatures, and zero-knowledge proofs.
Ruben De Smet +4 more
doaj +2 more sources
Design of an Elliptic Curve Cryptography Processor for RFID Tag Chips [PDF]
Radio Frequency Identification (RFID) is an important technique for wireless sensor networks and the Internet of Things. Recently, considerable research has been performed in the combination of public key cryptography and RFID.
Zilong Liu +4 more
doaj +2 more sources
Elliptic Curve Lightweight Cryptography: A Survey
Since it was invented in 1986, elliptic curve cryptography (ECC) has been studied widely in industry and academy from different perspectives. Some of these aspects include mathematical foundations, protocol design, curve generation, security proofs ...
Carlos Andres Lara-Nino +2 more
doaj +4 more sources
A Decentralized Signcryption Scheme Based on CFL [PDF]
The rapid advancement of quantum computing technology poses a significant threat to conventional public key cryptographic infrastructure. The SM2 (state key cryptography algorithm no.
Leyi Shi, Mengting Liu
doaj +2 more sources
Elliptic curve cryptography includes symmetric key cryptography systems that base their security on mathematical problems of elliptic curves. There are several ways that can be used to define the elliptic curve equation that depends on the infinite field
Juhari Juhari, Mohamad Febry Andrean
doaj +1 more source
Speeding-Up Elliptic Curve Cryptography Algorithms
In recent decades there has been an increasing interest in Elliptic curve cryptography (ECC) and, especially, the Elliptic Curve Digital Signature Algorithm (ECDSA) in practice.
Diana Maimuţ, Alexandru Cristian Matei
doaj +1 more source
Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography
Short Weierstrass elliptic curves with underlying hard Elliptic Curve Discrete Logarithm Problem (ECDLP) are widely used in cryptographic applications. A notion of security called Elliptic Curve Cryptography (ECC) security is also suggested in literature
Abhishek Kunal +1 more
doaj +1 more source
Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography
The survey presents the evolution of Short Weierstrass elliptic curves after their introduction in cryptography. Subsequently, this evolution resulted in the establishment of present elliptic curve computational standards.
Abhishek Kunal +1 more
doaj +1 more source

