Results 1 to 10 of about 217,622 (377)

Elliptic Curve Cryptography for Wireless Sensor Networks Using the Number Theoretic Transform [PDF]

open access: yesSensors, 2020
We implement elliptic curve cryptography on the MSP430 which is a commonly used microcontroller in wireless sensor network nodes. We use the number theoretic transform to perform finite field multiplication and squaring as required in elliptic curve ...
Utku Gulen, Selcuk Baktir
doaj   +3 more sources

Hardware Accelerators for Elliptic Curve Cryptography [PDF]

open access: goldAdvances in Radio Science, 2008
In this paper we explore different hardware accelerators for cryptography based on elliptic curves. Furthermore, we present a hierarchical multiprocessor system-on-chip (MPSoC) platform that can be used for fast integration and evaluation of novel ...
C. Puttmann   +3 more
doaj   +7 more sources

Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems. [PDF]

open access: yesSensors (Basel), 2023
Securing critical infrastructures and manufacturing plants in the Industrial-Internet-Of-Things and Industry 4.0 is a challenge today due to the increased number of attacks against automation and SCADA systems.
Tidrea A, Korodi A, Silea I.
europepmc   +2 more sources

Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography [PDF]

open access: yesCybernetics and Information Technologies, 2021
Short Weierstrass elliptic curves with underlying hard Elliptic Curve Discrete Logarithm Problem (ECDLP) are widely used in cryptographic applications. A notion of security called Elliptic Curve Cryptography (ECC) security is also suggested in literature
Abhishek Kunal   +1 more
doaj   +2 more sources

Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography [PDF]

open access: yesCybernetics and Information Technologies, 2021
The survey presents the evolution of Short Weierstrass elliptic curves after their introduction in cryptography. Subsequently, this evolution resulted in the establishment of present elliptic curve computational standards.
Abhishek Kunal   +1 more
doaj   +2 more sources

Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET. [PDF]

open access: yesWirel Pers Commun, 2021
Numerous network can be connected by using the mobile ad hoc network. It can have security attacks like the worm hole, denial of service attack, jellyfish and also the blackhole.
Shukla M, Joshi BK, Singh U.
europepmc   +2 more sources

Elliptic Curve Cryptography [PDF]

open access: yesScience-based technologies, 2014
In the present day, security is essential for sending and receiving information. There are always stories about bank accounts being hacked, credit card numbers being stolen, and secret information being decoded.
Pratt, Kerrie
core   +7 more sources

ELLIPTIC-CURVE CRYPTOGRAPHY (ECC) AND ARGON2 ALGORITHM IN PHP USING OPENSSL AND SODIUM LIBRARIES [PDF]

open access: yesInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, 2020
This paper presents the elliptic-curve cryptography (ECC) and Argon2 algorithm in PHP using OpenSSL and Sodium cryptographic libraries. The vital part of this thesis presents an analysis of the efficiency of elliptic-curve cryptography (ECC) and the ...
Mariusz Duka
doaj   +3 more sources

Armed with Faster Crypto: Optimizing Elliptic Curve Cryptography for ARM Processors [PDF]

open access: yesSensors
Elliptic curve cryptography is a widely deployed technology for securing digital communication. It is the basis of many cryptographic primitives such as key agreement protocols, digital signatures, and zero-knowledge proofs.
Ruben De Smet   +4 more
doaj   +2 more sources

Design of an Elliptic Curve Cryptography Processor for RFID Tag Chips [PDF]

open access: yesSensors, 2014
Radio Frequency Identification (RFID) is an important technique for wireless sensor networks and the Internet of Things. Recently, considerable research has been performed in the combination of public key cryptography and RFID.
Zilong Liu   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy