Results 1 to 10 of about 177,129 (337)
Hardware Accelerators for Elliptic Curve Cryptography [PDF]
In this paper we explore different hardware accelerators for cryptography based on elliptic curves. Furthermore, we present a hierarchical multiprocessor system-on-chip (MPSoC) platform that can be used for fast integration and evaluation of novel ...
C. Puttmann+3 more
doaj +7 more sources
ELLIPTIC CURVE CRYPTOGRAPHY [PDF]
In the present day, security is essential for sending and receiving information. There are always stories about bank accounts being hacked, credit card numbers being stolen, and secret information being decoded.
O. O. Meleshko, O. O. Kovalskiy
core +7 more sources
Elliptic Curve Cryptography for Wireless Sensor Networks Using the Number Theoretic Transform [PDF]
We implement elliptic curve cryptography on the MSP430 which is a commonly used microcontroller in wireless sensor network nodes. We use the number theoretic transform to perform finite field multiplication and squaring as required in elliptic curve ...
Utku Gulen, Selcuk Baktir
doaj +2 more sources
ELLIPTIC-CURVE CRYPTOGRAPHY (ECC) AND ARGON2 ALGORITHM IN PHP USING OPENSSL AND SODIUM LIBRARIES [PDF]
This paper presents the elliptic-curve cryptography (ECC) and Argon2 algorithm in PHP using OpenSSL and Sodium cryptographic libraries. The vital part of this thesis presents an analysis of the efficiency of elliptic-curve cryptography (ECC) and the ...
Mariusz Duka
doaj +3 more sources
Armed with Faster Crypto: Optimizing Elliptic Curve Cryptography for ARM Processors [PDF]
Elliptic curve cryptography is a widely deployed technology for securing digital communication. It is the basis of many cryptographic primitives such as key agreement protocols, digital signatures, and zero-knowledge proofs.
Ruben De Smet+4 more
doaj +2 more sources
Design of an Elliptic Curve Cryptography Processor for RFID Tag Chips [PDF]
Radio Frequency Identification (RFID) is an important technique for wireless sensor networks and the Internet of Things. Recently, considerable research has been performed in the combination of public key cryptography and RFID.
Zilong Liu+4 more
doaj +2 more sources
A survey on elliptic curve cryptography [PDF]
Cryptography is an evolving field that research into discreet mathematical equation that is representable by computer algorithm for providing message condentiality. The scheme has been widely used by nation-states, corporates and individual who seeks privacy for data in storage and during transmission. This paper provides a ground up survey on elliptic
Mohamed, Mohamad Afendee
openaire +5 more sources
Implementasi dan Pengukuran Kinerja Operasi Aritmatika Finite Field Berbasis Polinomial Biner [PDF]
Cryptography is one of the security techniques that secure information confidentiality and information integrity while electronic transaction processing.
Wenny Franciska Senjaya, Budi Rahardjo
doaj +4 more sources
Elliptic Curve Lightweight Cryptography: A Survey
Since it was invented in 1986, elliptic curve cryptography (ECC) has been studied widely in industry and academy from different perspectives. Some of these aspects include mathematical foundations, protocol design, curve generation, security proofs ...
Carlos Andres Lara-Nino+2 more
doaj +4 more sources
Compiler Assisted Elliptic Curve Cryptography [PDF]
Although cryptographic software implementation is often performed by expert programmers, the range of performance and security driven options, as well as more mundane software engineering issues, still make it a challenge. The use of domain specific language and compiler techniques to assist in description and optimisation of cryptographic software is ...
Barbosa, Manuel, Moss, Andrew, Page, D.
openaire +6 more sources