Results 91 to 100 of about 177,129 (337)
Efficient signature system using optimized elliptic curve cryptosystem over GF(2(n)). [PDF]
Elliptic curve cryptography was proposed independently by Neil Koblitz and Victor Miller in the middle of 80\u27s. The security of Elliptic Curve Cryptography depends upon the elliptic curve discrete logarithm problem. For providing the same strength, it
Wang, Xiaoguang
core +1 more source
A Secure Multiple Elliptic Curves Digital Signature Algorithm for Blockchain [PDF]
Most cryptocurrency systems or systems based on blockchain technology are currently using the elliptic curves digital signature algorithm (ECDSA) on the secp256k1 curve, which is susceptible to backdoors implemented by the curve creator (secp256k1). The paper proposes a multiple elliptic curves digi-tal signature algorithm (MECDSA), which allows not ...
arxiv
Stopping a Multilayered Co‐Axial Flow in a 3D Printed Microchannel with Cascaded Nozzles
A microfluidic device with cascaded nozzles is 3D‐printed using two‐photon polymerization. Its microchannel, featuring integrated nozzles, sculpts multilayered co‐axial flows, enabling independent regulation of four co‐flowing streams to achieve variable layer thicknesses.
Helen Werner+7 more
wiley +1 more source
Hardware acceleration of number theoretic transform for zk‐SNARK
An FPGA‐based hardware accelerator with a multi‐level pipeline is designed to support the large‐bitwidth and large‐scale NTT tasks in zk‐SNARK. It can be flexibly scaled to different scales of FPGAs and has been equipped in the heterogeneous acceleration system with the help of HLS and OpenCL.
Haixu Zhao+6 more
wiley +1 more source
A DSP Based POD Implementation for High Speed Multimedia Communications
In the cable network services, the audio/video entertainment contents should be protected from unauthorized copying, intercepting, and tampering. Point-of-deployment (POD) security module, proposed by OpenCableTM, allows viewers to receive secure cable ...
Chang Nian Zhang+3 more
doaj +1 more source
Elliptic Curves and Cryptography
Durch die zunehmende Digitalisierung, und insbesondere dem sogenannten "Internet of Things", ist der Bedarf an zuverlässigen kryptografischen Verfahren nicht nur für Behörden, sondern auch für Privatpersonen wichtig geworden. In den letzten Jahrzehnten wurde eine Vielzahl an unterschiedlichsten Lösungen präsentiert.
openaire
Reconfigurable elliptic curve cryptography [PDF]
Elliptic Curve Cryptosystems (ECC) have been proposed as an alternative to other established public key cryptosystems such as RSA (Rivest Shamir Adleman).
Malik, Aarti
core +1 more source
Elliptic Curve Cryptosystem for Email Encryption [PDF]
The idea of information security lead to the evolution of cryptography. In other words, cryptography is the science of keeping information secure. It involves encryption and decryption of messages.
Chakrabarty, Saikat+2 more
core +1 more source
AN EXPOSITION OF ELLIPTIC CURVE CRYPTOGRAPHY [PDF]
Protecting information that is being communicated between two parties overunsecured channels is of huge importance in today’s world. The use of mathematical concepts to achieve high levels of security when communicating over these unsecured platforms is ...
Severns, Travis
core +1 more source
Topic In Elliptic Curves Over Finite Fields: The Groups of Points [PDF]
This article is a short introduction to the theory of the groups of points of elliptic curves over finite fields. It is concerned with the elementary theory and practice of elliptic curves cryptography, the new generation of public key systems. The material and coverage are focused on the groups of points of elliptic curves and algebraic curves, but ...
arxiv