Results 131 to 140 of about 177,129 (337)

Secure and Efficient RNS Approach for Elliptic Curve Cryptography [PDF]

open access: yes, 2016
Scalar multiplication, the main operation in elliptic curve cryptographic protocols, is vulnerable to side-channel (SCA) and fault injection (FA) attacks.
Batina, Lejla   +3 more
core  

A Novel Elliptic curve cryptography Processor using NoC design [PDF]

open access: yesarXiv, 2011
In this paper, we propose an elliptic curve key generation processor over GF(2m) and GF(P) with Network-on-Chip (NoC) design scheme based on binary scalar multiplication algorithm. Over the Two last decades, Elliptic Curve Cryptography (ECC) has gained increasing acceptance in the industry and the academic community.
arxiv  

Elliptic Curve Cryptography and Quantum Computing [PDF]

open access: yes, 2017
In the year 2007, a slightly nerdy girl fell in love with all things math. Even though she only was exposed to a small part of the immense field of mathematics, she knew that math would always have a place in her heart.
Alderson, Emily
core   +1 more source

LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments

open access: yes, 2008
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Beheshti, A. A., Toorani, M.
core   +3 more sources

A new Crocodyloidea from the middle Eocene of Zamora (Duero Basin, Spain)

open access: yesThe Anatomical Record, EarlyView.
Abstract The eusuchian crocodyliforms recorded in the Eocene levels of the Spanish Duero Basin belong to three lineages: Planocraniidae, with the species Duerosuchus piscator; Alligatoroidea, represented by several specimens of the genus Diplocynodon; and Crocodyloidea, which includes several specimens traditionally attributed to Asiatosuchus.
Iván Narváez   +5 more
wiley   +1 more source

ECC Cipher Processor Based On Knapsack Algorithm [PDF]

open access: yes, 2013
Elliptical Curve Cryptography (ECC) provides a secure means of exchanging keys among communicating hosts using the Diffie Hellmen Key Exchange algorithm.
Sharma, Jitendra, Shukla, Prashant
core   +1 more source

Home - About - Disclaimer - Privacy