Results 131 to 140 of about 23,383 (317)
Error analysis and detection procedures for elliptic curve cryptography
In this paper, a fault detection scheme is introduced with the ability to perform with increased protection and reliability of the Elliptic Curve Cryptography (ECC) in realistic environments at a competitive price point.
Naglaa F. Saudy+2 more
doaj
Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET. [PDF]
Shukla M, Joshi BK, Singh U.
europepmc +1 more source
Elliptic Curve Cryptography over Binary Finite Field GF(2m) [PDF]
Kefa Rabah
openalex +1 more source
Abstract The trigeminus nerve (cranial nerve V) is a large and significant conduit of sensory information from the face to the brain, with its three branches extending over the head to innervate a wide variety of integumentary sensory receptors, primarily tactile.
Juri A. Miyamae+4 more
wiley +1 more source
Lightweight Elliptic Curve Cryptography Accelerator Over 25519 Curves
This paper presents a lightweight hardware accelerator optimized for elliptic curve cryptography (ECC), supporting three standardized curves over the prime field GF( $2^{255}-19$ ): Weierstrass, Montgomery, and Twisted Edwards.
Piljoo Choi, Dong Kyue Kim
doaj +1 more source
Implementing Elliptic Curve Cryptography [PDF]
Properties like short keys and efficient algorithms make elliptic curve cryptography (ECC) more and more interesting for future oriented applications. In this paper we give a short overview of the basics of ECC. Thereby we show where programmers can gain possible speed-ups and what parts are crucial.
openaire +1 more source
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography [PDF]
David J. Malan+2 more
openalex +1 more source
Abstract Measurement error (ME) in geometric morphometrics has been the subject of countless articles, but none specific to the effect of time lags on landmark digitization error. Yet, especially for visiting scientists working on museum collections, it is not uncommon to collect data in multiple rounds, with interruptions of weeks or years. To explore
Andrea Cardini
wiley +1 more source
LC-DEX: Lightweight and Efficient Compressed Authentication Based Elliptic Curve Cryptography in Multi-Hop 6LoWPAN Wireless Sensor Networks in HIP-Based Internet of Things. [PDF]
Bettoumi B, Bouallegue R.
europepmc +1 more source
Abstract Hybodontiformes was a diverse, successful, and important group of shark‐like chondrichthyans known from a variety of ecosystems. Some representatives of the order had a wide palaeogeographic distribution, as is the case with Priohybodus arambourgi. With a multicuspidate crown, P. arambourgi was the first hybodontiform to develop fully serrated
Estevan Eltink+5 more
wiley +1 more source