Secure and Efficient RNS Approach for Elliptic Curve Cryptography [PDF]
Scalar multiplication, the main operation in elliptic curve cryptographic protocols, is vulnerable to side-channel (SCA) and fault injection (FA) attacks.
Batina, Lejla+3 more
core
A Novel Elliptic curve cryptography Processor using NoC design [PDF]
In this paper, we propose an elliptic curve key generation processor over GF(2m) and GF(P) with Network-on-Chip (NoC) design scheme based on binary scalar multiplication algorithm. Over the Two last decades, Elliptic Curve Cryptography (ECC) has gained increasing acceptance in the industry and the academic community.
arxiv
Elliptic Curve Cryptography on Smart Cards Without Coprocessors [PDF]
Adam D. Woodbury+2 more
openalex +1 more source
Elliptic Curve Cryptography and Quantum Computing [PDF]
In the year 2007, a slightly nerdy girl fell in love with all things math. Even though she only was exposed to a small part of the immense field of mathematics, she knew that math would always have a place in her heart.
Alderson, Emily
core +1 more source
Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems. [PDF]
Tidrea A, Korodi A, Silea I.
europepmc +1 more source
Efficient Arithmetic in Finite Field Extensions with Application in Elliptic Curve Cryptography [PDF]
Daniel V. Bailey, Christof Paar
openalex +1 more source
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Beheshti, A. A., Toorani, M.
core +3 more sources
A new Crocodyloidea from the middle Eocene of Zamora (Duero Basin, Spain)
Abstract The eusuchian crocodyliforms recorded in the Eocene levels of the Spanish Duero Basin belong to three lineages: Planocraniidae, with the species Duerosuchus piscator; Alligatoroidea, represented by several specimens of the genus Diplocynodon; and Crocodyloidea, which includes several specimens traditionally attributed to Asiatosuchus.
Iván Narváez+5 more
wiley +1 more source
Lightweight Authentication Mechanism for Industrial IoT Environment Combining Elliptic Curve Cryptography and Trusted Token. [PDF]
Yang YS+5 more
europepmc +1 more source
ECC Cipher Processor Based On Knapsack Algorithm [PDF]
Elliptical Curve Cryptography (ECC) provides a secure means of exchanging keys among communicating hosts using the Diffie Hellmen Key Exchange algorithm.
Sharma, Jitendra, Shukla, Prashant
core +1 more source