Results 11 to 20 of about 65,080 (316)

Implementasi dan Pengukuran Kinerja Operasi Aritmatika Finite Field Berbasis Polinomial Biner [PDF]

open access: yesJuTISI (Jurnal Teknik Informatika dan Sistem Informasi), 2015
Cryptography is one of the security techniques that secure information confidentiality and information integrity while electronic transaction processing.
Wenny Franciska Senjaya, Budi Rahardjo
doaj   +4 more sources

A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm

open access: yesArtificial Intelligence Review
In the era of digital communication and data security, image encryption plays a crucial role in safeguarding sensitive information. Protecting sensitive visual data from unauthorized access drives the pursuit of advanced image encryption methods.
Sanjay Kumar, Deepmala Sharma
semanticscholar   +3 more sources

Compiler Assisted Elliptic Curve Cryptography [PDF]

open access: yes, 2007
Although cryptographic software implementation is often performed by expert programmers, the range of performance and security driven options, as well as more mundane software engineering issues, still make it a challenge. The use of domain specific language and compiler techniques to assist in description and optimisation of cryptographic software is ...
Barbosa, Manuel B M   +2 more
openaire   +5 more sources

Elliptic Curve Lightweight Cryptography: A Survey

open access: yesIEEE Access, 2018
Since it was invented in 1986, elliptic curve cryptography (ECC) has been studied widely in industry and academy from different perspectives. Some of these aspects include mathematical foundations, protocol design, curve generation, security proofs ...
Carlos Andres Lara-Nino   +2 more
doaj   +3 more sources

Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey

open access: yesComputer Science Review, 2023
Shamsher Ullah   +5 more
semanticscholar   +3 more sources

ELLIPTIC CURVE CRYPTOGRAPHY [PDF]

open access: yesScience-based technologies, 2014
In the present day, security is essential for sending and receiving information. There are always stories about bank accounts being hacked, credit card numbers being stolen, and secret information being decoded.
O. O. Meleshko, O. O. Kovalskiy
openaire   +3 more sources

On the Application of Noiseless Steganography and Elliptic Curves Cryptography Digital Signature Algorithm Methods in Securing Text Messages

open access: yesCauchy: Jurnal Matematika Murni dan Aplikasi, 2022
Elliptic curve cryptography includes symmetric key cryptography systems that base their security on mathematical problems of elliptic curves. There are several ways that can be used to define the elliptic curve equation that depends on the infinite field
Juhari Juhari, Mohamad Febry Andrean
doaj   +1 more source

Analysis of Elliptic Curve Cryptography & RSA

open access: yesJournal of ICT Standardization, 2023
In today’s digital world, the Internet is an essential component of communication networks. It provides a platform for quickly exchanging information among communicating parties.
Mohammad Rafeek Khan   +6 more
semanticscholar   +1 more source

Speeding-Up Elliptic Curve Cryptography Algorithms

open access: yesMathematics, 2022
In recent decades there has been an increasing interest in Elliptic curve cryptography (ECC) and, especially, the Elliptic Curve Digital Signature Algorithm (ECDSA) in practice.
Diana Maimuţ, Alexandru Cristian Matei
doaj   +1 more source

Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain

open access: yesIEEE Transactions on Network and Service Management, 2023
The inclusion of drones in Internet of Vehicles (IoV) is a current trend that presents significant trade-offs. On the one hand, Unmanned Aerial Vehicles (UAVs) provide advantages such as enabling ground communications also when physical obstacles limit ...
Mohamed A. El-Zawawy   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy