Results 11 to 20 of about 62,245 (351)
Secure Image Transmission Using Chaotic-Enhanced Elliptic Curve Cryptography
In this paper, a novel scheme for secure and real time image transmission is introduced. The scheme uses a block-based elliptic curve (BBEC) public key encryption as a first stage of encryption so it solves the key distribution and management problem of ...
Roayat Ismail Abdelfatah
doaj +2 more sources
Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems. [PDF]
Securing critical infrastructures and manufacturing plants in the Industrial-Internet-Of-Things and Industry 4.0 is a challenge today due to the increased number of attacks against automation and SCADA systems.
Tidrea A, Korodi A, Silea I.
europepmc +2 more sources
Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET. [PDF]
Numerous network can be connected by using the mobile ad hoc network. It can have security attacks like the worm hole, denial of service attack, jellyfish and also the blackhole.
Shukla M, Joshi BK, Singh U.
europepmc +2 more sources
SE-Enc: A Secure and Efficient Encoding Scheme Using Elliptic Curve Cryptography
Many applications use asymmetric cryptography to secure communications between two parties. One of the main issues with asymmetric cryptography is the need for vast amounts of computation and storage.
Hisham N. Almajed, Ahmad S. Almogren
doaj +2 more sources
Elliptic curve cryptography includes symmetric key cryptography systems that base their security on mathematical problems of elliptic curves. There are several ways that can be used to define the elliptic curve equation that depends on the infinite field
Juhari Juhari, Mohamad Febry Andrean
doaj +1 more source
Speeding-Up Elliptic Curve Cryptography Algorithms
In recent decades there has been an increasing interest in Elliptic curve cryptography (ECC) and, especially, the Elliptic Curve Digital Signature Algorithm (ECDSA) in practice.
Diana Maimuţ, Alexandru Cristian Matei
doaj +1 more source
Analysis of Elliptic Curve Cryptography & RSA
In today’s digital world, the Internet is an essential component of communication networks. It provides a platform for quickly exchanging information among communicating parties.
Mohammad Rafeek Khan+6 more
semanticscholar +1 more source
Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography
Short Weierstrass elliptic curves with underlying hard Elliptic Curve Discrete Logarithm Problem (ECDLP) are widely used in cryptographic applications. A notion of security called Elliptic Curve Cryptography (ECC) security is also suggested in literature
Abhishek Kunal+1 more
doaj +1 more source
The Overview of Elliptic Curve Cryptography (ECC)
Elliptic Curve Cryptography (ECC) is one of the strongest and most efficient cryptographic techniques in modern cryptography. This paper gives the following introduction: The introduction of cryptography’s development; the introduction of the elliptic ...
Yuhan Yan
semanticscholar +1 more source
Sistem Kriptografi Klasik Dengan Memanfaatkan Orde Dari Grup Titik Pada Kurva Eliptik Bentuk Montgomery [PDF]
Elliptic curve cryptography is one of the application fields of algebra and number theory concepts. One form of elliptic curve cryptography is Montgomery elliptic curve cryptography.
Fahmi, Muhammad Firdhausi+1 more
core +2 more sources