Results 11 to 20 of about 65,080 (316)
Implementasi dan Pengukuran Kinerja Operasi Aritmatika Finite Field Berbasis Polinomial Biner [PDF]
Cryptography is one of the security techniques that secure information confidentiality and information integrity while electronic transaction processing.
Wenny Franciska Senjaya, Budi Rahardjo
doaj +4 more sources
A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm
In the era of digital communication and data security, image encryption plays a crucial role in safeguarding sensitive information. Protecting sensitive visual data from unauthorized access drives the pursuit of advanced image encryption methods.
Sanjay Kumar, Deepmala Sharma
semanticscholar +3 more sources
Compiler Assisted Elliptic Curve Cryptography [PDF]
Although cryptographic software implementation is often performed by expert programmers, the range of performance and security driven options, as well as more mundane software engineering issues, still make it a challenge. The use of domain specific language and compiler techniques to assist in description and optimisation of cryptographic software is ...
Barbosa, Manuel B M +2 more
openaire +5 more sources
Elliptic Curve Lightweight Cryptography: A Survey
Since it was invented in 1986, elliptic curve cryptography (ECC) has been studied widely in industry and academy from different perspectives. Some of these aspects include mathematical foundations, protocol design, curve generation, security proofs ...
Carlos Andres Lara-Nino +2 more
doaj +3 more sources
ELLIPTIC CURVE CRYPTOGRAPHY [PDF]
In the present day, security is essential for sending and receiving information. There are always stories about bank accounts being hacked, credit card numbers being stolen, and secret information being decoded.
O. O. Meleshko, O. O. Kovalskiy
openaire +3 more sources
Elliptic curve cryptography includes symmetric key cryptography systems that base their security on mathematical problems of elliptic curves. There are several ways that can be used to define the elliptic curve equation that depends on the infinite field
Juhari Juhari, Mohamad Febry Andrean
doaj +1 more source
Analysis of Elliptic Curve Cryptography & RSA
In today’s digital world, the Internet is an essential component of communication networks. It provides a platform for quickly exchanging information among communicating parties.
Mohammad Rafeek Khan +6 more
semanticscholar +1 more source
Speeding-Up Elliptic Curve Cryptography Algorithms
In recent decades there has been an increasing interest in Elliptic curve cryptography (ECC) and, especially, the Elliptic Curve Digital Signature Algorithm (ECDSA) in practice.
Diana Maimuţ, Alexandru Cristian Matei
doaj +1 more source
Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain
The inclusion of drones in Internet of Vehicles (IoV) is a current trend that presents significant trade-offs. On the one hand, Unmanned Aerial Vehicles (UAVs) provide advantages such as enabling ground communications also when physical obstacles limit ...
Mohamed A. El-Zawawy +2 more
semanticscholar +1 more source

