Results 21 to 30 of about 4,746 (306)

A certificateless Multi-receiver Encryption scheme based on SM2 signature algorithm

open access: yesHigh-Confidence Computing, 2023
The Multi-receiver Encryption (MRE) scheme can meet the secure data transmission requirements in multicast and broadcast scenarios. To meet compliance, critical information infrastructure in China should be protected with Chinese national commercial ...
Jinglin Zou   +5 more
doaj   +1 more source

Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm

open access: yesEngineering Proceedings, 2023
Elliptic-curve cryptography (ECC) has become a robust cryptographic technique that ensures secure data transmission with comparatively small key sizes.
Sanjay Kumar, Deepmala Sharma
doaj   +1 more source

Secure Elliptic Curve Crypto-Processor for Real-Time IoT Applications

open access: yesEnergies, 2021
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low latencies are required, along with security requirements to protect the large number of attack surfaces to which IoT devices are exposed.
Stefano Di Matteo   +5 more
doaj   +1 more source

Secure Elliptic Curves in Cryptography [PDF]

open access: yes, 2017
Elliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of elliptic curves. In the short life of ECC, most standards have proposed curves defined over prime finite fields using the short Weierstrass form. However, some researchers have started to propose as a more secure alternative the use of Edwards and ...
Lorena González-Manzano   +2 more
openaire   +2 more sources

EFFICIENCY AND EFFECTIVENESS ANALYSIS OVER ECC-BASED DIRECT AND INDIRECT AUTHENTICATION PROTOCOLS: AN EXTENSIVE COMPARATIVE STUDY [PDF]

open access: yesICTACT Journal on Communication Technology, 2012
Elliptic curve cryptography finds enormous applications because of its security offering using the remarkable property of elliptic curve. The Elliptic curve cryptography finds enormous applications in almost all the emerging areas.
K. Thilagavathi, P.G.Rajeswari
doaj  

Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited

open access: yesJournal of Mathematical Cryptology, 2020
Due to its shorter key size, elliptic curve cryptography (ECC) is gaining more and more popularity. However, if not properly implemented, the resulting cryptosystems may be susceptible to fault attacks.
Joye Marc
doaj   +1 more source

Subgrain and Cavity Development during Creep of Al‐3.85%Mg

open access: yesAdvanced Engineering Materials, EarlyView.
Al‐3.85%Mg does form subgrains if crept at very high strains. This fact allows the unification of the creep description in two different alloys such as pure Al and Al–Mg alloys. It is classically considered that the creep mechanisms for type M (e.g., pure Al) and type A alloys (e.g., Al–Mg alloys) are different.
Augusta Isaac   +6 more
wiley   +1 more source

Quantum Emitters in Hexagonal Boron Nitride: Principles, Engineering and Applications

open access: yesAdvanced Functional Materials, EarlyView.
Quantum emitters in hexagonal boron nitride have emerged as a promising candidate for quantum information science. This review examines the fundamentals of these quantum emitters, including their level structures, defect engineering, and their possible chemical structures.
Thi Ngoc Anh Mai   +8 more
wiley   +1 more source

Modulating Two‐Photon Absorption in a Pyrene‐Based MOF Series: An In‐Depth Investigation of Structure–Property Relationships

open access: yesAdvanced Functional Materials, EarlyView.
This study investigates H4TBAPy‐based metal–organic frameworks (MOFs) ‐ NU‐1000, NU‐901, SrTBAPy, and BaTBAPy ‐ for multiphoton absorption (MPA) performance. It observes topology‐dependent variations in the 2PA cross‐section, with BaTBAPy exhibiting the highest activity.
Simon N. Deger   +10 more
wiley   +1 more source

Home - About - Disclaimer - Privacy