Results 21 to 30 of about 21,677 (136)
Securing the Data in Clouds with Hyperelliptic Curve Cryptography
In todays world, Cloud computing has attracted research communities as it provides services in reduced cost due to virtualizing all the necessary resources. Even modern business architecture depends upon Cloud computing .As it is a internet based utility,
Agrawal, Tanmay +3 more
core +1 more source
Implementasi Algoritma ECDSA untuk Pengamanan E-Mail (Verifikasi Keaslian Pesan) [PDF]
This final project is discussed about implementation of digital signature on email delivery with java programming language. Digital signature is one of the cryptographic security services that provide assurance to the recipient of the message (receiver).
Prabowo, Pualam Sendi Agung +2 more
core
Enhanced Elliptic Curve Cryptography
Background/Objectives: Today’s Technological world Information Security is an essential for commercial and legal trading, secrecy, truthfulness and non-reputability. The Elliptic Curve Cryptography (ECC) has become one of the latest trends in the field of Public-Key Cryptography (PKC). ECC promises a faster, efficient and more secured.
S. Thiraviya Regina Rajam +1 more
openaire +1 more source
Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups
Secret sharing in user hierarchy represents a challenging area for research. Although a lot of work has already been done in this direc- tion, this paper presents a novel approach to share a secret among a hierarchy of users while overcoming the ...
Naskar, Ruchira, Sengupta, Indranil
core +3 more sources
Algorithm based on Booth's Encoding Pattern for Fast Scalar Point Multiplication for ECC in Wireless Sensor Networks [PDF]
With the rapid increase of small devices and its usage, a better suitable security providing mechanism must be incorported keeping the resource constraints of the devices in mind. Elliptic Curve Cryptography (ECC) serves the best and highly suitable for
Levaka, Ravi Teja Reddy
core
Discrete Logarithms in Generalized Jacobians [PDF]
D\'ech\`ene has proposed generalized Jacobians as a source of groups for public-key cryptosystems based on the hardness of the Discrete Logarithm Problem (DLP).
Galbraith, S. D., Smith, B. A.
core +4 more sources
Integrating identity-based cryptography in IMS service authentication
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very
Abid, Mohamed +3 more
core +6 more sources
Duffing Oscillator and Elliptic Curve Cryptography [PDF]
7 pages, LaTeX with AMS ...
openaire +3 more sources
Secure and Efficient RNS Approach for Elliptic Curve Cryptography [PDF]
Scalar multiplication, the main operation in elliptic curve cryptographic protocols, is vulnerable to side-channel (SCA) and fault injection (FA) attacks.
Batina, Lejla +3 more
core
Distortion maps for genus two curves [PDF]
Distortion maps are a useful tool for pairing based cryptography. Compared with elliptic curves, the case of hyperelliptic curves of genus g > 1 is more complicated since the full torsion subgroup has rank 2g.
Galbraith, Steven D. +3 more
core +3 more sources

