Secure Elliptic Curve Crypto-Processor for Real-Time IoT Applications
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low latencies are required, along with security requirements to protect the large number of attack surfaces to which IoT devices are exposed.
Stefano Di Matteo +5 more
doaj +1 more source
Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited
Due to its shorter key size, elliptic curve cryptography (ECC) is gaining more and more popularity. However, if not properly implemented, the resulting cryptosystems may be susceptible to fault attacks.
Joye Marc
doaj +1 more source
Crypto-test-lab for security validation of ECC co-processor test infrastructure [PDF]
© 20xx IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting /republishing this material for advertising or promotional purposes, creating new ...
Lupón Roses, Emilio +2 more
core +1 more source
EFFICIENCY AND EFFECTIVENESS ANALYSIS OVER ECC-BASED DIRECT AND INDIRECT AUTHENTICATION PROTOCOLS: AN EXTENSIVE COMPARATIVE STUDY [PDF]
Elliptic curve cryptography finds enormous applications because of its security offering using the remarkable property of elliptic curve. The Elliptic curve cryptography finds enormous applications in almost all the emerging areas.
K. Thilagavathi, P.G.Rajeswari
doaj
Hardware Accelerators for Elliptic Curve Cryptography [PDF]
In this paper we explore different hardware accelerators for cryptography based on elliptic curves. Furthermore, we present a hierarchical multiprocessor system-on-chip (MPSoC) platform that can be used for fast integration and evaluation of novel ...
C. Puttmann +3 more
doaj
Radio Frequency Identification Mutual Authentication Protocol Based on Elliptic Curve Cryptography [PDF]
Aiming at wireless communication security problem of Radio Frequency Identification(RFID) the based on Elliptic Curve Cryptography(ECC) algorithm,this paper proposes a RFID mutual authentication protocol.It describes in detail the process of the new ...
LIU Boya,LIU Nianyi,YANG Yatao,LI Zichen
doaj +1 more source
Quantum resource estimates for computing elliptic curve discrete logarithms [PDF]
We give precise quantum resource estimates for Shor's algorithm to compute discrete logarithms on elliptic curves over prime fields. The estimates are derived from a simulation of a Toffoli gate network for controlled elliptic curve point addition ...
A Joux +32 more
core +2 more sources
Quantum Emitters in Hexagonal Boron Nitride: Principles, Engineering and Applications
Quantum emitters in hexagonal boron nitride have emerged as a promising candidate for quantum information science. This review examines the fundamentals of these quantum emitters, including their level structures, defect engineering, and their possible chemical structures.
Thi Ngoc Anh Mai +8 more
wiley +1 more source
An identity-based key infrastructure suitable for messaging applications [PDF]
—Identity-based encryption (IBE) systems are relatively recently proposed; yet they are highly popular for messaging applications since they offer new features such as certificateless infrastructure and anonymous communication. In this paper, we intended
Karatop, Ayse Gul +3 more
core +2 more sources
This study investigates H4TBAPy‐based metal–organic frameworks (MOFs) ‐ NU‐1000, NU‐901, SrTBAPy, and BaTBAPy ‐ for multiphoton absorption (MPA) performance. It observes topology‐dependent variations in the 2PA cross‐section, with BaTBAPy exhibiting the highest activity.
Simon N. Deger +10 more
wiley +1 more source

