Results 31 to 40 of about 62,245 (351)

Efficient Image Encryption Scheme Using Henon Map, Dynamic S-Boxes and Elliptic Curve Cryptography

open access: yesIEEE Access, 2020
Image encryption schemes can be vulnerable to a variety of cryptanalysis attacks. The use of key-dependent dynamic S-boxes has been shown to improve security. Threats of chosen-plaintext and chosen-ciphertext attacks still linger.
Saleh Ibrahim, Ayman Alharbi
semanticscholar   +1 more source

Generalized Fibonacci Sequences for Elliptic Curve Cryptography

open access: yesMathematics, 2023
The Fibonacci sequence is a well-known sequence of numbers with numerous applications in mathematics, computer science, and other fields. In recent years, there has been growing interest in studying Fibonacci-like sequences on elliptic curves.
Zakariae Cheddour   +2 more
doaj   +1 more source

A New High Capacity Image Steganography Method Combined With Image Elliptic Curve Cryptography and Deep Neural Network

open access: yesIEEE Access, 2020
Image steganography is a technology that hides sensitive information into an image. The traditional image steganography method tends to securely embed secret information in the host image so that the payload capacity is almost ignored and the ...
X. Duan   +5 more
semanticscholar   +1 more source

Efficient Unified Arithmetic for Hardware Cryptography [PDF]

open access: yes, 2008
The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF(q), where q = pk and p is a prime integer, have several applications in cryptography, such as RSA algorithm, Diffie-Hellman key exchange algorithm [1 ...
Koc, Cetin Kaya   +3 more
core   +2 more sources

Design a cryptosystem using elliptic curves cryptography and Vigenère symmetry key [PDF]

open access: yes, 2023
In this paper describes the basic idea of elliptic curve cryptography (ECC) as well as Vigenère symmetry key. Elliptic curve arithmetic can be used to develop elliptic curve coding schemes, including key exchange, encryption, and digital signature.
Do, Le Phe   +4 more
core   +4 more sources

Methods for using elliptic curves in cryptography [PDF]

open access: yesE3S Web of Conferences
Elliptic Curve Cryptography (ECC), a significant modern cryptography, is more secure and robust than most others due to its construction using an elliptic curve and the application of mathematical operations for encryption and key generation. Furthermore,
Obukhov Vadim   +4 more
doaj   +1 more source

Hyper-and-elliptic-curve cryptography [PDF]

open access: yesLMS Journal of Computation and Mathematics, 2014
AbstractThis paper introduces ‘hyper-and-elliptic-curve cryptography’, in which a single high-security group supports fast genus-2-hyperelliptic-curve formulas for variable-base-point single-scalar multiplication (for example, Diffie–Hellman shared-secret computation) and at the same time supports fast elliptic-curve formulas for fixed-base-point ...
Tanja Lange, Daniel J. Bernstein
openaire   +3 more sources

Area-Time Efficient Hardware Implementation of Modular Multiplication for Elliptic Curve Cryptography

open access: yesIEEE Access, 2020
In this paper, an area-time efficient hardware implementation of modular multiplication over five National Institute of Standard and Technology (NIST)-recommended prime fields is proposed for lightweight elliptic curve cryptography (ECC).
Md. Mainul Islam   +4 more
semanticscholar   +1 more source

Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm

open access: yesEngineering Proceedings, 2023
Elliptic-curve cryptography (ECC) has become a robust cryptographic technique that ensures secure data transmission with comparatively small key sizes.
Sanjay Kumar, Deepmala Sharma
doaj   +1 more source

Secure Elliptic Curve Crypto-Processor for Real-Time IoT Applications

open access: yesEnergies, 2021
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low latencies are required, along with security requirements to protect the large number of attack surfaces to which IoT devices are exposed.
Stefano Di Matteo   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy