Results 31 to 40 of about 24,925 (334)

Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited

open access: yesJournal of Mathematical Cryptology, 2020
Due to its shorter key size, elliptic curve cryptography (ECC) is gaining more and more popularity. However, if not properly implemented, the resulting cryptosystems may be susceptible to fault attacks.
Joye Marc
doaj   +1 more source

EFFICIENCY AND EFFECTIVENESS ANALYSIS OVER ECC-BASED DIRECT AND INDIRECT AUTHENTICATION PROTOCOLS: AN EXTENSIVE COMPARATIVE STUDY [PDF]

open access: yesICTACT Journal on Communication Technology, 2012
Elliptic curve cryptography finds enormous applications because of its security offering using the remarkable property of elliptic curve. The Elliptic curve cryptography finds enormous applications in almost all the emerging areas.
K. Thilagavathi, P.G.Rajeswari
doaj  

Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices [PDF]

open access: yes, 2011
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations
Herrera Joancomartí, Jordi   +1 more
core   +4 more sources

LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments

open access: yes, 2008
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Beheshti, A. A., Toorani, M.
core   +3 more sources

Hardware Accelerators for Elliptic Curve Cryptography [PDF]

open access: yesAdvances in Radio Science, 2008
In this paper we explore different hardware accelerators for cryptography based on elliptic curves. Furthermore, we present a hierarchical multiprocessor system-on-chip (MPSoC) platform that can be used for fast integration and evaluation of novel ...
C. Puttmann   +3 more
doaj  

Modulating Two‐Photon Absorption in a Pyrene‐Based MOF Series: An In‐Depth Investigation of Structure–Property Relationships

open access: yesAdvanced Functional Materials, EarlyView.
This study investigates H4TBAPy‐based metal–organic frameworks (MOFs) ‐ NU‐1000, NU‐901, SrTBAPy, and BaTBAPy ‐ for multiphoton absorption (MPA) performance. It observes topology‐dependent variations in the 2PA cross‐section, with BaTBAPy exhibiting the highest activity.
Simon N. Deger   +10 more
wiley   +1 more source

Radio Frequency Identification Mutual Authentication Protocol Based on Elliptic Curve Cryptography [PDF]

open access: yesJisuanji gongcheng, 2017
Aiming at wireless communication security problem of Radio Frequency Identification(RFID) the based on Elliptic Curve Cryptography(ECC) algorithm,this paper proposes a RFID mutual authentication protocol.It describes in detail the process of the new ...
LIU Boya,LIU Nianyi,YANG Yatao,LI Zichen
doaj   +1 more source

An identity-based key infrastructure suitable for messaging applications [PDF]

open access: yes, 2007
—Identity-based encryption (IBE) systems are relatively recently proposed; yet they are highly popular for messaging applications since they offer new features such as certificateless infrastructure and anonymous communication. In this paper, we intended
Karatop, Ayse Gul   +3 more
core   +2 more sources

Peptide Sequencing With Single Acid Resolution Using a Sub‐Nanometer Diameter Pore

open access: yesAdvanced Functional Materials, EarlyView.
To sequence a single molecule of Aβ1−42–sodium dodecyl sulfate (SDS), the aggregate is forced through a sub‐nanopore 0.4 nm in diameter spanning a 4.0 nm thick membrane. The figure is a visual molecular dynamics (VMD) snapshot depicting the translocation of Aβ1−42–SDS through the pore; only the peptide, the SDS, the Na+ (yellow/green) and Cl− (cyan ...
Apurba Paul   +8 more
wiley   +1 more source

Implementasi Algoritma ECDSA untuk Pengamanan E-Mail (Verifikasi Keaslian Pesan) [PDF]

open access: yes, 2010
This final project is discussed about implementation of digital signature on email delivery with java programming language. Digital signature is one of the cryptographic security services that provide assurance to the recipient of the message (receiver).
Prabowo, Pualam Sendi Agung   +2 more
core  

Home - About - Disclaimer - Privacy