Measurement of Symmetric Cipher on Low Power Devices for Power Grids [PDF]
The symmetric ciphers are often used in low power devices for its low requirements. This article provides a measurement of AES-128 cipher, which should be used for secure communication in power grid (smart grid) networks.
Fujdiak, R.
core
Encryption using the Edwards elliptic curve [PDF]
Розглянуто криптографічну схему, що використовує протокол Діффі-Геллмана, застосований до кільця Zp та групи точок еліптичної кривої Едвардса. Ця схема описує алгоритм, який можна використовувати для закритого зв’язку при обміні даними по мережі ...
Коссак, О. +3 more
core
Implementing Elliptic Curve Cryptography [PDF]
Properties like short keys and efficient algorithms make elliptic curve cryptography (ECC) more and more interesting for future oriented applications. In this paper we give a short overview of the basics of ECC. Thereby we show where programmers can gain possible speed-ups and what parts are crucial.
openaire +1 more source
Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems. [PDF]
Tidrea A, Korodi A, Silea I.
europepmc +1 more source
Lightweight Authentication Mechanism for Industrial IoT Environment Combining Elliptic Curve Cryptography and Trusted Token. [PDF]
Yang YS +5 more
europepmc +1 more source
FPGA Implementation for Elliptic Curve Cryptography Algorithm and Circuit with High Efficiency and Low Delay for IoT Applications. [PDF]
Wang D, Lin Y, Hu J, Zhang C, Zhong Q.
europepmc +1 more source
Practical Three-Factor Authentication Protocol Based on Elliptic Curve Cryptography for Industrial Internet of Things. [PDF]
Zhao X, Li D, Li H.
europepmc +1 more source
Session Initiation Protocol Attacks and Challenges
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP).
Keshavarz, Hassan +2 more
core
A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography. [PDF]
Chen Y, Chen J.
europepmc +1 more source
Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET. [PDF]
Shukla M, Joshi BK, Singh U.
europepmc +1 more source

