Results 41 to 50 of about 4,746 (306)

An exploration of affine group laws for elliptic curves

open access: yesJournal of Mathematical Cryptology, 2011
Several forms of elliptic curves are suggested for an efficient implementation of Elliptic Curve Cryptography. However, a complete description of the group law has not appeared in the literature for most popular forms.
Hisil Huseyin   +3 more
doaj   +1 more source

Elliptic Curve Cryptography in Practice [PDF]

open access: yes, 2014
In this paper we perform a review of elliptic curve cryptography (ECC) as it is used in practice today in order to reveal unique mistakes and vulnerabilities that arise in implementations of ECC. We study four popular protocols that make use of this type of public-key cryptography: Bitcoin, secure shell (SSH), transport layer security (TLS), and the ...
Jonathan Moore   +5 more
openaire   +2 more sources

Bioinspired Design of a Wet‐Adhesive Cornea Glue Based on Recombinant Human Protein Networks

open access: yesAdvanced Functional Materials, EarlyView.
Natures protein‐based high performance materials e.g. elastin, silk and muscle proteins have been mimicked by a new protein‐hybrid material based on redesigned human partial sequences only, showing high wet‐adhesiveness and elasticity for biomedical applications.
Anna Resch   +17 more
wiley   +1 more source

RFID security authentication scheme based on Montgomery-form elliptic curve cryptography

open access: yesDianxin kexue, 2016
For the issues that the existing RFID security authentication scheme based on elliptic curve cryptography (ECC)can not meet the requirements of mutual authentication,privacy protection and forward security,a RFID security authentication scheme based on ...
Wumei ZHANG
doaj   +2 more sources

Error analysis and detection procedures for elliptic curve cryptography

open access: yesAin Shams Engineering Journal, 2019
In this paper, a fault detection scheme is introduced with the ability to perform with increased protection and reliability of the Elliptic Curve Cryptography (ECC) in realistic environments at a competitive price point.
Naglaa F. Saudy   +2 more
doaj   +1 more source

Efficient scalar multiplication of ECC using SMBR and fast septuple formula for IoT

open access: yesEURASIP Journal on Wireless Communications and Networking, 2021
In order to solve the problem between low power of Internet of Things devices and the high cost of cryptography, lightweight cryptography is required. The improvement of the scalar multiplication can effectively reduce the complexity of elliptic curve ...
Chong Guo, Bei Gong
doaj   +1 more source

Low-Cost Area-Efficient FPGA-Based Multi-Functional ECDSA/EdDSA

open access: yesCryptography, 2022
In cryptography, elliptic curve cryptography (ECC) is considered an efficient and secure method to implement digital signature algorithms (DSAs). ECC plays an essential role in many security applications, such as transport layer security (TLS), internet ...
Binh Kieu-Do-Nguyen   +4 more
doaj   +1 more source

A Deployable 4D Printed, Mucoadhesive and Magnetically Guided Patch for Local Therapy of Gastric Cancer

open access: yesAdvanced Healthcare Materials, EarlyView.
A new perspective for treatment of gastric cancer is proposed utilizing 4D printing to develop shape morphing, deployable, and magnetically guided local drug releasing patches. The deployed patches are envisioned to adhere at the tumor site to locally deliver high drug amounts.
Dina B. Mahmoud   +3 more
wiley   +1 more source

Light‐Harvesting Nanomaterials Based on Dyes for Energy Transfer and Amplified Biosensing

open access: yesAdvanced Materials, EarlyView.
Light harvesting (LH) in plants inspires researchers to develop artificial LH nanomaterials. Here, LH nanomaterials based on organic dyes are reviewed, considering fundamental challenges on aggregation‐caused quenching, excitation energy transfer, and exciton migration length.
Andrey S. Klymchenko   +2 more
wiley   +1 more source

IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY

open access: yesMalaysian Journal of Computing, 2021
Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker.
Md Nizam Udin   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy