Results 41 to 50 of about 4,746 (306)
An exploration of affine group laws for elliptic curves
Several forms of elliptic curves are suggested for an efficient implementation of Elliptic Curve Cryptography. However, a complete description of the group law has not appeared in the literature for most popular forms.
Hisil Huseyin +3 more
doaj +1 more source
Elliptic Curve Cryptography in Practice [PDF]
In this paper we perform a review of elliptic curve cryptography (ECC) as it is used in practice today in order to reveal unique mistakes and vulnerabilities that arise in implementations of ECC. We study four popular protocols that make use of this type of public-key cryptography: Bitcoin, secure shell (SSH), transport layer security (TLS), and the ...
Jonathan Moore +5 more
openaire +2 more sources
Bioinspired Design of a Wet‐Adhesive Cornea Glue Based on Recombinant Human Protein Networks
Natures protein‐based high performance materials e.g. elastin, silk and muscle proteins have been mimicked by a new protein‐hybrid material based on redesigned human partial sequences only, showing high wet‐adhesiveness and elasticity for biomedical applications.
Anna Resch +17 more
wiley +1 more source
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
For the issues that the existing RFID security authentication scheme based on elliptic curve cryptography (ECC)can not meet the requirements of mutual authentication,privacy protection and forward security,a RFID security authentication scheme based on ...
Wumei ZHANG
doaj +2 more sources
Error analysis and detection procedures for elliptic curve cryptography
In this paper, a fault detection scheme is introduced with the ability to perform with increased protection and reliability of the Elliptic Curve Cryptography (ECC) in realistic environments at a competitive price point.
Naglaa F. Saudy +2 more
doaj +1 more source
Efficient scalar multiplication of ECC using SMBR and fast septuple formula for IoT
In order to solve the problem between low power of Internet of Things devices and the high cost of cryptography, lightweight cryptography is required. The improvement of the scalar multiplication can effectively reduce the complexity of elliptic curve ...
Chong Guo, Bei Gong
doaj +1 more source
Low-Cost Area-Efficient FPGA-Based Multi-Functional ECDSA/EdDSA
In cryptography, elliptic curve cryptography (ECC) is considered an efficient and secure method to implement digital signature algorithms (DSAs). ECC plays an essential role in many security applications, such as transport layer security (TLS), internet ...
Binh Kieu-Do-Nguyen +4 more
doaj +1 more source
A new perspective for treatment of gastric cancer is proposed utilizing 4D printing to develop shape morphing, deployable, and magnetically guided local drug releasing patches. The deployed patches are envisioned to adhere at the tumor site to locally deliver high drug amounts.
Dina B. Mahmoud +3 more
wiley +1 more source
Light‐Harvesting Nanomaterials Based on Dyes for Energy Transfer and Amplified Biosensing
Light harvesting (LH) in plants inspires researchers to develop artificial LH nanomaterials. Here, LH nanomaterials based on organic dyes are reviewed, considering fundamental challenges on aggregation‐caused quenching, excitation energy transfer, and exciton migration length.
Andrey S. Klymchenko +2 more
wiley +1 more source
IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY
Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker.
Md Nizam Udin +5 more
doaj +1 more source

