Results 41 to 50 of about 177,129 (337)

Shell characterization of the youngest valid species of the European Eocene genus Neochelys (Pleurodira, Podocnemididae): The Spanish Bartonian Neochelys salmanticensis

open access: yesThe Anatomical Record, EarlyView., 2023
Abstract The freshwater pleurodiran turtle Neochelys is the best‐represented member of Podocnemididae in the European record, being known by eight Eocene species. The youngest of them is the Bartonian (middle Eocene) Neochelys salmanticensis, from the Duero Basin (Salamanca Province, Central Spain).
Adán Pérez‐García   +3 more
wiley   +1 more source

Secure Elliptic Curve Crypto-Processor for Real-Time IoT Applications

open access: yesEnergies, 2021
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low latencies are required, along with security requirements to protect the large number of attack surfaces to which IoT devices are exposed.
Stefano Di Matteo   +5 more
doaj   +1 more source

Secure Elliptic Curves in Cryptography [PDF]

open access: yes, 2017
Elliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of elliptic curves. In the short life of ECC, most standards have proposed curves defined over prime finite fields using the short Weierstrass form. However, some researchers have started to propose as a more secure alternative the use of Edwards and ...
Lorena González-Manzano   +2 more
openaire   +2 more sources

KRIPTOGRAFI VISUAL PADA GAMBAR BERWARNA (RGB) MENGGUNAKAN ALGORITMA ELLIPTIC CURVE CRYPTOGRAPHY [PDF]

open access: yes, 2020
ABSTRAK Kriptografi berperan penting pada era digital dalam mengamankan data dari peretas. Seiring berkembangnya teknologi, data yang dapat diamankan menggunakan kriptografi semakin luas, salah satunya adalah mengamankan gambar menggunakan kriptografi ...
Della Annisa Zahra, -
core  

Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited

open access: yesJournal of Mathematical Cryptology, 2020
Due to its shorter key size, elliptic curve cryptography (ECC) is gaining more and more popularity. However, if not properly implemented, the resulting cryptosystems may be susceptible to fault attacks.
Joye Marc
doaj   +1 more source

An More effective Approach of ECC Encryption Algorithm using DNA Computing [PDF]

open access: yes, 2018
Now a day’s Cryptography is one of the broad areas for researchers. Encryption is most effective way to achieve data security. Cryptographic system entails the study of mathematical techniques of encryption and decryption to solve security problems in ...
, Fatima Amounas, Hassain Sadki, Moha Hajar
core   +2 more sources

Efficient and Secure ECDSA Algorithm and its Applications: A Survey [PDF]

open access: yes, 2022
Public-key cryptography algorithms, especially elliptic curve cryptography (ECC)and elliptic curve digital signature algorithm (ECDSA) have been attracting attention frommany researchers in different institutions because these algorithms provide security
Al-Zubaidie, Mishall   +2 more
core   +2 more sources

Study of Zero-Knowledge protocols and Elliptic Curve Cryptography and their implementation in Smart Card environments using Java Card [PDF]

open access: yesarXiv, 2023
This paper studies the problem of Zero-Knowledge Protocol (ZKP) and elliptic curve cryptographic implementation in a computationally limited environment, such as, the smart cards, using Java Card. Besides that, it is explained how the zero-knowledge protocol was selected to implement it on a smart card and how the benchmarking was conducted to select ...
arxiv  

EFFICIENCY AND EFFECTIVENESS ANALYSIS OVER ECC-BASED DIRECT AND INDIRECT AUTHENTICATION PROTOCOLS: AN EXTENSIVE COMPARATIVE STUDY [PDF]

open access: yesICTACT Journal on Communication Technology, 2012
Elliptic curve cryptography finds enormous applications because of its security offering using the remarkable property of elliptic curve. The Elliptic curve cryptography finds enormous applications in almost all the emerging areas.
K. Thilagavathi, P.G.Rajeswari
doaj  

An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication [PDF]

open access: yesarXiv, 2023
Multiplication is one of the most important operation in Elliptic Curve Cryptography (ECC) arithmetic. For point addition and point doubling in ECC scalar (integer) multiplication is required. In higher order classical (standard) multiplication many intermediate operations are required.
arxiv  

Home - About - Disclaimer - Privacy