Results 41 to 50 of about 62,245 (351)

Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited

open access: yesJournal of Mathematical Cryptology, 2020
Due to its shorter key size, elliptic curve cryptography (ECC) is gaining more and more popularity. However, if not properly implemented, the resulting cryptosystems may be susceptible to fault attacks.
Joye Marc
doaj   +1 more source

Secure Elliptic Curves in Cryptography [PDF]

open access: yes, 2017
Elliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of elliptic curves. In the short life of ECC, most standards have proposed curves defined over prime finite fields using the short Weierstrass form. However, some researchers have started to propose as a more secure alternative the use of Edwards and ...
Lorena González-Manzano   +2 more
openaire   +2 more sources

A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm

open access: yesArtificial Intelligence Review
In the era of digital communication and data security, image encryption plays a crucial role in safeguarding sensitive information. Protecting sensitive visual data from unauthorized access drives the pursuit of advanced image encryption methods.
Sanjay Kumar, Deepmala Sharma
semanticscholar   +1 more source

Isogeny volcanoes

open access: yes, 2013
The remarkable structure and computationally explicit form of isogeny graphs of elliptic curves over a finite field has made them an important tool for computational number theorists and practitioners of elliptic curve cryptography. This expository paper
Sutherland, Andrew V.
core   +1 more source

EFFICIENCY AND EFFECTIVENESS ANALYSIS OVER ECC-BASED DIRECT AND INDIRECT AUTHENTICATION PROTOCOLS: AN EXTENSIVE COMPARATIVE STUDY [PDF]

open access: yesICTACT Journal on Communication Technology, 2012
Elliptic curve cryptography finds enormous applications because of its security offering using the remarkable property of elliptic curve. The Elliptic curve cryptography finds enormous applications in almost all the emerging areas.
K. Thilagavathi, P.G.Rajeswari
doaj  

Toward Architected Microstructures Using Advanced Laser Beam Shaping in Laser Powder Bed Fusion of Ti‐6Al‐4V

open access: yesAdvanced Functional Materials, EarlyView.
This research applies advanced laser beam shaping (LCoS‐SLM) to fabricate the Ti‐6Al‐4V alloy via laser powder bed fusion. A tailored beam is used to prevent martensite formation and create a dual α+β microstructure by controlling cooling rates.
Reza Esmaeilzadeh   +8 more
wiley   +1 more source

Bi‐Directional Assembly of Boron Nitride µ‐Platelets by Micro‐Molding for Advanced Thermal Interface Materials

open access: yesAdvanced Functional Materials, EarlyView.
Bi‐directionally assembled BN µ‐platelets in micropatterns formed by a micro‐molding method for thermal interface materials are demonstrated. The BN µ‐platelets are vertically aligned selectively, while compressed regions without patterns accommodate horizontally assembled BN µ‐platelets. Through anisotropic orientation, high thermal conductivities for
Young Gil Kim   +12 more
wiley   +1 more source

Quantum Emitters in Hexagonal Boron Nitride: Principles, Engineering and Applications

open access: yesAdvanced Functional Materials, EarlyView.
Quantum emitters in hexagonal boron nitride have emerged as a promising candidate for quantum information science. This review examines the fundamentals of these quantum emitters, including their level structures, defect engineering, and their possible chemical structures.
Thi Ngoc Anh Mai   +8 more
wiley   +1 more source

Model Proyeksi (X/Z2, Y/Z2) pada Kurva Hesian secara Paralel Menggunakan Mekanisme Kriptografi Kurva Eliptik [PDF]

open access: yes, 2012
MODEL PROYEKSI (X/Z2, Y/Z2) PADA KURVA HESIAN SECARA PARALEL MENGGUNAKAN MEKANISME KRIPTOGRAFI KURVA ELIPTIKABSTRAK Suatu kunci publik, Elliptic Curve Cryptography (ECC) dikenal sebagai algoritma yang paling aman yang digunakan untuk memproteksi ...
Weku, W. (Winsy)
core  

Home - About - Disclaimer - Privacy