Abstract The freshwater pleurodiran turtle Neochelys is the best‐represented member of Podocnemididae in the European record, being known by eight Eocene species. The youngest of them is the Bartonian (middle Eocene) Neochelys salmanticensis, from the Duero Basin (Salamanca Province, Central Spain).
Adán Pérez‐García+3 more
wiley +1 more source
Secure Elliptic Curve Crypto-Processor for Real-Time IoT Applications
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low latencies are required, along with security requirements to protect the large number of attack surfaces to which IoT devices are exposed.
Stefano Di Matteo+5 more
doaj +1 more source
Secure Elliptic Curves in Cryptography [PDF]
Elliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of elliptic curves. In the short life of ECC, most standards have proposed curves defined over prime finite fields using the short Weierstrass form. However, some researchers have started to propose as a more secure alternative the use of Edwards and ...
Lorena González-Manzano+2 more
openaire +2 more sources
KRIPTOGRAFI VISUAL PADA GAMBAR BERWARNA (RGB) MENGGUNAKAN ALGORITMA ELLIPTIC CURVE CRYPTOGRAPHY [PDF]
ABSTRAK Kriptografi berperan penting pada era digital dalam mengamankan data dari peretas. Seiring berkembangnya teknologi, data yang dapat diamankan menggunakan kriptografi semakin luas, salah satunya adalah mengamankan gambar menggunakan kriptografi ...
Della Annisa Zahra, -
core
Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited
Due to its shorter key size, elliptic curve cryptography (ECC) is gaining more and more popularity. However, if not properly implemented, the resulting cryptosystems may be susceptible to fault attacks.
Joye Marc
doaj +1 more source
An More effective Approach of ECC Encryption Algorithm using DNA Computing [PDF]
Now a day’s Cryptography is one of the broad areas for researchers. Encryption is most effective way to achieve data security. Cryptographic system entails the study of mathematical techniques of encryption and decryption to solve security problems in ...
, Fatima Amounas, Hassain Sadki, Moha Hajar
core +2 more sources
Efficient and Secure ECDSA Algorithm and its Applications: A Survey [PDF]
Public-key cryptography algorithms, especially elliptic curve cryptography (ECC)and elliptic curve digital signature algorithm (ECDSA) have been attracting attention frommany researchers in different institutions because these algorithms provide security
Al-Zubaidie, Mishall+2 more
core +2 more sources
Study of Zero-Knowledge protocols and Elliptic Curve Cryptography and their implementation in Smart Card environments using Java Card [PDF]
This paper studies the problem of Zero-Knowledge Protocol (ZKP) and elliptic curve cryptographic implementation in a computationally limited environment, such as, the smart cards, using Java Card. Besides that, it is explained how the zero-knowledge protocol was selected to implement it on a smart card and how the benchmarking was conducted to select ...
arxiv
EFFICIENCY AND EFFECTIVENESS ANALYSIS OVER ECC-BASED DIRECT AND INDIRECT AUTHENTICATION PROTOCOLS: AN EXTENSIVE COMPARATIVE STUDY [PDF]
Elliptic curve cryptography finds enormous applications because of its security offering using the remarkable property of elliptic curve. The Elliptic curve cryptography finds enormous applications in almost all the emerging areas.
K. Thilagavathi, P.G.Rajeswari
doaj
An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication [PDF]
Multiplication is one of the most important operation in Elliptic Curve Cryptography (ECC) arithmetic. For point addition and point doubling in ECC scalar (integer) multiplication is required. In higher order classical (standard) multiplication many intermediate operations are required.
arxiv