Results 41 to 50 of about 62,245 (351)
Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited
Due to its shorter key size, elliptic curve cryptography (ECC) is gaining more and more popularity. However, if not properly implemented, the resulting cryptosystems may be susceptible to fault attacks.
Joye Marc
doaj +1 more source
Secure Elliptic Curves in Cryptography [PDF]
Elliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of elliptic curves. In the short life of ECC, most standards have proposed curves defined over prime finite fields using the short Weierstrass form. However, some researchers have started to propose as a more secure alternative the use of Edwards and ...
Lorena González-Manzano+2 more
openaire +2 more sources
A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm
In the era of digital communication and data security, image encryption plays a crucial role in safeguarding sensitive information. Protecting sensitive visual data from unauthorized access drives the pursuit of advanced image encryption methods.
Sanjay Kumar, Deepmala Sharma
semanticscholar +1 more source
The remarkable structure and computationally explicit form of isogeny graphs of elliptic curves over a finite field has made them an important tool for computational number theorists and practitioners of elliptic curve cryptography. This expository paper
Sutherland, Andrew V.
core +1 more source
EFFICIENCY AND EFFECTIVENESS ANALYSIS OVER ECC-BASED DIRECT AND INDIRECT AUTHENTICATION PROTOCOLS: AN EXTENSIVE COMPARATIVE STUDY [PDF]
Elliptic curve cryptography finds enormous applications because of its security offering using the remarkable property of elliptic curve. The Elliptic curve cryptography finds enormous applications in almost all the emerging areas.
K. Thilagavathi, P.G.Rajeswari
doaj
Duffing Oscillator and Elliptic Curve Cryptography [PDF]
7 pages, LaTeX with AMS ...
openaire +3 more sources
This research applies advanced laser beam shaping (LCoS‐SLM) to fabricate the Ti‐6Al‐4V alloy via laser powder bed fusion. A tailored beam is used to prevent martensite formation and create a dual α+β microstructure by controlling cooling rates.
Reza Esmaeilzadeh+8 more
wiley +1 more source
Bi‐directionally assembled BN µ‐platelets in micropatterns formed by a micro‐molding method for thermal interface materials are demonstrated. The BN µ‐platelets are vertically aligned selectively, while compressed regions without patterns accommodate horizontally assembled BN µ‐platelets. Through anisotropic orientation, high thermal conductivities for
Young Gil Kim+12 more
wiley +1 more source
Quantum Emitters in Hexagonal Boron Nitride: Principles, Engineering and Applications
Quantum emitters in hexagonal boron nitride have emerged as a promising candidate for quantum information science. This review examines the fundamentals of these quantum emitters, including their level structures, defect engineering, and their possible chemical structures.
Thi Ngoc Anh Mai+8 more
wiley +1 more source
Model Proyeksi (X/Z2, Y/Z2) pada Kurva Hesian secara Paralel Menggunakan Mekanisme Kriptografi Kurva Eliptik [PDF]
MODEL PROYEKSI (X/Z2, Y/Z2) PADA KURVA HESIAN SECARA PARALEL MENGGUNAKAN MEKANISME KRIPTOGRAFI KURVA ELIPTIKABSTRAK Suatu kunci publik, Elliptic Curve Cryptography (ECC) dikenal sebagai algoritma yang paling aman yang digunakan untuk memproteksi ...
Weku, W. (Winsy)
core