A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware
Cryptography is considered indispensable among security measures applied to data concerning insecure means of transmission. Among various existent algorithms on asymmetric cryptography, we may cite Elliptic Curve Cryptography (ECC), which has been widely
Arielle Verri Lucca+5 more
doaj +1 more source
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Beheshti, A. A., Toorani, M.
core +3 more sources
A Novel Efficient Pairing-Free CP-ABE Based on Elliptic Curve Cryptography for IoT
Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic technique that integrates data encryption with access control for ensuring data security in IoT systems.
Sheng Ding, Chen Li, Hui Li
semanticscholar +1 more source
Stopping a Multilayered Co‐Axial Flow in a 3D Printed Microchannel with Cascaded Nozzles
A microfluidic device with cascaded nozzles is 3D‐printed using two‐photon polymerization. Its microchannel, featuring integrated nozzles, sculpts multilayered co‐axial flows, enabling independent regulation of four co‐flowing streams to achieve variable layer thicknesses.
Helen Werner+7 more
wiley +1 more source
An exploration of affine group laws for elliptic curves
Several forms of elliptic curves are suggested for an efficient implementation of Elliptic Curve Cryptography. However, a complete description of the group law has not appeared in the literature for most popular forms.
Hisil Huseyin+3 more
doaj +1 more source
Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures. [PDF]
Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical ...
Maocai Wang+4 more
doaj +1 more source
Elliptic Curve Cryptography in Practice [PDF]
In this paper we perform a review of elliptic curve cryptography (ECC) as it is used in practice today in order to reveal unique mistakes and vulnerabilities that arise in implementations of ECC. We study four popular protocols that make use of this type of public-key cryptography: Bitcoin, secure shell (SSH), transport layer security (TLS), and the ...
Jonathan Moore+5 more
openaire +2 more sources
Secure and Efficient RNS Approach for Elliptic Curve Cryptography [PDF]
Scalar multiplication, the main operation in elliptic curve cryptographic protocols, is vulnerable to side-channel (SCA) and fault injection (FA) attacks.
Batina, Lejla+3 more
core
How to Manufacture Photonic Metamaterials
Metamaterials boast applications such as invisibility and “hyperlenses” with resolution beyond the diffraction limit, but these applications haven’t been exploited in earnest and the market for them hasn’t grown much likely because facile and economical methods for fabricating them without defect has not emerged.
Apurba Paul, Gregory Timp
wiley +1 more source
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
For the issues that the existing RFID security authentication scheme based on elliptic curve cryptography (ECC)can not meet the requirements of mutual authentication,privacy protection and forward security,a RFID security authentication scheme based on ...
Wumei ZHANG
doaj +2 more sources