Results 61 to 70 of about 24,382 (331)
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
For the issues that the existing RFID security authentication scheme based on elliptic curve cryptography (ECC)can not meet the requirements of mutual authentication,privacy protection and forward security,a RFID security authentication scheme based on ...
Wumei ZHANG
doaj +2 more sources
Error analysis and detection procedures for elliptic curve cryptography
In this paper, a fault detection scheme is introduced with the ability to perform with increased protection and reliability of the Elliptic Curve Cryptography (ECC) in realistic environments at a competitive price point.
Naglaa F. Saudy +2 more
doaj +1 more source
Cryptography: Mathematical Advancements on Cyber Security [PDF]
The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information.
Bower, Kristin
core +1 more source
Rapid solidification in laser additive manufacturing facilitates the precipitation of metastable phases in aluminum alloys. These metastable phases significantly enhance the strength by forming a high‐volume fraction of precipitates with an order of magnitude reduced sizes and smaller interspacing, effectively impeding dislocation motion. Consequestly,
S. Mohadeseh Taheri‐Mousavi +10 more
wiley +1 more source
Efficient scalar multiplication of ECC using SMBR and fast septuple formula for IoT
In order to solve the problem between low power of Internet of Things devices and the high cost of cryptography, lightweight cryptography is required. The improvement of the scalar multiplication can effectively reduce the complexity of elliptic curve ...
Chong Guo, Bei Gong
doaj +1 more source
Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors [PDF]
Resource constraints in smart devices demand an efficient cryptosystem that allows for low power and memory consumption. This has led to popularity of comparatively efficient Elliptic curve cryptog-raphy (ECC).
Malik, Yasir
core +1 more source
I2PA : An Efficient ABC for IoT [PDF]
Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preserving and lightweight cryptography.
Ciss, Abdoul Aziz +2 more
core +3 more sources
In this work, perovskite–chalcohalide CsPbCl3–Pb4S3Cl2 heterostructures are exploited to study the Cl→I exchange reaction and to isolate new types of intermediate structures, in particular emissive CsPbI3–CsPbCl3–Pb4S3Cl2 heterostructures, with partial I‐alloying of the CsPbCl3 domain and at the perovskite–chalcohalide interface, having a 5.6% lattice ...
Nikolaos Livakas +12 more
wiley +1 more source
Refinements of Miller's Algorithm over Weierstrass Curves Revisited
In 1986 Victor Miller described an algorithm for computing the Weil pairing in his unpublished manuscript. This algorithm has then become the core of all pairing-based cryptosystems. Many improvements of the algorithm have been presented.
Le, Duc-Phong, Liu, Chao-Liang
core +1 more source
Advanced Emissivity Tuning Via Femtosecond Laser Surface Engineering
Femtosecond laser surface processing (FLSP) is employed to fabricate titanium‐based metamaterials with engineered micro/nano‐scale features that exhibit spectrally selective and omnidirectional thermal emissivity. By integrating advanced ellipsometry, electromagnetic modeling, and compositional analysis, the work reveals resonance‐driven emissivity ...
Zahra Kamali Khanghah +8 more
wiley +1 more source

