Results 61 to 70 of about 177,129 (337)

Design and Analysis of Pairing-Friendly Elliptic Curves for Cryptographic Primitives [PDF]

open access: yesarXiv, 2023
Elliptic curve cryptography (ECC) is a remarkable mathematical tool that offers the same level of security as traditional public-key cryptography (PKC) with a significantly smaller key size and lower computational requirements. The use of pairing on elliptic curves has emerged as a vibrant field of research that provides enhanced security measures for ...
arxiv  

Quantum Emitters in Hexagonal Boron Nitride: Principles, Engineering and Applications

open access: yesAdvanced Functional Materials, EarlyView.
Quantum emitters in hexagonal boron nitride have emerged as a promising candidate for quantum information science. This review examines the fundamentals of these quantum emitters, including their level structures, defect engineering, and their possible chemical structures.
Thi Ngoc Anh Mai   +8 more
wiley   +1 more source

A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware

open access: yesJournal of Sensor and Actuator Networks, 2020
Cryptography is considered indispensable among security measures applied to data concerning insecure means of transmission. Among various existent algorithms on asymmetric cryptography, we may cite Elliptic Curve Cryptography (ECC), which has been widely
Arielle Verri Lucca   +5 more
doaj   +1 more source

A Comparison of Cryptographic Methods [PDF]

open access: yes, 2022
While elliptic curve cryptography and quantum cryptography are significantly different branches of cryptography, they provide a suitable reference point for comparison of the value of developing methods used in the present and investing in methods to be ...
Gilmore, Christopher
core   +1 more source

DNA Encoded Elliptic Curve Cryptography System for IoT Security [PDF]

open access: yesarXiv, 2023
In the field of Computer Science and Information Technology Internet of Things (IoT) is one of the emerging technologies. In IoT environment several devices are interconnected and transmit data among them. There may be some security vulnerability arise within the IoT environment.
arxiv  

Chiroferromagnetic Quantum Dots for Chiroptical Synapse (ChiropS)

open access: yesAdvanced Materials, EarlyView.
Chiroptical activity is enhanced by up to 0.003 in the g‐factor through the induction of ferromagnetism in quantum dots. A chiroptical neuromorphic synapse, composed of chiroferromagnetic quantum dots, generates different synaptic weights from multiple wavelengths and circularly polarized light.
Junyoung Kwon   +11 more
wiley   +1 more source

An exploration of affine group laws for elliptic curves

open access: yesJournal of Mathematical Cryptology, 2011
Several forms of elliptic curves are suggested for an efficient implementation of Elliptic Curve Cryptography. However, a complete description of the group law has not appeared in the literature for most popular forms.
Hisil Huseyin   +3 more
doaj   +1 more source

Efficient scalar multiplication of ECC using SMBR and fast septuple formula for IoT

open access: yesEURASIP Journal on Wireless Communications and Networking, 2021
In order to solve the problem between low power of Internet of Things devices and the high cost of cryptography, lightweight cryptography is required. The improvement of the scalar multiplication can effectively reduce the complexity of elliptic curve ...
Chong Guo, Bei Gong
doaj   +1 more source

Low-Cost Area-Efficient FPGA-Based Multi-Functional ECDSA/EdDSA

open access: yesCryptography, 2022
In cryptography, elliptic curve cryptography (ECC) is considered an efficient and secure method to implement digital signature algorithms (DSAs). ECC plays an essential role in many security applications, such as transport layer security (TLS), internet ...
Binh Kieu-Do-Nguyen   +4 more
doaj   +1 more source

PENGGABUNGAN MODIFIKASI HILL CIPHER DAN ELLIPTIC CURVE CRYPTOGRAPHY UNTUK MENINGKATKAN KEAMANAN PESAN [PDF]

open access: yes, 2019
Seiring perkembangan teknologi, pesan rahasia semakin rentan untuk diretas. Oleh karena itu, pengamanan terhadap pesan rahasia perlu ditingkatkan. Kriptografi mempelajari teknik atau algoritma untuk mengamankan pesan, diantaranya adalah hill cipher dan ...
Hana Nur Azizah, -
core  

Home - About - Disclaimer - Privacy