Results 61 to 70 of about 62,245 (351)

A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware

open access: yesJournal of Sensor and Actuator Networks, 2020
Cryptography is considered indispensable among security measures applied to data concerning insecure means of transmission. Among various existent algorithms on asymmetric cryptography, we may cite Elliptic Curve Cryptography (ECC), which has been widely
Arielle Verri Lucca   +5 more
doaj   +1 more source

LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments

open access: yes, 2008
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Beheshti, A. A., Toorani, M.
core   +3 more sources

A Novel Efficient Pairing-Free CP-ABE Based on Elliptic Curve Cryptography for IoT

open access: yesIEEE Access, 2018
Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic technique that integrates data encryption with access control for ensuring data security in IoT systems.
Sheng Ding, Chen Li, Hui Li
semanticscholar   +1 more source

Stopping a Multilayered Co‐Axial Flow in a 3D Printed Microchannel with Cascaded Nozzles

open access: yesAdvanced Materials Technologies, EarlyView.
A microfluidic device with cascaded nozzles is 3D‐printed using two‐photon polymerization. Its microchannel, featuring integrated nozzles, sculpts multilayered co‐axial flows, enabling independent regulation of four co‐flowing streams to achieve variable layer thicknesses.
Helen Werner   +7 more
wiley   +1 more source

An exploration of affine group laws for elliptic curves

open access: yesJournal of Mathematical Cryptology, 2011
Several forms of elliptic curves are suggested for an efficient implementation of Elliptic Curve Cryptography. However, a complete description of the group law has not appeared in the literature for most popular forms.
Hisil Huseyin   +3 more
doaj   +1 more source

Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures. [PDF]

open access: yesPLoS ONE, 2016
Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical ...
Maocai Wang   +4 more
doaj   +1 more source

Elliptic Curve Cryptography in Practice [PDF]

open access: yes, 2014
In this paper we perform a review of elliptic curve cryptography (ECC) as it is used in practice today in order to reveal unique mistakes and vulnerabilities that arise in implementations of ECC. We study four popular protocols that make use of this type of public-key cryptography: Bitcoin, secure shell (SSH), transport layer security (TLS), and the ...
Jonathan Moore   +5 more
openaire   +2 more sources

Secure and Efficient RNS Approach for Elliptic Curve Cryptography [PDF]

open access: yes, 2016
Scalar multiplication, the main operation in elliptic curve cryptographic protocols, is vulnerable to side-channel (SCA) and fault injection (FA) attacks.
Batina, Lejla   +3 more
core  

How to Manufacture Photonic Metamaterials

open access: yesAdvanced Materials Technologies, EarlyView.
Metamaterials boast applications such as invisibility and “hyperlenses” with resolution beyond the diffraction limit, but these applications haven’t been exploited in earnest and the market for them hasn’t grown much likely because facile and economical methods for fabricating them without defect has not emerged.
Apurba Paul, Gregory Timp
wiley   +1 more source

RFID security authentication scheme based on Montgomery-form elliptic curve cryptography

open access: yesDianxin kexue, 2016
For the issues that the existing RFID security authentication scheme based on elliptic curve cryptography (ECC)can not meet the requirements of mutual authentication,privacy protection and forward security,a RFID security authentication scheme based on ...
Wumei ZHANG
doaj   +2 more sources

Home - About - Disclaimer - Privacy