Results 71 to 80 of about 20,688 (169)
Elliptic curve cryptography and biometrics for iot authentication [PDF]
The Internet of Things (IoT) is now present in every aspect of our daily lives because of its ability to offer remote services. Unfortunately, the insecure transmission of user data in open channels caused by this significant use of IoT networks
Dargaoui Souhayla+6 more
doaj +1 more source
Elliptic curves have a wide variety of applications in computational number theory such as elliptic curve cryptography, pairing based cryptography, primality tests, and integer factorization.
Keisuke Hakuta
doaj +1 more source
FPGA Implementation of Elliptic Curve Cryptoprocessor for Perceptual Layer of the Internet of Things
Today’s developing era data and information security plays an important role in unsecured communication between Internet of Things (IoT) elements. In IoT, data are transmitted in plaintext for many reasons.
V. Kamalakannan, S. Tamilselvan
doaj +1 more source
Algorithm based on Booth's Encoding Pattern for Fast Scalar Point Multiplication for ECC in Wireless Sensor Networks [PDF]
With the rapid increase of small devices and its usage, a better suitable security providing mechanism must be incorported keeping the resource constraints of the devices in mind. Elliptic Curve Cryptography (ECC) serves the best and highly suitable for
Levaka, Ravi Teja Reddy
core
Integrating identity-based cryptography in IMS service authentication
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very
Abid, Mohamed+3 more
core +6 more sources
A Subexponential Algorithm for Evaluating Large Degree Isogenies
An isogeny between elliptic curves is an algebraic morphism which is a group homomorphism. Many applications in cryptography require evaluating large degree isogenies between elliptic curves efficiently. For ordinary curves of the same endomorphism ring,
Jao, David, Soukharev, Vladimir
core +1 more source
Analysis of the Fault Attack ECDLP over Prime Field
In 2000, Biehl et al. proposed a fault-based attack on elliptic curve cryptography. In this paper, we refined the fault attack method. An elliptic curve E is defined over prime field 𝔽p with base point P∈E(𝔽p).
Mingqiang Wang, Tao Zhan
doaj +1 more source
Multiple point compression on curves [PDF]
Multiple point compression is an important feature to improve the implementation of elliptic curve cryptography. This can be extended to other curves, in particular hyperelliptic curves, with divisors represented in Mumford ...
Fan, X.+3 more
core +1 more source
Cryptography based on elliptic curves is endowed with efficient methods for public-key cryptography. Recent research has shown the superiority of the Montgomery and Edwards curves over the Weierstrass curves as they require fewer arithmetic operations ...
Armando Faz Hernandez, Julio López
doaj +1 more source
Dual-field modular multiplier using Kogge-Stone adder
As the key operation, modular multiplication is the highest frequency of use in elliptic curve cryptography algorithm. Improving its operation speed is great significant to improve the performance of elliptic curve cryptography processor.
Yang Danyang+4 more
doaj +1 more source