Results 71 to 80 of about 20,688 (169)

Elliptic curve cryptography and biometrics for iot authentication [PDF]

open access: yesSerbian Journal of Electrical Engineering
The Internet of Things (IoT) is now present in every aspect of our daily lives because of its ability to offer remote services. Unfortunately, the insecure transmission of user data in open channels caused by this significant use of IoT networks
Dargaoui Souhayla   +6 more
doaj   +1 more source

Metrics on the Sets of Nonsupersingular Elliptic Curves in Simplified Weierstrass Form over Finite Fields of Characteristic Two

open access: yesInternational Journal of Mathematics and Mathematical Sciences, 2015
Elliptic curves have a wide variety of applications in computational number theory such as elliptic curve cryptography, pairing based cryptography, primality tests, and integer factorization.
Keisuke Hakuta
doaj   +1 more source

FPGA Implementation of Elliptic Curve Cryptoprocessor for Perceptual Layer of the Internet of Things

open access: yesEAI Endorsed Transactions on Security and Safety, 2018
Today’s developing era data and information security plays an important role in unsecured communication between Internet of Things (IoT) elements. In IoT, data are transmitted in plaintext for many reasons.
V. Kamalakannan, S. Tamilselvan
doaj   +1 more source

Algorithm based on Booth's Encoding Pattern for Fast Scalar Point Multiplication for ECC in Wireless Sensor Networks [PDF]

open access: yes, 2011
With the rapid increase of small devices and its usage, a better suitable security providing mechanism must be incorported keeping the resource constraints of the devices in mind. Elliptic Curve Cryptography (ECC) serves the best and highly suitable for
Levaka, Ravi Teja Reddy
core  

Integrating identity-based cryptography in IMS service authentication

open access: yes, 2009
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very
Abid, Mohamed   +3 more
core   +6 more sources

A Subexponential Algorithm for Evaluating Large Degree Isogenies

open access: yes, 2010
An isogeny between elliptic curves is an algebraic morphism which is a group homomorphism. Many applications in cryptography require evaluating large degree isogenies between elliptic curves efficiently. For ordinary curves of the same endomorphism ring,
Jao, David, Soukharev, Vladimir
core   +1 more source

Analysis of the Fault Attack ECDLP over Prime Field

open access: yesJournal of Applied Mathematics, 2011
In 2000, Biehl et al. proposed a fault-based attack on elliptic curve cryptography. In this paper, we refined the fault attack method. An elliptic curve E is defined over prime field 𝔽p with base point P∈E(𝔽p).
Mingqiang Wang, Tao Zhan
doaj   +1 more source

Multiple point compression on curves [PDF]

open access: yes, 2014
Multiple point compression is an important feature to improve the implementation of elliptic curve cryptography. This can be extended to other curves, in particular hyperelliptic curves, with divisors represented in Mumford ...
Fan, X.   +3 more
core   +1 more source

High-Performance Elliptic Curve Cryptography: A SIMD Approach to Modern Curves (Extended Thesis Summary)

open access: yesCLEI Electronic Journal
Cryptography based on elliptic curves is endowed with efficient methods for public-key cryptography. Recent research has shown the superiority of the Montgomery and Edwards curves over the Weierstrass curves as they require fewer arithmetic operations ...
Armando Faz Hernandez, Julio López
doaj   +1 more source

Dual-field modular multiplier using Kogge-Stone adder

open access: yesDianzi Jishu Yingyong, 2019
As the key operation, modular multiplication is the highest frequency of use in elliptic curve cryptography algorithm. Improving its operation speed is great significant to improve the performance of elliptic curve cryptography processor.
Yang Danyang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy