Results 71 to 80 of about 24,382 (331)

A DSP Based POD Implementation for High Speed Multimedia Communications

open access: yesEURASIP Journal on Advances in Signal Processing, 2002
In the cable network services, the audio/video entertainment contents should be protected from unauthorized copying, intercepting, and tampering. Point-of-deployment (POD) security module, proposed by OpenCableTM, allows viewers to receive secure cable ...
Chang Nian Zhang   +3 more
doaj   +1 more source

IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY

open access: yesMalaysian Journal of Computing, 2021
Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker.
Md Nizam Udin   +5 more
doaj   +1 more source

Combined small subgroups and side-channel attack on elliptic curves with cofactor divisible by 2m [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2019
Nowadays, alternative models of elliptic curves like Montgomery, Edwards, twisted Edwards, Hessian, twisted Hessian, Huff’s curves and many others are very popular and many people use them in cryptosystems which are based on elliptic curve cryptography ...
Michał Wrońska
doaj   +1 more source

Inverse Design in Nanophotonics via Representation Learning

open access: yesAdvanced Optical Materials, EarlyView.
This review frames machine learning (ML) in nanophotonics through a classification based on where ML is applied. We categorize methods as either output‐side, which create differentiable surrogates for solving Maxwell's partial differential equations (PDEs), or input‐side, which learn compact representations of device geometry.
Reza Marzban   +2 more
wiley   +1 more source

Phase-Image-Encryption-Based Elliptic Curve and Double-Random-Phase Encoding

open access: yesEngineering Proceedings
In this paper, we proposed an enhanced asymmetric cryptosystem scheme for image encryption using a combination of Elliptic Curve and Fourier transformations. Our proposed encryption and decryption process is highly secure with a smaller key size compared
Arabind Kumar, Sanjay Yadav, Tarul Garg
doaj   +1 more source

Smart Grid Communication Under Elliptic Curve Cryptography [PDF]

open access: hybrid, 2023
B. Prabakaran   +2 more
openalex   +1 more source

Tuning Solid‐State Fluorescence in BODIPY Dyes through Substitution‐Controlled Packing Motifs

open access: yesAdvanced Optical Materials, EarlyView.
A systematic structure–property study reveals how substitution patterns in BODIPY dyes control supramolecular packing and solid‐state emission. The interplay of substituent type, packing motif, and π–π overlap governs emission color and efficiency. Abstract Understanding how molecular packing governs solid‐state fluorescence is key to unlocking new ...
Tim Patten   +4 more
wiley   +1 more source

Secure Image Transmission Using Chaotic-Enhanced Elliptic Curve Cryptography

open access: yesIEEE Access, 2020
In this paper, a novel scheme for secure and real time image transmission is introduced. The scheme uses a block-based elliptic curve (BBEC) public key encryption as a first stage of encryption so it solves the key distribution and management problem of ...
Roayat Ismail Abdelfatah
doaj   +1 more source

Algorithm based on Booth's Encoding Pattern for Fast Scalar Point Multiplication for ECC in Wireless Sensor Networks [PDF]

open access: yes, 2011
With the rapid increase of small devices and its usage, a better suitable security providing mechanism must be incorported keeping the resource constraints of the devices in mind. Elliptic Curve Cryptography (ECC) serves the best and highly suitable for
Levaka, Ravi Teja Reddy
core  

Securing the Data in Clouds with Hyperelliptic Curve Cryptography

open access: yes, 2014
In todays world, Cloud computing has attracted research communities as it provides services in reduced cost due to virtualizing all the necessary resources. Even modern business architecture depends upon Cloud computing .As it is a internet based utility,
Agrawal, Tanmay   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy