Results 1 to 10 of about 7,660 (176)
Implementasi dan Pengukuran Kinerja Operasi Aritmatika Finite Field Berbasis Polinomial Biner [PDF]
Cryptography is one of the security techniques that secure information confidentiality and information integrity while electronic transaction processing.
Wenny Franciska Senjaya, Budi Rahardjo
doaj +4 more sources
ELLIPTIC-CURVE CRYPTOGRAPHY (ECC) AND ARGON2 ALGORITHM IN PHP USING OPENSSL AND SODIUM LIBRARIES
This paper presents the elliptic-curve cryptography (ECC) and Argon2 algorithm in PHP using OpenSSL and Sodium cryptographic libraries. The vital part of this thesis presents an analysis of the efficiency of elliptic-curve cryptography (ECC) and the ...
Mariusz Duka
doaj +3 more sources
Enhancing IoT security with a DNA-based lightweight cryptography system [PDF]
The rapid increase of internet of things (IoT) devices in our daily lives has highlighted the critical need for strong security measures to protect the integrity and confidentiality of IoT communications.
Sehrish Aqeel+4 more
doaj +2 more sources
Enkripsi SMS menggunakan ECC (Elliptic Curve Cryptography) [PDF]
SMS or Short Message Service is a short messaging service via mobile phone. Although it is part of the first phase of the GSM standard capabilities, SMS is still a service that is widely used by many people.
Mardianto, Eko+2 more
core +1 more source
Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography
Short Weierstrass elliptic curves with underlying hard Elliptic Curve Discrete Logarithm Problem (ECDLP) are widely used in cryptographic applications. A notion of security called Elliptic Curve Cryptography (ECC) security is also suggested in literature
Abhishek Kunal+1 more
doaj +1 more source
Fully distributed certificate authority based on polynomial over elliptic curve for MANET [PDF]
A mobile ad hoc network (MANET) is a wireless communication network, which does not rely on any centralized management or a pre-existing infrastructure. Various certificate authorities (CAs) distributed over the network, each with a periodically updated ...
Ahmad Alomari
doaj +1 more source
Low-Cost Area-Efficient FPGA-Based Multi-Functional ECDSA/EdDSA
In cryptography, elliptic curve cryptography (ECC) is considered an efficient and secure method to implement digital signature algorithms (DSAs). ECC plays an essential role in many security applications, such as transport layer security (TLS), internet ...
Binh Kieu-Do-Nguyen+4 more
doaj +1 more source
The Internet of Things (IoT) as an important technology consists of a heterogeneous and huge number of devices that generates an enormous amount of data in various applications.
Arkan A. Saffer +2 more
doaj +1 more source
Secure Elliptic Curve Crypto-Processor for Real-Time IoT Applications
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low latencies are required, along with security requirements to protect the large number of attack surfaces to which IoT devices are exposed.
Stefano Di Matteo+5 more
doaj +1 more source
Attribute-Based Blind Signature Scheme Based on Elliptic Curve Cryptography
Blind signature is a special digital signature that allows the signer to sign a document without knowing its content. However, in many situations, multiple people need to blindly sign messages.
Rui Ma, Linyue Du
doaj +1 more source