Results 1 to 10 of about 7,660 (176)

Implementasi dan Pengukuran Kinerja Operasi Aritmatika Finite Field Berbasis Polinomial Biner [PDF]

open access: yesJuTISI (Jurnal Teknik Informatika dan Sistem Informasi), 2015
Cryptography is one of the security techniques that secure information confidentiality and information integrity while electronic transaction processing.
Wenny Franciska Senjaya, Budi Rahardjo
doaj   +4 more sources

ELLIPTIC-CURVE CRYPTOGRAPHY (ECC) AND ARGON2 ALGORITHM IN PHP USING OPENSSL AND SODIUM LIBRARIES

open access: diamondInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, 2020
This paper presents the elliptic-curve cryptography (ECC) and Argon2 algorithm in PHP using OpenSSL and Sodium cryptographic libraries. The vital part of this thesis presents an analysis of the efficiency of elliptic-curve cryptography (ECC) and the ...
Mariusz Duka
doaj   +3 more sources

Enhancing IoT security with a DNA-based lightweight cryptography system [PDF]

open access: yesScientific Reports
The rapid increase of internet of things (IoT) devices in our daily lives has highlighted the critical need for strong security measures to protect the integrity and confidentiality of IoT communications.
Sehrish Aqeel   +4 more
doaj   +2 more sources

Enkripsi SMS menggunakan ECC (Elliptic Curve Cryptography) [PDF]

open access: closed, 2010
SMS or Short Message Service is a short messaging service via mobile phone. Although it is part of the first phase of the GSM standard capabilities, SMS is still a service that is widely used by many people.
Mardianto, Eko   +2 more
core   +1 more source

Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography

open access: yesCybernetics and Information Technologies, 2021
Short Weierstrass elliptic curves with underlying hard Elliptic Curve Discrete Logarithm Problem (ECDLP) are widely used in cryptographic applications. A notion of security called Elliptic Curve Cryptography (ECC) security is also suggested in literature
Abhishek Kunal   +1 more
doaj   +1 more source

Fully distributed certificate authority based on polynomial over elliptic curve for MANET [PDF]

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2014
A mobile ad hoc network (MANET) is a wireless communication network, which does not rely on any centralized management or a pre-existing infrastructure. Various certificate authorities (CAs) distributed over the network, each with a periodically updated ...
Ahmad Alomari
doaj   +1 more source

Low-Cost Area-Efficient FPGA-Based Multi-Functional ECDSA/EdDSA

open access: yesCryptography, 2022
In cryptography, elliptic curve cryptography (ECC) is considered an efficient and secure method to implement digital signature algorithms (DSAs). ECC plays an essential role in many security applications, such as transport layer security (TLS), internet ...
Binh Kieu-Do-Nguyen   +4 more
doaj   +1 more source

LIGHTWEIGHT CRYPTOGRAPHY METHOD IN THE INTERNET OF THINGS USING ELLIPTIC CURVE AND CROW SEARCH ALGORITHM

open access: yesScience Journal of University of Zakho, 2023
The Internet of Things (IoT) as an important technology consists of a heterogeneous and huge number of devices that generates an enormous amount of data in various applications.
Arkan A. Saffer   +2 more
doaj   +1 more source

Secure Elliptic Curve Crypto-Processor for Real-Time IoT Applications

open access: yesEnergies, 2021
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low latencies are required, along with security requirements to protect the large number of attack surfaces to which IoT devices are exposed.
Stefano Di Matteo   +5 more
doaj   +1 more source

Attribute-Based Blind Signature Scheme Based on Elliptic Curve Cryptography

open access: yesIEEE Access, 2022
Blind signature is a special digital signature that allows the signer to sign a document without knowing its content. However, in many situations, multiple people need to blindly sign messages.
Rui Ma, Linyue Du
doaj   +1 more source

Home - About - Disclaimer - Privacy