Results 91 to 100 of about 8,381 (240)
Comparison of scalar point multiplication algorithms in a low resource device
Since it was invented, Elliptic Curve Cryptography (ECC) is considered an ideal choice for implementing public key cryptography in resource constrained devices, thanks to its small keys.
Mohamed Ramdani +2 more
doaj +1 more source
Most of the authentication protocols assume the existence of a Trusted Third Party (TTP) in the form of a Certificate Authority or as an authentication server. The main objective of this research is to present an autonomous solution where users could store their credentials, without depending on TTPs.
Maldonado-Ruiz, Daniel +2 more
openaire +2 more sources
The Printess is a low‐cost, open‐source, multimaterial 3D printer for direct ink writing. Built for under $250, it is highly customizable and supports various advanced direct ink writing modalities, including multimaterial mixing, multimaterial multinozzle, and embedded 3D printing.
Jonathan D. Weiss +14 more
wiley +1 more source
Stopping time signatures for some algorithms in cryptography [PDF]
We consider the normalized distribution of the overall running times of some cryptographic algorithms, and what information they reveal about the algorithms.
Deift, Percy +2 more
core +1 more source
Cryptography algorithm for wireless channel of CBTC system
As to the disadvantages of RC4 which was used for CBTC system,a new cryptography algorithm based on Montgomery-form ECC was brought forward.Compared with the traditional Montgomery elliptic curve,the improved algorithm would resume the value of y ...
WANG Chao1 +4 more
doaj +2 more sources
Measurement of Symmetric Cipher on Low Power Devices for Power Grids [PDF]
The symmetric ciphers are often used in low power devices for its low requirements. This article provides a measurement of AES-128 cipher, which should be used for secure communication in power grid (smart grid) networks.
Fujdiak, R.
core
Elliptic-Curve Cryptography Implementation on RISC-V Processors for Internet of Things Applications
Elliptic-curve cryptography (ECC) is a popular technique of public-key cryptography used for secure communications in Internet of Things (IoT) applications.
Preethi Preethi +5 more
doaj +1 more source
The growing reliance on digital technologies demands an urgent advancement of a secure framework for remote voting systems. This paper proposes a novel e-voting framework which is reinforced by a combination of visual cryptography, elliptic curve ...
Gaurav Thakur +3 more
doaj +1 more source
Algorithm based on Booth's Encoding Pattern for Fast Scalar Point Multiplication for ECC in Wireless Sensor Networks [PDF]
With the rapid increase of small devices and its usage, a better suitable security providing mechanism must be incorported keeping the resource constraints of the devices in mind. Elliptic Curve Cryptography (ECC) serves the best and highly suitable for
Levaka, Ravi Teja Reddy
core

