Results 91 to 100 of about 8,381 (240)

Comparison of scalar point multiplication algorithms in a low resource device

open access: yesJournal of King Saud University: Computer and Information Sciences, 2020
Since it was invented, Elliptic Curve Cryptography (ECC) is considered an ideal choice for implementing public key cryptography in resource constrained devices, thanks to its small keys.
Mohamed Ramdani   +2 more
doaj   +1 more source

3BI-ECC: a Decentralized Identity Framework Based on Blockchain Technology and Elliptic Curve Cryptography

open access: yes2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), 2020
Most of the authentication protocols assume the existence of a Trusted Third Party (TTP) in the form of a Certificate Authority or as an authentication server. The main objective of this research is to present an autonomous solution where users could store their credentials, without depending on TTPs.
Maldonado-Ruiz, Daniel   +2 more
openaire   +2 more sources

A Low‐Cost, Open‐Source 3D Printer for Multimaterial and High‐Throughput Direct Ink Writing of Soft and Living Materials

open access: yesAdvanced Materials, Volume 37, Issue 10, March 12, 2025.
The Printess is a low‐cost, open‐source, multimaterial 3D printer for direct ink writing. Built for under $250, it is highly customizable and supports various advanced direct ink writing modalities, including multimaterial mixing, multimaterial multinozzle, and embedded 3D printing.
Jonathan D. Weiss   +14 more
wiley   +1 more source

Stopping time signatures for some algorithms in cryptography [PDF]

open access: yes, 2019
We consider the normalized distribution of the overall running times of some cryptographic algorithms, and what information they reveal about the algorithms.
Deift, Percy   +2 more
core   +1 more source

Cryptography algorithm for wireless channel of CBTC system

open access: yesTongxin xuebao, 2011
As to the disadvantages of RC4 which was used for CBTC system,a new cryptography algorithm based on Montgomery-form ECC was brought forward.Compared with the traditional Montgomery elliptic curve,the improved algorithm would resume the value of y ...
WANG Chao1   +4 more
doaj   +2 more sources

Measurement of Symmetric Cipher on Low Power Devices for Power Grids [PDF]

open access: yes, 2015
The symmetric ciphers are often used in low power devices for its low requirements. This article provides a measurement of AES-128 cipher, which should be used for secure communication in power grid (smart grid) networks.
Fujdiak, R.
core  

Elliptic-Curve Cryptography Implementation on RISC-V Processors for Internet of Things Applications

open access: yesJournal of Engineering
Elliptic-curve cryptography (ECC) is a popular technique of public-key cryptography used for secure communications in Internet of Things (IoT) applications.
Preethi Preethi   +5 more
doaj   +1 more source

Fortifying E-Voting Systems: Integrating Visual Cryptography with ECC and ChaCha20-Poly1305 for Enhanced Security

open access: yesJournal of Communications Software and Systems
The growing reliance on digital technologies demands an urgent advancement of a secure framework for remote voting systems. This paper proposes a novel e-voting framework which is reinforced by a combination of visual cryptography, elliptic curve ...
Gaurav Thakur   +3 more
doaj   +1 more source

Algorithm based on Booth's Encoding Pattern for Fast Scalar Point Multiplication for ECC in Wireless Sensor Networks [PDF]

open access: yes, 2011
With the rapid increase of small devices and its usage, a better suitable security providing mechanism must be incorported keeping the resource constraints of the devices in mind. Elliptic Curve Cryptography (ECC) serves the best and highly suitable for
Levaka, Ravi Teja Reddy
core  

Home - About - Disclaimer - Privacy