Results 101 to 110 of about 7,729 (216)
Stopping time signatures for some algorithms in cryptography [PDF]
We consider the normalized distribution of the overall running times of some cryptographic algorithms, and what information they reveal about the algorithms.
Deift, Percy+2 more
core +1 more source
In order to counter forgeries of tickets for public transport or mass events, a method to validate them, using printed unique random pattern markers was developed. These markers themselves are unforgeable by their physically random distribution.
Marksteiner, Stefan
core +1 more source
Novel Method for DNA‐Based Elliptic Curve Cryptography for IoT Devices
Elliptic curve cryptography (ECC) can achieve relatively good security with a smaller key length, making it suitable for Internet of Things (IoT) devices. DNA‐based encryption has also been proven to have good security.
Harsh Durga Tiwari, Jae Hyung Kim
doaj +1 more source
ECC Cipher Processor Based On Knapsack Algorithm [PDF]
Elliptical Curve Cryptography (ECC) provides a secure means of exchanging keys among communicating hosts using the Diffie Hellmen Key Exchange algorithm.
Sharma, Jitendra, Shukla, Prashant
core +1 more source
Secure and Efficient RNS Approach for Elliptic Curve Cryptography [PDF]
Scalar multiplication, the main operation in elliptic curve cryptographic protocols, is vulnerable to side-channel (SCA) and fault injection (FA) attacks.
Batina, Lejla+3 more
core
Mayfly optimistic hyperelliptic curve cryptosystem
Various applications use asymmetric cryptography to secure communications between both parties, and it raises the main issue of generating vast amounts of computation and storage.
Ramireddy Nava Teja Reddy+7 more
doaj +1 more source
Measurement of Symmetric Cipher on Low Power Devices for Power Grids [PDF]
The symmetric ciphers are often used in low power devices for its low requirements. This article provides a measurement of AES-128 cipher, which should be used for secure communication in power grid (smart grid) networks.
Fujdiak, R.
core
Elliptic curve cryptography (ECC) is widely acknowledged as a method for implementing public key cryptography on devices with limited resources thanks to its use of small keys.
Nawras H. Sabbry, Alla B. Levina
doaj +1 more source
USING MODIFIED STERN SERIES FOR DIGITAL SIGNATURE AUTHENTICATION IN ELLIPTIC CURVE CRYPTOGRAPHY [PDF]
This paper presents the generation of digital signature along with message recovery based on Elliptic Curve Cryptography (ECC) and knapsack algorithm.
Latha Parthiban, Nivetha Shree
doaj
The rapid adoption of cloud computing in healthcare has revolutionized medical data management by providingscalability, interoperability, and remote access. The change has also increased privacy and security riskssimultaneously, particularly with the sensitive nature of patient health information and the proliferation of IoTbased medical devices.
Vijai Anand Ramar, Veerandra Kumar R
openaire +2 more sources