Results 101 to 110 of about 8,381 (240)

Novel Method for DNA‐Based Elliptic Curve Cryptography for IoT Devices

open access: yesETRI Journal, 2018
Elliptic curve cryptography (ECC) can achieve relatively good security with a smaller key length, making it suitable for Internet of Things (IoT) devices. DNA‐based encryption has also been proven to have good security.
Harsh Durga Tiwari, Jae Hyung Kim
doaj   +1 more source

Session Initiation Protocol Attacks and Challenges

open access: yes, 2012
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP).
Keshavarz, Hassan   +2 more
core  

A Survey Report On Elliptic Curve Cryptography [PDF]

open access: yes, 2011
The paper presents an extensive and careful study of elliptic curve cryptography (ECC) and its applications. This paper also discuss the arithmetic involved in elliptic curve  and how these curve operations is crucial in determining the performance of ...
Dashputre, Samir   +2 more
core   +1 more source

An Optimized Point Multiplication Strategy in Elliptic Curve Cryptography for Resource-Constrained Devices

open access: yesMathematics
Elliptic curve cryptography (ECC) is widely acknowledged as a method for implementing public key cryptography on devices with limited resources thanks to its use of small keys.
Nawras H. Sabbry, Alla B. Levina
doaj   +1 more source

Mayfly optimistic hyperelliptic curve cryptosystem

open access: yesFrontiers in Computer Science
Various applications use asymmetric cryptography to secure communications between both parties, and it raises the main issue of generating vast amounts of computation and storage.
Ramireddy Nava Teja Reddy   +7 more
doaj   +1 more source

A Comparison of the Standardized Versions of ECIES [PDF]

open access: yes, 2010
Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures or performing key exchanges. In relation to encryption, the Elliptic Curve Integrated Encryption Scheme (ECIES) is the best known scheme based on ECC,
Gayoso Martínez, Víctor   +3 more
core  

Secure and Efficient RNS Approach for Elliptic Curve Cryptography [PDF]

open access: yes, 2016
Scalar multiplication, the main operation in elliptic curve cryptographic protocols, is vulnerable to side-channel (SCA) and fault injection (FA) attacks.
Batina, Lejla   +3 more
core  

Implementation of an Elliptic Curve Cryptography (ECC) algorithm in a microcontroller

open access: yes, 2022
The transmission of information in a secure manner has been since ancient times a challenge hard to tackle, starting from the immemorial Cesar cipher used by the Romans to the more modern techniques developed in the 20th century. With the coming age of the computer and the internet more advanced and sophisticated algorithms had to be made to resolve ...
openaire   +1 more source

ISEV2025 Abstract Book

open access: yes
Journal of Extracellular Vesicles, Volume 14, Issue S1, October 2025.
wiley   +1 more source

Home - About - Disclaimer - Privacy