Results 101 to 110 of about 8,381 (240)
Novel Method for DNA‐Based Elliptic Curve Cryptography for IoT Devices
Elliptic curve cryptography (ECC) can achieve relatively good security with a smaller key length, making it suitable for Internet of Things (IoT) devices. DNA‐based encryption has also been proven to have good security.
Harsh Durga Tiwari, Jae Hyung Kim
doaj +1 more source
Session Initiation Protocol Attacks and Challenges
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP).
Keshavarz, Hassan +2 more
core
A Survey Report On Elliptic Curve Cryptography [PDF]
The paper presents an extensive and careful study of elliptic curve cryptography (ECC) and its applications. This paper also discuss the arithmetic involved in elliptic curve and how these curve operations is crucial in determining the performance of ...
Dashputre, Samir +2 more
core +1 more source
Elliptic curve cryptography (ECC) is widely acknowledged as a method for implementing public key cryptography on devices with limited resources thanks to its use of small keys.
Nawras H. Sabbry, Alla B. Levina
doaj +1 more source
Mayfly optimistic hyperelliptic curve cryptosystem
Various applications use asymmetric cryptography to secure communications between both parties, and it raises the main issue of generating vast amounts of computation and storage.
Ramireddy Nava Teja Reddy +7 more
doaj +1 more source
A Comparison of the Standardized Versions of ECIES [PDF]
Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures or performing key exchanges. In relation to encryption, the Elliptic Curve Integrated Encryption Scheme (ECIES) is the best known scheme based on ECC,
Gayoso Martínez, Víctor +3 more
core
Implementasi Kombinasi Algoritma Skipjack dan Elliptic Curve Cryptography (ECC) pada Sistem Keamanan File Citra untuk Meminimalkan Entropi dan Meningkatkan Korelasi [PDF]
Tri Anto Aldyansyah
openalex
Secure and Efficient RNS Approach for Elliptic Curve Cryptography [PDF]
Scalar multiplication, the main operation in elliptic curve cryptographic protocols, is vulnerable to side-channel (SCA) and fault injection (FA) attacks.
Batina, Lejla +3 more
core
Implementation of an Elliptic Curve Cryptography (ECC) algorithm in a microcontroller
The transmission of information in a secure manner has been since ancient times a challenge hard to tackle, starting from the immemorial Cesar cipher used by the Romans to the more modern techniques developed in the 20th century. With the coming age of the computer and the internet more advanced and sophisticated algorithms had to be made to resolve ...
openaire +1 more source

