Results 101 to 110 of about 7,729 (216)

Stopping time signatures for some algorithms in cryptography [PDF]

open access: yes, 2019
We consider the normalized distribution of the overall running times of some cryptographic algorithms, and what information they reveal about the algorithms.
Deift, Percy   +2 more
core   +1 more source

Smart Ticket Protection: An Architecture for Cyber-Protecting Physical Tickets Using Digitally Signed Random Pattern Markers

open access: yes, 2018
In order to counter forgeries of tickets for public transport or mass events, a method to validate them, using printed unique random pattern markers was developed. These markers themselves are unforgeable by their physically random distribution.
Marksteiner, Stefan
core   +1 more source

Novel Method for DNA‐Based Elliptic Curve Cryptography for IoT Devices

open access: yesETRI Journal, 2018
Elliptic curve cryptography (ECC) can achieve relatively good security with a smaller key length, making it suitable for Internet of Things (IoT) devices. DNA‐based encryption has also been proven to have good security.
Harsh Durga Tiwari, Jae Hyung Kim
doaj   +1 more source

ECC Cipher Processor Based On Knapsack Algorithm [PDF]

open access: yes, 2013
Elliptical Curve Cryptography (ECC) provides a secure means of exchanging keys among communicating hosts using the Diffie Hellmen Key Exchange algorithm.
Sharma, Jitendra, Shukla, Prashant
core   +1 more source

Secure and Efficient RNS Approach for Elliptic Curve Cryptography [PDF]

open access: yes, 2016
Scalar multiplication, the main operation in elliptic curve cryptographic protocols, is vulnerable to side-channel (SCA) and fault injection (FA) attacks.
Batina, Lejla   +3 more
core  

Mayfly optimistic hyperelliptic curve cryptosystem

open access: yesFrontiers in Computer Science
Various applications use asymmetric cryptography to secure communications between both parties, and it raises the main issue of generating vast amounts of computation and storage.
Ramireddy Nava Teja Reddy   +7 more
doaj   +1 more source

Measurement of Symmetric Cipher on Low Power Devices for Power Grids [PDF]

open access: yes, 2015
The symmetric ciphers are often used in low power devices for its low requirements. This article provides a measurement of AES-128 cipher, which should be used for secure communication in power grid (smart grid) networks.
Fujdiak, R.
core  

An Optimized Point Multiplication Strategy in Elliptic Curve Cryptography for Resource-Constrained Devices

open access: yesMathematics
Elliptic curve cryptography (ECC) is widely acknowledged as a method for implementing public key cryptography on devices with limited resources thanks to its use of small keys.
Nawras H. Sabbry, Alla B. Levina
doaj   +1 more source

USING MODIFIED STERN SERIES FOR DIGITAL SIGNATURE AUTHENTICATION IN ELLIPTIC CURVE CRYPTOGRAPHY [PDF]

open access: yesICTACT Journal on Communication Technology, 2011
This paper presents the generation of digital signature along with message recovery based on Elliptic Curve Cryptography (ECC) and knapsack algorithm.
Latha Parthiban, Nivetha Shree
doaj  

ENHANCING DATA PRIVACY AND SECURITY IN CLOUD HEALTHCARE SOLUTIONS USING ELLIPTIC CURVE CRYPTOGRAPHY (ECC)

open access: yes, 2019
The rapid adoption of cloud computing in healthcare has revolutionized medical data management by providingscalability, interoperability, and remote access. The change has also increased privacy and security riskssimultaneously, particularly with the sensitive nature of patient health information and the proliferation of IoTbased medical devices.
Vijai Anand Ramar, Veerandra Kumar R
openaire   +2 more sources

Home - About - Disclaimer - Privacy