Results 111 to 120 of about 8,381 (240)
USING MODIFIED STERN SERIES FOR DIGITAL SIGNATURE AUTHENTICATION IN ELLIPTIC CURVE CRYPTOGRAPHY [PDF]
This paper presents the generation of digital signature along with message recovery based on Elliptic Curve Cryptography (ECC) and knapsack algorithm.
Latha Parthiban, Nivetha Shree
doaj
Conditional Privacy-Preserving Authentication Scheme Without Using Point Multiplication Operations Based on Elliptic Curve Cryptography (ECC) [PDF]
Jalawi Sulaiman Alshudukhi +2 more
openalex +1 more source
Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing
Cloud computing is a fast-growing industry that offers various online services, including software, computing resources, and databases. Its payment model is usage-based, whereas consistency is based on resource-sharing.
K. Sasikumar, Sivakumar Nagarajan
doaj +1 more source
Abstract— a lot of customers are concerned about their weakness to attack if their critical IT resources are beyond the firewall. The tremendously scalable nature of cloud computing allows users to access vast amounts of data and use computing resources distributed across different interfaces.
openaire +1 more source
A survey of hardware implementations of elliptic curve cryptographic systems
Elliptic Curve Cryptography (ECC) has gained much recognition over the last decades and has established itself among the well known public-key cryptography schemes, not least due its smaller key size and relatively lower computational effort compared to ...
Halak, Basel +2 more
core
87th Annual Meeting of the Meteoritical Society 2025: Abstracts
Meteoritics &Planetary Science, Volume 60, Issue S1, Page 30-350, August 2025.
wiley +1 more source
Elliptic Curve Cryptography (ECC) Brainpool Standard Curves and Curve Generation [PDF]
M. Lochter, J. Merkle
openaire +1 more source
An Implementation of Digital Signature and Key Agreement on IEEE802.15.4 WSN Embedded Device [PDF]
A wireless sensor network (WSN) now becomes popular in context awareness development to distribute critical information and provide knowledge services to everyone at anytime and anywhere.
Amang, Sudarsono, Mike , Yuliana
core

