Results 181 to 190 of about 7,729 (216)

Efficient implementation of elliptic curve cryptography (ECC) on embedded media processors

open access: closedSPIE Proceedings, 2004
Elliptic curve cryptography (ECC) is an excellent candidate for secure embedded multimedia applications due to its small key size and high security protection. The performance profiling of the ECC implementation, such as execution time and data cache stalls, on TriMedia TM1300 and Intel Pentium 4 is conducted in this research.
Yu Hu   +3 more
openalex   +3 more sources

Authentication Through Elliptic Curve Cryptography (ECC) Technique in WMN

open access: closedInternational Journal of Information Security and Privacy, 2017
Recently, Wireless Mesh Network is deliberated as a significant technology due to its self-healing and self-organizing characteristics. In WMN, data is forwarded through multiple hops to the destination node. One of the factors that impact the network performance is the secure communication delay.
Geetanjali Rathee, Hemraj Saini
openalex   +3 more sources

An implemented of hybrid cryptography using elliptic curve cryptosystem (ECC) and MD5

open access: closed2016 International Conference on Inventive Computation Technologies (ICICT), 2016
In this paper, using ECC encryption-decryption methodology and the MD5 hash generation algorithm. To develop a more efficient and more secure cryptographic algorithms. It is suitable for all devices due to their confines in memory capacity, computing power, cryptographic support and key sizes.
Miss Manorama Chauhan
openalex   +3 more sources

Efficient implementation of elliptic curve cryptography (ECC) on VLIW-micro-architecture media processor

open access: closed2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763), 2005
Elliptic curve cryptography (ECC) serves as an excellent candidate for secure embedded multimedia applications due to its small key size and high security protection. With performance profiling, several major bottlenecks of the ECC implementation are identified, and some suitable integer multiplication schemes over the VLIW and SIMD architecture are ...
Yu Hen Hu, Qing Li, C.‐C. Jay Kuo
openalex   +3 more sources

Efficient Implementation of Elliptic Curve Cryptography (ECC) for Personal Digital Assistants (PDAs)

open access: closedWireless Personal Communications, 2004
Wireless devices are characterized by low computational power and memory. In addition to this wireless environment are inherently less secure than their wired counterparts, as anyone can intercept the communication. Hence they require more security.
Amol Dabholkar, Kin Choong Yow
openalex   +3 more sources

ECC — Elliptic Curves Cryptography [PDF]

open access: possible, 2010
Wie versprochen, mochte ich nach dem Gruppengesetz elliptischer Kurven nun die hervorstechendste Anwendung elliptischer Kurven in der Praxis vorstellen: Die Verwendung in der Kryptographie. Insbesondere gehe ich dabei auf Schlusselaustausch. asymmetrische Ver- und Entschlusselung sowie Signierung mit Hilfe von elliptischen Kurven ein.
openaire   +1 more source

ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things

Wireless Personal Communications, 2020
Constraint Application Protocol (CoAP), an application layer based protocol, is a compressed version of HTTP protocol that is used for communication between lightweight resource constraint devices in Internet of Things (IoT) network. The CoAP protocol is generally associated with connectionless User Datagram Protocol (UDP) and works based on ...
Mou Dasgupta   +4 more
openaire   +2 more sources

High speed hardware implementation of an elliptic curve cryptography (ECC) co-processor

Trendz in Information Sciences & Computing(TISC2010), 2010
We present elliptic curve cryptography (ECC) coprocessor, which is dual-field processor with projective coordinator. We have implemented architecture for scalar multiplication, which is key operation in elliptic curve cryptography. Our coprocessor can be adapted both prime field and binary field, also contains a control unit with 256 bit serial and ...
S. Jeevananthan, B. MuthuKumar
openaire   +2 more sources

Home - About - Disclaimer - Privacy