Results 191 to 200 of about 7,729 (216)
Some of the next articles are maybe not open access.

DPF-ECC: Accelerating Elliptic Curve Cryptography with Floating-Point Computing Power of GPUs

2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2020
Driven by artificial intelligence (AI) and computer vision industries, Graphics Processing Units (GPUs) are now rapidly achieving extraordinary computing power. In particular, the floating-point computing power, which is heavily relied on by graphics rendering and AI computation workload, is developing much faster in GPUs.
Lili Gao   +5 more
openaire   +1 more source

Security and Cryptography in Images and Video Using Elliptic Curve Cryptography (ECC)

2018
Modern cryptosystems work on the principle of exchanging keys and messages over an insecure network as compared to the classical cryptosystem which uses substitution of words or alphabets based on fixed displacement as in the vigenere cipher. This chapter shows that more powerful modern encryption techniques based upon Shannon theory.
Piyush Raghav, Amit Dua
openaire   +2 more sources

Elliptic Curve Cryptography (ECC) Brainpool Curves for Transport Layer Security (TLS) Version 1.3

2020
ECC Brainpool curves were an option for authentication and key exchange in the Transport Layer Security (TLS) protocol version 1.2, but were deprecated by the IETF for use with TLS version 1.3 because they had little usage. However, these curves have not been shown to have significant cryptographical weaknesses, and there is some interest in using ...
Manfred Lochter   +2 more
openaire   +2 more sources

Efficient Encryption Scheme based on Elliptic Curve Cryptography (ECC) and Symmetric algorithm in Wireless Body Area Networks (WBANs) [PDF]

open access: closedAdvanced Science and Technology Letters, 2013
In this paper, we present efficient encryption scheme based on Elliptic Curve Cryptography (ECC) to protect patient's medical data in healthcare system. The proposed scheme used the symmetric cipher algorithm (i.e., DES, modified Feistel algorithm, etc.) to encrypt or decrypt sensitive patient's medical data, and then used ECC to manage the key's ...
Young Sil Lee   +2 more
openalex   +2 more sources

Hardware design and implementation of scalar multiplication in elliptic curve cryptography (ECC) over GF(2163) on FPGA

2015 International Conference on Information and Communication Technologies (ICICT), 2015
Cryptographic algorithms are widely used for security purposes in embedded systems domain. Hardware implementations of cryptographic algorithms have a significant importance because of maximum security provision. There are various approaches for hardware implementation such as ASICs (Application Specific Integrated Circuits), GPPs (General Purpose ...
Muhammad Rashid   +2 more
openaire   +2 more sources

Lightweight Elliptical Curve Cryptography (ECC) for Data Integrity and User Authentication in Smart Transportation IoT System

2019
Data integrity and data security are major issues while transferring data in any Internet of Things (IoT) application. The sensor node as an edge node or end node collects information from the physical environment which is to be preprocessed and sent to the nearby server or cloud server for storage or for further processing.
Pradnya Soman   +3 more
openaire   +2 more sources

Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier

2018
This document describes key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) protocol. In particular, it specifies the use of Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) key agreement in a TLS handshake and the use of Elliptic Curve Digital Signature Algorithm (ECDSA) and Edwards Digital ...
Yoav Nir   +2 more
openaire   +2 more sources

Discrete Wavelet Transform (DWT) Based Triple-stegging With Elliptic Curve Cryptography (ECC)

Proceedings of Second International Conference on Signal Processing, Image Processing and VLSI, 2015
A. C. Nuthan, Shivanand S. Gornale
openaire   +2 more sources

Implementation and Analysis of ECC (Elliptic Curve Cryptography) Security Routing Protocol in NS2

2023 3rd Asian Conference on Innovation in Technology (ASIANCON), 2023
Priyanka More   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy