Authentication Through Elliptic Curve Cryptography (ECC) Technique in WMN
International Journal of Information Security and Privacy, 2018Recently, Wireless Mesh Network is deliberated as a significant technology due to its self-healing and self-organizing characteristics. In WMN, data is forwarded through multiple hops to the destination node. One of the factors that impact the network performance is the secure communication delay.
Geetanjali Rathee, Hemraj Saini
openaire +1 more source
Elliptic Curve Cryptography (ECC) Brainpool Curves for Transport Layer Security (TLS) Version 1.3
2020ECC Brainpool curves were an option for authentication and key exchange in the Transport Layer Security (TLS) protocol version 1.2, but were deprecated by the IETF for use with TLS version 1.3 because they had little usage. However, these curves have not been shown to have significant cryptographical weaknesses, and there is some interest in using ...
L. Bruckert, J. Merkle, M. Lochter
openaire +1 more source
EC-ECC: Accelerating Elliptic Curve Cryptography for Edge Computing on Embedded GPU TX2
ACM Transactions on Embedded Computing Systems, 2022Driven by artificial intelligence and computer vision industries, Graphics Processing Units (GPUs) are now rapidly achieving extraordinary computing power. In particular, the NVIDIA Tegra K1/X1/X2 embedded GPU platforms, which are also treated as edge computing devices, are now widely used in embedded environments such as mobile phones, game consoles ...
Jiankuo Dong +5 more
openaire +1 more source
Efficient implementation of elliptic curve cryptography (ECC) on embedded media processors
SPIE Proceedings, 2004Elliptic curve cryptography (ECC) is an excellent candidate for secure embedded multimedia applications due to its small key size and high security protection. The performance profiling of the ECC implementation, such as execution time and data cache stalls, on TriMedia TM1300 and Intel Pentium 4 is conducted in this research.
Yu Hu +3 more
openaire +1 more source
Security and Cryptography in Images and Video Using Elliptic Curve Cryptography (ECC)
2018Modern cryptosystems work on the principle of exchanging keys and messages over an insecure network as compared to the classical cryptosystem which uses substitution of words or alphabets based on fixed displacement as in the vigenere cipher. This chapter shows that more powerful modern encryption techniques based upon Shannon theory.
Piyush Raghav, Amit Dua
openaire +1 more source
Efficient Implementation of Elliptic Curve Cryptography (ECC) for Personal Digital Assistants (PDAs)
Wireless Personal Communications, 2004Wireless devices are characterized by low computational power and memory. In addition to this wireless environment are inherently less secure than their wired counterparts, as anyone can intercept the communication. Hence they require more security.
Amol Dabholkar, Kin Choong Yow
openaire +1 more source
ECC — Elliptic Curves Cryptography
2010Wie versprochen, mochte ich nach dem Gruppengesetz elliptischer Kurven nun die hervorstechendste Anwendung elliptischer Kurven in der Praxis vorstellen: Die Verwendung in der Kryptographie. Insbesondere gehe ich dabei auf Schlusselaustausch. asymmetrische Ver- und Entschlusselung sowie Signierung mit Hilfe von elliptischen Kurven ein.
openaire +1 more source
ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things
Wireless Personal Communications, 2020Constraint Application Protocol (CoAP), an application layer based protocol, is a compressed version of HTTP protocol that is used for communication between lightweight resource constraint devices in Internet of Things (IoT) network. The CoAP protocol is generally associated with connectionless User Datagram Protocol (UDP) and works based on ...
Suman Majumder +4 more
openaire +1 more source
DPF-ECC: Accelerating Elliptic Curve Cryptography with Floating-Point Computing Power of GPUs
2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2020Driven by artificial intelligence (AI) and computer vision industries, Graphics Processing Units (GPUs) are now rapidly achieving extraordinary computing power. In particular, the floating-point computing power, which is heavily relied on by graphics rendering and AI computation workload, is developing much faster in GPUs.
Lili Gao +5 more
openaire +1 more source
High speed hardware implementation of an elliptic curve cryptography (ECC) co-processor
Trendz in Information Sciences & Computing(TISC2010), 2010We present elliptic curve cryptography (ECC) coprocessor, which is dual-field processor with projective coordinator. We have implemented architecture for scalar multiplication, which is key operation in elliptic curve cryptography. Our coprocessor can be adapted both prime field and binary field, also contains a control unit with 256 bit serial and ...
B. MuthuKumar, S. Jeevananthan
openaire +1 more source

