Results 201 to 210 of about 8,381 (240)
HSTL IO Standards Based Low Power Implementation of Elliptic Curve Cryptography (ECC) on FPGA
Pushpanjali Pandey +5 more
openaire +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763), 2005
Elliptic curve cryptography (ECC) serves as an excellent candidate for secure embedded multimedia applications due to its small key size and high security protection. With performance profiling, several major bottlenecks of the ECC implementation are identified, and some suitable integer multiplication schemes over the VLIW and SIMD architecture are ...
null Yu Hu, null Qing Li, C.-C.J. Kuo
openaire +1 more source
Elliptic curve cryptography (ECC) serves as an excellent candidate for secure embedded multimedia applications due to its small key size and high security protection. With performance profiling, several major bottlenecks of the ECC implementation are identified, and some suitable integer multiplication schemes over the VLIW and SIMD architecture are ...
null Yu Hu, null Qing Li, C.-C.J. Kuo
openaire +1 more source
An implemented of hybrid cryptography using elliptic curve cryptosystem (ECC) and MD5
2016 International Conference on Inventive Computation Technologies (ICICT), 2016In this paper, using ECC encryption-decryption methodology and the MD5 hash generation algorithm. To develop a more efficient and more secure cryptographic algorithms. It is suitable for all devices due to their confines in memory capacity, computing power, cryptographic support and key sizes.
openaire +1 more source
Elliptic Curve Cryptography (ECC) for a Lightweight Public Key Infrastructure (PKI)
2022Jalal Laassiri +3 more
openaire +1 more source
Secured Image Transmission Using Elliptic Curve Cryptography (ECC)
Journal of Xidian University, 2020openaire +1 more source
Security in quantum cryptography
Reviews of Modern Physics, 2022Christopher Portmann, Renato Renner
exaly
The role of adsorbed hydroxide in hydrogen evolution reaction kinetics on modified platinum
Nature Energy, 2020Ian T Mccrum, Marc T M Koper
exaly
Entanglement-based secure quantum cryptography over 1,120 kilometres
Nature, 2020Juan Yin, Yu-Huai Li, Sheng-Kai Liao
exaly
Implementation and Analysis of ECC (Elliptic Curve Cryptography) Security Routing Protocol in NS2
2023 3rd Asian Conference on Innovation in Technology (ASIANCON), 2023Priyanka More +2 more
openaire +1 more source

