Results 21 to 30 of about 8,381 (240)
Low-Cost Area-Efficient FPGA-Based Multi-Functional ECDSA/EdDSA
In cryptography, elliptic curve cryptography (ECC) is considered an efficient and secure method to implement digital signature algorithms (DSAs). ECC plays an essential role in many security applications, such as transport layer security (TLS), internet ...
Binh Kieu-Do-Nguyen +4 more
doaj +1 more source
Radio Frequency Identification Mutual Authentication Protocol Based on Elliptic Curve Cryptography [PDF]
Aiming at wireless communication security problem of Radio Frequency Identification(RFID) the based on Elliptic Curve Cryptography(ECC) algorithm,this paper proposes a RFID mutual authentication protocol.It describes in detail the process of the new ...
LIU Boya,LIU Nianyi,YANG Yatao,LI Zichen
doaj +1 more source
The Internet of Things (IoT) as an important technology consists of a heterogeneous and huge number of devices that generates an enormous amount of data in various applications.
Arkan A. Saffer +2 more
doaj +1 more source
Secure Elliptic Curve Crypto-Processor for Real-Time IoT Applications
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low latencies are required, along with security requirements to protect the large number of attack surfaces to which IoT devices are exposed.
Stefano Di Matteo +5 more
doaj +1 more source
Attribute-Based Blind Signature Scheme Based on Elliptic Curve Cryptography
Blind signature is a special digital signature that allows the signer to sign a document without knowing its content. However, in many situations, multiple people need to blindly sign messages.
Rui Ma, Linyue Du
doaj +1 more source
A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware
Cryptography is considered indispensable among security measures applied to data concerning insecure means of transmission. Among various existent algorithms on asymmetric cryptography, we may cite Elliptic Curve Cryptography (ECC), which has been widely
Arielle Verri Lucca +5 more
doaj +1 more source
Methods for using elliptic curves in cryptography [PDF]
Elliptic Curve Cryptography (ECC), a significant modern cryptography, is more secure and robust than most others due to its construction using an elliptic curve and the application of mathematical operations for encryption and key generation. Furthermore,
Obukhov Vadim +4 more
doaj +1 more source
Efficient scalar multiplication of ECC using SMBR and fast septuple formula for IoT
In order to solve the problem between low power of Internet of Things devices and the high cost of cryptography, lightweight cryptography is required. The improvement of the scalar multiplication can effectively reduce the complexity of elliptic curve ...
Chong Guo, Bei Gong
doaj +1 more source
A certificateless Multi-receiver Encryption scheme based on SM2 signature algorithm
The Multi-receiver Encryption (MRE) scheme can meet the secure data transmission requirements in multicast and broadcast scenarios. To meet compliance, critical information infrastructure in China should be protected with Chinese national commercial ...
Jinglin Zou +5 more
doaj +1 more source

