Results 31 to 40 of about 7,729 (216)

A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware

open access: yesJournal of Sensor and Actuator Networks, 2020
Cryptography is considered indispensable among security measures applied to data concerning insecure means of transmission. Among various existent algorithms on asymmetric cryptography, we may cite Elliptic Curve Cryptography (ECC), which has been widely
Arielle Verri Lucca   +5 more
doaj   +1 more source

Methods for using elliptic curves in cryptography [PDF]

open access: yesE3S Web of Conferences
Elliptic Curve Cryptography (ECC), a significant modern cryptography, is more secure and robust than most others due to its construction using an elliptic curve and the application of mathematical operations for encryption and key generation. Furthermore,
Obukhov Vadim   +4 more
doaj   +1 more source

Efficient scalar multiplication of ECC using SMBR and fast septuple formula for IoT

open access: yesEURASIP Journal on Wireless Communications and Networking, 2021
In order to solve the problem between low power of Internet of Things devices and the high cost of cryptography, lightweight cryptography is required. The improvement of the scalar multiplication can effectively reduce the complexity of elliptic curve ...
Chong Guo, Bei Gong
doaj   +1 more source

Elliptic Curve Lightweight Cryptography: A Survey

open access: yesIEEE Access, 2018
Since it was invented in 1986, elliptic curve cryptography (ECC) has been studied widely in industry and academy from different perspectives. Some of these aspects include mathematical foundations, protocol design, curve generation, security proofs ...
Carlos Andres Lara-Nino   +2 more
doaj   +1 more source

Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited

open access: yesJournal of Mathematical Cryptology, 2020
Due to its shorter key size, elliptic curve cryptography (ECC) is gaining more and more popularity. However, if not properly implemented, the resulting cryptosystems may be susceptible to fault attacks.
Joye Marc
doaj   +1 more source

Speeding-Up Elliptic Curve Cryptography Algorithms

open access: yesMathematics, 2022
In recent decades there has been an increasing interest in Elliptic curve cryptography (ECC) and, especially, the Elliptic Curve Digital Signature Algorithm (ECDSA) in practice.
Diana Maimuţ, Alexandru Cristian Matei
doaj   +1 more source

SE-Enc: A Secure and Efficient Encoding Scheme Using Elliptic Curve Cryptography

open access: yesIEEE Access, 2019
Many applications use asymmetric cryptography to secure communications between two parties. One of the main issues with asymmetric cryptography is the need for vast amounts of computation and storage.
Hisham N. Almajed, Ahmad S. Almogren
doaj   +1 more source

Improved and Provably Secure ECC-Based Two-Factor Remote Authentication Scheme with Session Key Agreement

open access: yesMathematics, 2022
The remote authentication scheme is a cryptographic protocol incorporated by user–server applications to prevent unauthorized access and security attacks.
Fairuz Shohaimay, Eddie Shahril Ismail
doaj   +1 more source

ED25519: A New Secure Compatible Elliptic Curve for Mobile Wireless Network Security

open access: yesJordanian Journal of Computers and Information Technology, 2022
Wireless Sensor Networks (WSNs) create various security threats such as application variance in different sectors along with the model of cryptographic primitive and necessity.
MAUSAM DAS, Zenghui Wang
doaj   +1 more source

Crypto-test-lab for security validation of ECC co-processor test infrastructure [PDF]

open access: yes, 2018
© 20xx IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting /republishing this material for advertising or promotional purposes, creating new ...
Lupón Roses, Emilio   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy