Results 31 to 40 of about 8,381 (240)

Elliptic Curve Lightweight Cryptography: A Survey

open access: yesIEEE Access, 2018
Since it was invented in 1986, elliptic curve cryptography (ECC) has been studied widely in industry and academy from different perspectives. Some of these aspects include mathematical foundations, protocol design, curve generation, security proofs ...
Carlos Andres Lara-Nino   +2 more
doaj   +1 more source

SE-Enc: A Secure and Efficient Encoding Scheme Using Elliptic Curve Cryptography

open access: yesIEEE Access, 2019
Many applications use asymmetric cryptography to secure communications between two parties. One of the main issues with asymmetric cryptography is the need for vast amounts of computation and storage.
Hisham N. Almajed, Ahmad S. Almogren
doaj   +1 more source

Crypto-test-lab for security validation of ECC co-processor test infrastructure [PDF]

open access: yes, 2018
© 20xx IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting /republishing this material for advertising or promotional purposes, creating new ...
Lupón Roses, Emilio   +2 more
core   +1 more source

Speeding-Up Elliptic Curve Cryptography Algorithms

open access: yesMathematics, 2022
In recent decades there has been an increasing interest in Elliptic curve cryptography (ECC) and, especially, the Elliptic Curve Digital Signature Algorithm (ECDSA) in practice.
Diana Maimuţ, Alexandru Cristian Matei
doaj   +1 more source

Quantum resource estimates for computing elliptic curve discrete logarithms [PDF]

open access: yes, 2017
We give precise quantum resource estimates for Shor's algorithm to compute discrete logarithms on elliptic curves over prime fields. The estimates are derived from a simulation of a Toffoli gate network for controlled elliptic curve point addition ...
A Joux   +32 more
core   +2 more sources

Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited

open access: yesJournal of Mathematical Cryptology, 2020
Due to its shorter key size, elliptic curve cryptography (ECC) is gaining more and more popularity. However, if not properly implemented, the resulting cryptosystems may be susceptible to fault attacks.
Joye Marc
doaj   +1 more source

Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices [PDF]

open access: yes, 2011
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations
Herrera Joancomartí, Jordi   +1 more
core   +4 more sources

Improved and Provably Secure ECC-Based Two-Factor Remote Authentication Scheme with Session Key Agreement

open access: yesMathematics, 2022
The remote authentication scheme is a cryptographic protocol incorporated by user–server applications to prevent unauthorized access and security attacks.
Fairuz Shohaimay, Eddie Shahril Ismail
doaj   +1 more source

Error analysis and detection procedures for elliptic curve cryptography

open access: yesAin Shams Engineering Journal, 2019
In this paper, a fault detection scheme is introduced with the ability to perform with increased protection and reliability of the Elliptic Curve Cryptography (ECC) in realistic environments at a competitive price point.
Naglaa F. Saudy   +2 more
doaj   +1 more source

I2PA : An Efficient ABC for IoT [PDF]

open access: yes, 2019
Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preserving and lightweight cryptography.
Ciss, Abdoul Aziz   +2 more
core   +3 more sources

Home - About - Disclaimer - Privacy