Results 41 to 50 of about 7,729 (216)
Multi-Functional Resource-Constrained Elliptic Curve Cryptographic Processor
With the rising data evolution, the demand for secured communications over networks is rising immensely. Elliptic Curve Cryptography (ECC) provides an attractive solution to fulfill the requirements of modern network applications.
Binh Kieu Do-Nguyen+4 more
doaj +1 more source
I2PA : An Efficient ABC for IoT [PDF]
Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preserving and lightweight cryptography.
Ciss, Abdoul Aziz+2 more
core +3 more sources
Analysis of Elliptic Curve Cryptography (ECC) for Energy Efficiency in Wireless Sensor Networks
Rapid growth of wireless sensor networks (WSN) in recent times has resulted in greater security requirements. One of the primary concerns in wireless sensor networks is energy efficiency and security mechanisms are no different. Currently, security in wireless sensor networks is often implemented by symmetric key cryptography due to its low-power ...
Khurram Aziz+2 more
openaire +3 more sources
Quantum resource estimates for computing elliptic curve discrete logarithms [PDF]
We give precise quantum resource estimates for Shor's algorithm to compute discrete logarithms on elliptic curves over prime fields. The estimates are derived from a simulation of a Toffoli gate network for controlled elliptic curve point addition ...
A Joux+32 more
core +2 more sources
A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things
Recent growth in the Internet of Things (IoT) has raised security concerns over the confidentiality of data exchanged between IoT devices and the edge. Many IoT systems adopt asymmetric cryptography to secure their data and communications.
Hisham AlMajed, Ahmad AlMogren
doaj +1 more source
KRIPTOGRAFI VISUAL PADA GAMBAR BERWARNA (RGB) MENGGUNAKAN ALGORITMA ELLIPTIC CURVE CRYPTOGRAPHY [PDF]
ABSTRAK Kriptografi berperan penting pada era digital dalam mengamankan data dari peretas. Seiring berkembangnya teknologi, data yang dapat diamankan menggunakan kriptografi semakin luas, salah satunya adalah mengamankan gambar menggunakan kriptografi ...
Della Annisa Zahra, -
core
Internet security for mobile computing [PDF]
Mobile devices are now the most dominant computer platform. Every time a mobile web application accesses the internet, the end user’s data is susceptible to malicious attacks.
Davis, Vincent Anthony
core +1 more source
With the swift evolution of wireless technologies, the demand for the Internet of Things (IoT) security is rising immensely. Elliptic curve cryptography (ECC) provides an attractive solution to fulfill this demand.
Md. Mainul Islam+4 more
doaj +1 more source
Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices [PDF]
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations
Herrera Joancomartí, Jordi+1 more
core +4 more sources
Elliptic Curve Cryptography with Machine Learning
Elliptic Curve Cryptography (ECC) is a technology based on the arithmetic of elliptic curves used to build strong and efficient cryptosystems and infrastructures. Several ECC systems, such as the Diffie–Hellman key exchange and the Elliptic Curve Digital
Jihane Jebrane+3 more
doaj +1 more source