Results 41 to 50 of about 7,729 (216)

Multi-Functional Resource-Constrained Elliptic Curve Cryptographic Processor

open access: yesIEEE Access, 2023
With the rising data evolution, the demand for secured communications over networks is rising immensely. Elliptic Curve Cryptography (ECC) provides an attractive solution to fulfill the requirements of modern network applications.
Binh Kieu Do-Nguyen   +4 more
doaj   +1 more source

I2PA : An Efficient ABC for IoT [PDF]

open access: yes, 2019
Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preserving and lightweight cryptography.
Ciss, Abdoul Aziz   +2 more
core   +3 more sources

Analysis of Elliptic Curve Cryptography (ECC) for Energy Efficiency in Wireless Sensor Networks

open access: yesNUST Journal of Engineering Sciences, 2009
Rapid growth of wireless sensor networks (WSN) in recent times has resulted in greater security requirements. One of the primary concerns in wireless sensor networks is energy efficiency and security mechanisms are no different.  Currently, security in wireless sensor networks is often implemented by symmetric key cryptography due to its low-power ...
Khurram Aziz   +2 more
openaire   +3 more sources

Quantum resource estimates for computing elliptic curve discrete logarithms [PDF]

open access: yes, 2017
We give precise quantum resource estimates for Shor's algorithm to compute discrete logarithms on elliptic curves over prime fields. The estimates are derived from a simulation of a Toffoli gate network for controlled elliptic curve point addition ...
A Joux   +32 more
core   +2 more sources

A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things

open access: yesSensors, 2020
Recent growth in the Internet of Things (IoT) has raised security concerns over the confidentiality of data exchanged between IoT devices and the edge. Many IoT systems adopt asymmetric cryptography to secure their data and communications.
Hisham AlMajed, Ahmad AlMogren
doaj   +1 more source

KRIPTOGRAFI VISUAL PADA GAMBAR BERWARNA (RGB) MENGGUNAKAN ALGORITMA ELLIPTIC CURVE CRYPTOGRAPHY [PDF]

open access: yes, 2020
ABSTRAK Kriptografi berperan penting pada era digital dalam mengamankan data dari peretas. Seiring berkembangnya teknologi, data yang dapat diamankan menggunakan kriptografi semakin luas, salah satunya adalah mengamankan gambar menggunakan kriptografi ...
Della Annisa Zahra, -
core  

Internet security for mobile computing [PDF]

open access: yes, 2017
Mobile devices are now the most dominant computer platform. Every time a mobile web application accesses the internet, the end user’s data is susceptible to malicious attacks.
Davis, Vincent Anthony
core   +1 more source

Design and Implementation of High-Performance ECC Processor with Unified Point Addition on Twisted Edwards Curve

open access: yesSensors, 2020
With the swift evolution of wireless technologies, the demand for the Internet of Things (IoT) security is rising immensely. Elliptic curve cryptography (ECC) provides an attractive solution to fulfill this demand.
Md. Mainul Islam   +4 more
doaj   +1 more source

Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices [PDF]

open access: yes, 2011
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations
Herrera Joancomartí, Jordi   +1 more
core   +4 more sources

Elliptic Curve Cryptography with Machine Learning

open access: yesCryptography
Elliptic Curve Cryptography (ECC) is a technology based on the arithmetic of elliptic curves used to build strong and efficient cryptosystems and infrastructures. Several ECC systems, such as the Diffie–Hellman key exchange and the Elliptic Curve Digital
Jihane Jebrane   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy