Results 51 to 60 of about 7,729 (216)

Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm

open access: yesScientific Reports, 2022
We propose an asymmetric cryptosystem based on optical scanning cryptography (OSC) and elliptic curve cryptography (ECC) algorithm. In the encryption stage of OSC, an object is encrypted to cosine and sine holograms by two pupil functions calculated via ...
Xiangyu Chang   +4 more
doaj   +1 more source

Biometric identity-based cryptography for e-Government environment [PDF]

open access: yes, 2014
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core   +1 more source

An Energy-Efficient Reconfigurable DTLS Cryptographic Engine for End-to-End Security in IoT Applications [PDF]

open access: yes, 1957
This paper presents a reconfigurable cryptographic engine that implements the DTLS protocol to enable end-to-end security for IoT. This implementation of the DTLS engine demonstrates 10x reduction in code size and 438x improvement in energy-efficiency ...
Banerjee, Utsav   +4 more
core   +6 more sources

A Hardware-Accelerated ECDLP with High-Performance Modular Multiplication

open access: yesInternational Journal of Reconfigurable Computing, 2012
Elliptic curve cryptography (ECC) has become a popular public key cryptography standard. The security of ECC is due to the difficulty of solving the elliptic curve discrete logarithm problem (ECDLP).
Lyndon Judge   +2 more
doaj   +1 more source

Constructing a Cryptosystem Algorithm by Applying the Rosenberg-Strong Pairing Function on the Elliptic Curve Cryptography [PDF]

open access: yesBIO Web of Conferences
In this paper, we propose a new algorithm to improve the security of the Elliptic Curve Cryptography algorithm, ECC, using the Rosenberg-Strong pairing function.
Namous Sarah.H.   +2 more
doaj   +1 more source

Model Proyeksi (X/Z2, Y/Z2) pada Kurva Hesian secara Paralel Menggunakan Mekanisme Kriptografi Kurva Eliptik [PDF]

open access: yes, 2012
MODEL PROYEKSI (X/Z2, Y/Z2) PADA KURVA HESIAN SECARA PARALEL MENGGUNAKAN MEKANISME KRIPTOGRAFI KURVA ELIPTIKABSTRAK Suatu kunci publik, Elliptic Curve Cryptography (ECC) dikenal sebagai algoritma yang paling aman yang digunakan untuk memproteksi ...
Weku, W. (Winsy)
core  

Hardware Security in the Connected World

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 15, Issue 3, September 2025.
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee   +4 more
wiley   +1 more source

Nested Method for Optimizing Elliptic Curve Scalar Multiplication [PDF]

open access: yesEngineering and Technology Journal, 2017
The algebraic curve that attracted considerable interest in recent years is called Elliptic Curve (EC). This is due to the computational complexity of its arithmetic over a finite field.
N. Ghanim, M. Magamiss
doaj   +1 more source

AstroGeoFit. A Genetic Algorithm and Bayesian Approach for the Astronomical Calibration of the Geological Timescale

open access: yesPaleoceanography and Paleoclimatology, Volume 40, Issue 8, August 2025.
Abstract Variations in Earth's orbit and axial tilt induce climatic changes which are recorded in sedimentary deposits. The frequencies of these cyclical variations are integer combinations of the main secular frequencies of the solar system. Analyzing these cycles in sedimentary records can help establish an astronomical time scale for the geological ...
N. Hoang   +7 more
wiley   +1 more source

Implementasi Algoritma ECDSA untuk Pengamanan E-Mail (Verifikasi Keaslian Pesan) [PDF]

open access: yes, 2010
This final project is discussed about implementation of digital signature on email delivery with java programming language. Digital signature is one of the cryptographic security services that provide assurance to the recipient of the message (receiver).
Prabowo, Pualam Sendi Agung   +2 more
core  

Home - About - Disclaimer - Privacy