Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm
We propose an asymmetric cryptosystem based on optical scanning cryptography (OSC) and elliptic curve cryptography (ECC) algorithm. In the encryption stage of OSC, an object is encrypted to cosine and sine holograms by two pupil functions calculated via ...
Xiangyu Chang+4 more
doaj +1 more source
Biometric identity-based cryptography for e-Government environment [PDF]
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core +1 more source
An Energy-Efficient Reconfigurable DTLS Cryptographic Engine for End-to-End Security in IoT Applications [PDF]
This paper presents a reconfigurable cryptographic engine that implements the DTLS protocol to enable end-to-end security for IoT. This implementation of the DTLS engine demonstrates 10x reduction in code size and 438x improvement in energy-efficiency ...
Banerjee, Utsav+4 more
core +6 more sources
A Hardware-Accelerated ECDLP with High-Performance Modular Multiplication
Elliptic curve cryptography (ECC) has become a popular public key cryptography standard. The security of ECC is due to the difficulty of solving the elliptic curve discrete logarithm problem (ECDLP).
Lyndon Judge+2 more
doaj +1 more source
Constructing a Cryptosystem Algorithm by Applying the Rosenberg-Strong Pairing Function on the Elliptic Curve Cryptography [PDF]
In this paper, we propose a new algorithm to improve the security of the Elliptic Curve Cryptography algorithm, ECC, using the Rosenberg-Strong pairing function.
Namous Sarah.H.+2 more
doaj +1 more source
Model Proyeksi (X/Z2, Y/Z2) pada Kurva Hesian secara Paralel Menggunakan Mekanisme Kriptografi Kurva Eliptik [PDF]
MODEL PROYEKSI (X/Z2, Y/Z2) PADA KURVA HESIAN SECARA PARALEL MENGGUNAKAN MEKANISME KRIPTOGRAFI KURVA ELIPTIKABSTRAK Suatu kunci publik, Elliptic Curve Cryptography (ECC) dikenal sebagai algoritma yang paling aman yang digunakan untuk memproteksi ...
Weku, W. (Winsy)
core
Hardware Security in the Connected World
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee+4 more
wiley +1 more source
Nested Method for Optimizing Elliptic Curve Scalar Multiplication [PDF]
The algebraic curve that attracted considerable interest in recent years is called Elliptic Curve (EC). This is due to the computational complexity of its arithmetic over a finite field.
N. Ghanim, M. Magamiss
doaj +1 more source
Abstract Variations in Earth's orbit and axial tilt induce climatic changes which are recorded in sedimentary deposits. The frequencies of these cyclical variations are integer combinations of the main secular frequencies of the solar system. Analyzing these cycles in sedimentary records can help establish an astronomical time scale for the geological ...
N. Hoang+7 more
wiley +1 more source
Implementasi Algoritma ECDSA untuk Pengamanan E-Mail (Verifikasi Keaslian Pesan) [PDF]
This final project is discussed about implementation of digital signature on email delivery with java programming language. Digital signature is one of the cryptographic security services that provide assurance to the recipient of the message (receiver).
Prabowo, Pualam Sendi Agung+2 more
core