Results 61 to 70 of about 8,381 (240)
Analysis of Parallel Montgomery Multiplication in CUDA [PDF]
For a given level of security, elliptic curve cryptography (ECC) offers improved efficiency over classic public key implementations. Point multiplication is the most common operation in ECC and, consequently, any significant improvement in perfor- mance ...
Liu, Yuheng
core +1 more source
Chameleon: a Blind Double Trapdoor Hash Function for Securing AMI Data Aggregation [PDF]
Data aggregation is an integral part of Advanced Metering Infrastructure (AMI) deployment that is implemented by the concentrator. Data aggregation reduces the number of transmissions, thereby reducing communication costs and increasing the bandwidth ...
Keoh, Sye Loong +5 more
core +1 more source
Abstract Shape estimation of sweet potato (SP) storage roots is inherently challenging due to their varied size and shape characteristics. Even measuring “simple” metrics, such as length and diameter, requires significant time investments either directly in‐field or afterward using automated graders.
Hoang M. Nguyen +8 more
wiley +1 more source
Securing the Data in Clouds with Hyperelliptic Curve Cryptography
In todays world, Cloud computing has attracted research communities as it provides services in reduced cost due to virtualizing all the necessary resources. Even modern business architecture depends upon Cloud computing .As it is a internet based utility,
Agrawal, Tanmay +3 more
core +1 more source
Global Picture of Lunar Basalt Chronology Based on the Automatic Classification of Craters
Abstract One major pathway for studying lunar volcanism evolution is to construct a timeline for the emplacement of basalts. The crater size‐frequency distribution (CSFD) is a pivotal method for dating lunar basalt units. Building upon two previously published lunar impact crater databases (diameters ≥1–2 km), this study integrated these databases and ...
Lan Jin +9 more
wiley +1 more source
An Enhancement of the Elliptic Curve Cryptography by Using the PairingFunction
In this paper, we propose two new algorithms to increase the security of the Elliptic Curve Cryptography (ECC) by using a pairing function. The two algorithms are based on using two pairing functions, which are the Cantor pairing function and the Elegant
Sarah Hatem Namous +2 more
doaj +1 more source
Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors [PDF]
Resource constraints in smart devices demand an efficient cryptosystem that allows for low power and memory consumption. This has led to popularity of comparatively efficient Elliptic curve cryptog-raphy (ECC).
Malik, Yasir
core +1 more source
Generic Quantum‐Safe IIoT Forensics Framework (QS‐IIoT‐F) ABSTRACT The continuous evolution of quantum computing has shown novel and transformative possibilities and critical implications for the Industrial Internet of Things (IIoT) forensic processes.
Victor R. Kebande
wiley +1 more source
Hardware Security in the Connected World
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee +4 more
wiley +1 more source
Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic Algorithms [PDF]
The key management is an important area of research in internet applications, because protecting secret messages during transmission becomes an essential issue for the Internet. Elliptic Curve Cryptography (ECC) has attracted the attention of researchers
Hala Bahjat Abdul Wahab +2 more
doaj +1 more source

