Results 81 to 90 of about 8,381 (240)
Blockweave: An Arweave‐Based Decentralized Storage Solution to Tackle the Blockchain Trilemma
Leveraging Arweave's blockweave and Proof‐of‐Access consensus, this framework reduces on‐chain metadata to 48 bytes, enabling throughput up to 7200 TPS, 99%$$ 99\% $$ storage savings, and robust security (Q(0.4)=0.82)$$ \left(\mathrm{Q}(0.4)=0.82\right) $$ while achieving Tier‐S decentralization on $300 mining nodes.
Saha Reno, Koushik Roy, Tamanna Tabassum
wiley +1 more source
A Subexponential Algorithm for Evaluating Large Degree Isogenies
An isogeny between elliptic curves is an algebraic morphism which is a group homomorphism. Many applications in cryptography require evaluating large degree isogenies between elliptic curves efficiently. For ordinary curves of the same endomorphism ring,
Jao, David, Soukharev, Vladimir
core +1 more source
Towards Sustainable IoT: A Digital Signature‐Enhanced Federated Learning Approach
ABSTRACT Federated Learning (FL) is emerging as a premier paradigm for privacy‐preserved Machine Learning (ML), enabling devices to train models without central data pooling collaboratively. In the contemporary Internet of Things (IoT) landscape, characterized by escalating energy consumption and associated carbon footprint, FL is recognized not merely
Shahida Hafeezan Qureshi +5 more
wiley +1 more source
IMAGE ENCRYPTION USING ELLIPTIC CURVE CRYPTOGRAPHY [PDF]
This paper deals with encryption of image using Elliptic curve cryptography (ECC).Elliptic curve cryptography (ECC) is an approach to public key cryptography based on algebraic structure of elliptic curves over finite fields. Basic ElGamal elliptic curve
Shukla, Ashutosh
core +1 more source
Security of Portable Document Format (PDF) Using Elliptic Curve Cryptography (ECC) Algorithm
Penggunaan dokumen digital telah banyak digunakan pada berbagai kalangan, organisasi ataupun instansi. Salah satu dokumen digital yang sering digunakan adalah portable document format (PDF). Diperlukan sebuah algoritma yang diterapkan dalam perangkat lunak, sehingga dapat mengamankan dokumen tersebut dari pihak-pihak yang dapat merugikan.
Taopan, Gever Imanuel +2 more
openaire +1 more source
Analytical Study of Hybrid Techniques for Image Encryption and Decryption
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption ...
Chiranji Lal Chowdhary +5 more
doaj +1 more source
Can NSEC5 be practical for DNSSEC deployments? [PDF]
NSEC5 is proposed modification to DNSSEC that simultaneously guarantees two security properties: (1) privacy against offline zone enumeration, and (2) integrity of zone contents, even if an adversary compromises the authoritative nameserver responsible ...
Goldberg, Sharon +6 more
core
ABSTRACT Recent advances in audiological early intervention and hearing technologies have significantly improved access to spoken language for children with hearing loss (CwHL), but many CwHL require additional support to match the language development of their peers with normal hearing (PwNH).
Nuzhat Sultana +2 more
wiley +1 more source
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
For the issues that the existing RFID security authentication scheme based on elliptic curve cryptography (ECC)can not meet the requirements of mutual authentication,privacy protection and forward security,a RFID security authentication scheme based on ...
Wumei ZHANG
doaj +2 more sources
COMPARATIVE ANALYSIS OF MOD-ECDH ALGORITHM WITH VARIOUS ALGORITHMS [PDF]
Cryptography is a well-known and well-researched topic for ages. Cryptography is the first line of defense for any networked system. By using Symmetric as well as Asymmetric Cryptography a lot of algorithms are developed. From the security point of view,
O Sri Nagesh, Vankamamidi S Naresh
doaj +1 more source

