Lightweight image encryption for wireless sensor networks using optimized elliptic curve and fuzzy logic. [PDF]
Zarei M +3 more
europepmc +1 more source
Attacks on Elliptic Curve Cryptography Discrete Logarithm Problem (EC-DLP)
Mrs.Santoshi Pote, M. Jayashree
semanticscholar +1 more source
Sybil-resistant and privacy-preserving authentication based on short-term pseudonym for internet of vehicles. [PDF]
Zhang C +4 more
europepmc +1 more source
DA34FL: a robust dynamic accumulator-based authentication and key agreement with preserving model training data integrity for federated learning. [PDF]
Li S, Zhang Y, Bai J, Fan K.
europepmc +1 more source
A survey of hardware implementations of elliptic curve cryptographic systems
Elliptic Curve Cryptography (ECC) has gained much recognition over the last decades and has established itself among the well known public-key cryptography schemes, not least due its smaller key size and relatively lower computational effort compared to ...
Halak, Basel +2 more
core
A Decentralized Signcryption Scheme Based on CFL. [PDF]
Shi L, Liu M.
europepmc +1 more source
SM2-Based Offline/Online Efficient Data Integrity Verification Scheme for Multiple Application Scenarios. [PDF]
Li X, Yi Z, Li R, Wang XA, Li H, Yang X.
europepmc +1 more source
ECAE: An Efficient Certificateless Aggregate Signature Scheme Based on Elliptic Curves for NDN-IoT Environments. [PDF]
Wang C, Wu H, Gan Y, Zhang R, Ma M.
europepmc +1 more source
A flexible and lightweight signcryption scheme for underwater wireless sensor networks. [PDF]
Shah S +8 more
europepmc +1 more source
Secure Ring Signature Scheme for Privacy-Preserving Blockchain. [PDF]
Wang L, Peng C, Tan W.
europepmc +1 more source

