Results 141 to 150 of about 4,167 (184)
An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things. [PDF]
Guo C +5 more
europepmc +1 more source
A Conditional Privacy-Preserving Identity-Authentication Scheme for Federated Learning in the Internet of Vehicles. [PDF]
Xu S, Liu R.
europepmc +1 more source
ASAP-IIOT: An Anonymous Secure Authentication Protocol for Industrial Internet of Things. [PDF]
Li N, Ma M, Wang H.
europepmc +1 more source
Area-Time-Efficient Secure Comb Scalar Multiplication Architecture Based on Recoding. [PDF]
Zhang Z +6 more
europepmc +1 more source
Enhancing security in instant messaging systems with a hybrid SM2, SM3, and SM4 encryption framework. [PDF]
Lu HJ, Juanatas RA, Abisado MB.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Journal of Discrete Mathematical Sciences and Cryptography, 2020
Multi-proxy signature schemes (MPSS) allow n proxy signers to generate a valid signature on behalf of the original signer. A new efficient self-certified MPSS with message recovery based on the Elliptic Curve Discrete Logarithm Problem (i.e., ECDLP) is ...
N. Tahat +3 more
semanticscholar +1 more source
Multi-proxy signature schemes (MPSS) allow n proxy signers to generate a valid signature on behalf of the original signer. A new efficient self-certified MPSS with message recovery based on the Elliptic Curve Discrete Logarithm Problem (i.e., ECDLP) is ...
N. Tahat +3 more
semanticscholar +1 more source
Quantum information & computation
This paper presents further improvements in the transformation of the Discrete Logarithm Problem (DLP) and Elliptic Curve Discrete Logarithm Problem (ECDLP) over prime fields to the Quadratic Unconstrained Binary Optimization (QUBO) problem.
Michał Wroński, Lukasz Dzierzkowski
semanticscholar +1 more source
This paper presents further improvements in the transformation of the Discrete Logarithm Problem (DLP) and Elliptic Curve Discrete Logarithm Problem (ECDLP) over prime fields to the Quadratic Unconstrained Binary Optimization (QUBO) problem.
Michał Wroński, Lukasz Dzierzkowski
semanticscholar +1 more source
Index Calculus Method for Solving Elliptic Curve Discrete Logarithm Problem Using Quantum Annealing
International Conference on Conceptual Structures, 2021Michał Wroński
semanticscholar +1 more source
Extending Elliptic Curve Cryptography for Quantum Readiness
International Conference on Public Key Infrastructure and its ApplicationsElliptic curve cryptography (ECC) is used for au-thentication, secret sharing, key encryption, and applications such as public key infrastructure (PKI) and transport layer security (TLS). A suitably higher-order elliptic curve is cryptographically secure
Kunal Abhishek
semanticscholar +1 more source
Secure Multiparty Computation over Elliptic Curve Cryptography
Mikailalsys Journal of Advanced Engineering InternationalThis study proposes a secure mobile voting system that integrates elliptic curve cryptography (ECC) with secure multiparty computation (SMPC) to guarantee vote confidentiality, integrity, and verifiability. Designed to enable scalable, privacy-preserving
Domven L. +4 more
semanticscholar +1 more source

