Results 41 to 50 of about 4,167 (184)

A Hardware-Accelerated ECDLP with High-Performance Modular Multiplication

open access: yesInternational Journal of Reconfigurable Computing, 2012
Elliptic curve cryptography (ECC) has become a popular public key cryptography standard. The security of ECC is due to the difficulty of solving the elliptic curve discrete logarithm problem (ECDLP).
Lyndon Judge   +2 more
doaj   +1 more source

IPChain: Blockchain-Based Security Protocol for IoT Address Management Servers in Smart Homes

open access: yesJournal of Sensor and Actuator Networks, 2022
The dynamic host configuration protocol (DHCP) servers are forms of an Internet of Things (IoT) address management server (IoTAMS) that gives network configuration settings to newly connected hosts.
Bello Musa Yakubu   +2 more
doaj   +1 more source

Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols

open access: yesThe Scientific World Journal, 2014
We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order
Ang Yang   +3 more
doaj   +1 more source

Complexity bounds on Semaev’s naive index calculus method for ECDLP

open access: yesJournal of Mathematical Cryptology, 2020
Since Semaev introduced summation polynomials in 2004, a number of studies have been devoted to improving the index calculus method for solving the elliptic curve discrete logarithm problem (ECDLP) with better complexity than generic methods such as ...
Yokoyama Kazuhiro   +3 more
doaj   +1 more source

Depth Optimization of FLT-Based Quantum Inversion Circuit

open access: yesIEEE Access, 2023
Works on quantum computing and cryptanalysis have increased significantly in the past few years. Various constructions of quantum arithmetic circuits as one of the primary elements in the field have also been proposed. However, there have only been a few
Harashta Tatimma Larasati   +4 more
doaj   +1 more source

I2PA : An Efficient ABC for IoT [PDF]

open access: yes, 2019
Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preserving and lightweight cryptography.
Ciss, Abdoul Aziz   +2 more
core   +3 more sources

A New ECDLP-Based PoW Model

open access: yesMathematics, 2020
Blockchain technology has attracted a lot of research interest in the last few years. Originally, their consensus algorithm was Hashcash, which is an instance of the so-called Proof-of-Work. Nowadays, there are several competing consensus algorithms, not
Alessio Meneghetti   +2 more
doaj   +1 more source

An identity-based key infrastructure suitable for messaging applications [PDF]

open access: yes, 2007
—Identity-based encryption (IBE) systems are relatively recently proposed; yet they are highly popular for messaging applications since they offer new features such as certificateless infrastructure and anonymous communication. In this paper, we intended
Karatop, Ayse Gul   +3 more
core   +2 more sources

An Improved GN-AK Protocol Using Double-Base Scalar Multiplication and Point Halving over Elliptic Curves

open access: yesApplied Sciences
Starting from the basic form of GN-authenticated key agreement (GN-AK), the current research proposes an improved protocol by integrating a new scalar multiplication technique based on a dual-base chain representation with bases 1/2 and 3.
Nicolae Constantinescu   +2 more
doaj   +1 more source

MSC: A Unique Chameleon Hash‐Based Off‐Chain Storage Framework for Metaverse Applications

open access: yesInternational Journal of Network Management, Volume 35, Issue 1, January/February 2025.
This paper presents the Metaverse Off‐chain Storage Framework based on Chameleon hash (MSC), a unique framework for decentralized systems that supports code or stored data updates without changing on‐chain data. It significantly reduces overhead compared to directly storing data within a smart contract. ABSTRACT Blockchain has evolved into a secure and
Chenxi Xiong, Ting Yang, Gang Mao
wiley   +1 more source

Home - About - Disclaimer - Privacy