Results 41 to 50 of about 4,167 (184)
A Hardware-Accelerated ECDLP with High-Performance Modular Multiplication
Elliptic curve cryptography (ECC) has become a popular public key cryptography standard. The security of ECC is due to the difficulty of solving the elliptic curve discrete logarithm problem (ECDLP).
Lyndon Judge +2 more
doaj +1 more source
IPChain: Blockchain-Based Security Protocol for IoT Address Management Servers in Smart Homes
The dynamic host configuration protocol (DHCP) servers are forms of an Internet of Things (IoT) address management server (IoTAMS) that gives network configuration settings to newly connected hosts.
Bello Musa Yakubu +2 more
doaj +1 more source
Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order
Ang Yang +3 more
doaj +1 more source
Complexity bounds on Semaev’s naive index calculus method for ECDLP
Since Semaev introduced summation polynomials in 2004, a number of studies have been devoted to improving the index calculus method for solving the elliptic curve discrete logarithm problem (ECDLP) with better complexity than generic methods such as ...
Yokoyama Kazuhiro +3 more
doaj +1 more source
Depth Optimization of FLT-Based Quantum Inversion Circuit
Works on quantum computing and cryptanalysis have increased significantly in the past few years. Various constructions of quantum arithmetic circuits as one of the primary elements in the field have also been proposed. However, there have only been a few
Harashta Tatimma Larasati +4 more
doaj +1 more source
I2PA : An Efficient ABC for IoT [PDF]
Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preserving and lightweight cryptography.
Ciss, Abdoul Aziz +2 more
core +3 more sources
Blockchain technology has attracted a lot of research interest in the last few years. Originally, their consensus algorithm was Hashcash, which is an instance of the so-called Proof-of-Work. Nowadays, there are several competing consensus algorithms, not
Alessio Meneghetti +2 more
doaj +1 more source
An identity-based key infrastructure suitable for messaging applications [PDF]
—Identity-based encryption (IBE) systems are relatively recently proposed; yet they are highly popular for messaging applications since they offer new features such as certificateless infrastructure and anonymous communication. In this paper, we intended
Karatop, Ayse Gul +3 more
core +2 more sources
Starting from the basic form of GN-authenticated key agreement (GN-AK), the current research proposes an improved protocol by integrating a new scalar multiplication technique based on a dual-base chain representation with bases 1/2 and 3.
Nicolae Constantinescu +2 more
doaj +1 more source
MSC: A Unique Chameleon Hash‐Based Off‐Chain Storage Framework for Metaverse Applications
This paper presents the Metaverse Off‐chain Storage Framework based on Chameleon hash (MSC), a unique framework for decentralized systems that supports code or stored data updates without changing on‐chain data. It significantly reduces overhead compared to directly storing data within a smart contract. ABSTRACT Blockchain has evolved into a secure and
Chenxi Xiong, Ting Yang, Gang Mao
wiley +1 more source

