Results 61 to 70 of about 4,167 (184)

Pairing Free Identity-Based Blind Signature Scheme with Message Recovery

open access: yesCryptography, 2018
With the rapid development of modern technology, personal privacy has become a critical concern in many applications. Various digitalized applications such as online voting systems and the electronic cash systems need authenticity and anonymity.
Salome James   +2 more
doaj   +1 more source

Algorithms and cryptographic protocols using elliptic curves [PDF]

open access: yes, 2007
En els darrers anys, la criptografia amb corbes el.líptiques ha adquirit una importància creixent, fins a arribar a formar part en la actualitat de diferents estàndards industrials.
Miret Biosca, Josep M.   +3 more
core   +3 more sources

An Efficient Elliptic Curve Cryptography‐Based Secure Communication with Privacy Preserving for Autonomous Vehicle

open access: yesJournal of Advanced Transportation, Volume 2024, Issue 1, 2024.
Internet of Vehicles can improve driving and riding experience, provide information needs, reduce environmental pollution, and improve transportation efficiency, thereby promoting the rapid development and application of intelligent transportation. Especially through the advantages of the rapidity of information exchange and the flexibility of real ...
Jiongen Xiao   +5 more
wiley   +1 more source

Computation of the discrete logarithm on elliptic curves of trace one [PDF]

open access: yes, 2005
The security of several elliptic curve cryptosystems is based on the difficulty to compute the discrete logarithm problem. The motivation of using elliptic curves in cryptography is that there is no known sub-exponential algorithm which solves the ...
Monnerat, Jean
core  

Constructing cluster of simple FPGA boards for cryptologic computations [PDF]

open access: yes, 2012
In this paper, we propose an FPGA cluster infrastructure, which can be utilized in implementing cryptanalytic attacks and accelerating cryptographic operations.
Doroz, Yarkin   +3 more
core   +1 more source

An Elliptic Curve-based Signcryption Scheme with Forward Secrecy

open access: yes, 2012
An elliptic curve-based signcryption scheme is introduced in this paper that effectively combines the functionalities of digital signature and encryption, and decreases the computational costs and communication overheads in comparison with the ...
Ali Asghar Beheshti S   +2 more
core   +2 more sources

Approach to pairing inversions without solving Miller inversion [PDF]

open access: yes, 2012
In the present paper, we show that the pairinginversion problem of Atei pairing can be solved under theassumption that we have a generic algorithm for solving “exponentiationinversion” problem. With such an algorithm, theinversion problem of Atei pairing
Kanayama Naoki   +3 more
core   +1 more source

Certificateless Anonymous Authentication Scheme Supporting Illegal Signatures Localization for Internet of Vehicles [PDF]

open access: yesJisuanji gongcheng
In the Internet of Vehicles (IoV) environment, vehicles are connected to public networks through the Internet and information is vulnerable to various malicious attacks from attackers during transmission.
YANG Xiaodong, LI Muzi, MA Guozu, LI Songyu, WANG Caifen
doaj   +1 more source

Efficient and flexible password authenticated key agreement for Voice over Internet Protocol session initiation protocol using smart card [PDF]

open access: yes, 2013
Providing a suitable key agreement protocol for session initiation protocol is crucial to protecting the communication among the users over the open channel.
Cai, Zhihua, Tang, Shanyu, Zhang, Liping
core   +1 more source

Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors [PDF]

open access: yes, 2015
Resource constraints in smart devices demand an efficient cryptosystem that allows for low power and memory consumption. This has led to popularity of comparatively efficient Elliptic curve cryptog-raphy (ECC).
Malik, Yasir
core   +1 more source

Home - About - Disclaimer - Privacy