Results 71 to 80 of about 4,167 (184)

Privacy-Preserved, Provable Secure, Mutually Authenticated Key Agreement Protocol for Healthcare in a Smart City Environment

open access: yesIEEE Access, 2019
Smart home systems can provide health care services for people with special needs in their own homes. Briefly defined, such a smart home has special electronics to enable the remote control of automated devices specifically designed for remote health ...
Shaheena Khatoon   +3 more
doaj   +1 more source

Power Analyze of Elliptic Curve Cryptography for Usage in Wireless Sensor Networks [PDF]

open access: yes, 2011
Wireless Sensor Networks are new emerging technology used in various applications for habitat, health and air pollution monitoring, vehicle tracking etc.
Bikov, Dusan   +3 more
core  

Algorithm based on Booth's Encoding Pattern for Fast Scalar Point Multiplication for ECC in Wireless Sensor Networks [PDF]

open access: yes, 2011
With the rapid increase of small devices and its usage, a better suitable security providing mechanism must be incorported keeping the resource constraints of the devices in mind. Elliptic Curve Cryptography (ECC) serves the best and highly suitable for
Levaka, Ravi Teja Reddy
core  

Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve

open access: yes, 2008
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Several signcryption schemes are proposed throughout the years, each of them having
Beheshti, A. A., Toorani, M.
core   +2 more sources

Analysis of Parallel Montgomery Multiplication in CUDA [PDF]

open access: yes, 2013
For a given level of security, elliptic curve cryptography (ECC) offers improved efficiency over classic public key implementations. Point multiplication is the most common operation in ECC and, consequently, any significant improvement in perfor- mance ...
Liu, Yuheng
core   +1 more source

Atomic cross-chain swap based on private key exchange

open access: yesCybersecurity
Atomic Cross-Chain Swap (ACCS) is one important topic in cryptocurrency, where users can securely and trustlessly exchange assets between two different blockchains.
Zeshuo Zhu, Rui Zhang, Yang Tao
doaj   +1 more source

The generalized method of solving ECDLP using quantum annealing [PDF]

open access: yes
This paper presents a generalization of a method allowing the transformation of the Elliptic Curve Discrete Logarithm Problem (ECDLP) over prime fields to the Quadratic Unconstrained Binary Optimization (QUBO) problem. The original method requires that a
Dzierzkowski, Ɓukasz
core   +1 more source

Year 2010 Issues on Cryptographic Algorithms [PDF]

open access: yes
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core  

Solving ECDLP via List Decoding [PDF]

open access: yes, 2018
We provide a new approach to the elliptic curve discrete logarithm problem (ECDLP). First, we construct Elliptic Codes (EC codes) from the ECDLP.
Fangguo Zhang, Shengli Liu
core  

Session Initiation Protocol Attacks and Challenges

open access: yes, 2012
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP).
Keshavarz, Hassan   +2 more
core  

Home - About - Disclaimer - Privacy