Results 81 to 90 of about 423 (151)

BINARY EDWARDS CURVES IN ELLIPTIC CURVE CRYPTOGRAPHY [PDF]

open access: yes, 2013
Edwards curves are a new normal form for elliptic curves that exhibit some cryp- tographically desirable properties and advantages over the typical Weierstrass form.
Enos, Graham   +1 more
core  

Editorial for the Special Issue on Micro Air Vehicles. [PDF]

open access: yesMicromachines (Basel), 2023
Mohsan SAH, Khan MA, Karatas M.
europepmc   +1 more source

Generalized ID-based elgamal signatures and extensions [PDF]

open access: yes, 2008
Ankara : The Department of Computer Engineering and the Institute of Engineering and Science of Bilkent University, 2008.Thesis (Master's) -- Bilkent University, 2008.Includes bibliographical references leaves 58-62.ID-based cryptography helps us to ...
Kalkan, Said
core  

An Efficient identity based Multi-receiver Signcryption Scheme using ECC [PDF]

open access: yes, 2013
Signcryption is a technique of performing signature and encryption in a single logical step. It is a secure and efficient technique of providing security between the sender and the receiver so that the data send by the sender should be made secure from ...
Shweta Khullar   +2 more
core  

Internet of Things Framework for Oxygen Saturation Monitoring in COVID-19 Environment. [PDF]

open access: yesIEEE Internet Things J, 2022
Saha R   +6 more
europepmc   +1 more source

Multi-Recipient Signcryption for Secure Wireless Group Communication [PDF]

open access: yes, 2008
Secure group communication is significant for wireless and mobile computing. Overheads can be reduced efficiently when a sender sends multiple messages to multiple recipients using multi-recipient signcryption schemes.
Xiaolin Gui, Xu\u27an Wang, Yiliang Han
core  

Digital Signcryption [PDF]

open access: yes, 2005
Signcryption is a new cryptographic primitive which simultaneously provides both confidentiality and authenticity. Previously, these two goals had been considered separately, with encryption schemes providing confidentiality and signature schemes ...
Smith, Clayton D.
core  

Home - About - Disclaimer - Privacy