. Unlike black-box cryptography, an adversary in a white-box security model has full access to the implementation of the cryptographic algorithm. Thus, white-box implementation of cryptographic algorithms is more practical. Nevertheless, in recent years,
Yudi Zhang+5 more
openalex +3 more sources
An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography [PDF]
With the rapid development of the Internet of Things, the problem of privacy protection has been paid great attention. Recently, Nikooghadam et al. pointed out that Kumari et al.’s protocol can neither resist off-line guessing attack nor preserve user ...
Shuming Qiu+5 more
openalex +2 more sources
Data Sharing Mechanism of Sensors and Actuators of Industrial IoT Based on Blockchain-Assisted Identity-Based Cryptography. [PDF]
Meng Y, Li J.
europepmc +3 more sources
A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks [PDF]
Shushan Zhao+3 more
openalex +2 more sources
Securing Mobile Ad Hoc Networks Using Enhanced Identity-Based Cryptography [PDF]
Kamal Adli Mehr, Javad Musevi Niya
openalex +2 more sources
Enhancing Security for Mobile Ad hoc Networks by Using Identity Based Cryptography [PDF]
Shohreh Honarbakhsh+3 more
openalex +2 more sources
An Identity-Based Elliptic Curve Cryptography for Mobile Payment Security
Olufunke Rebecca Vincent+3 more
openalex +2 more sources
Efficient Unified Arithmetic for Hardware Cryptography [PDF]
The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF(q), where q = pk and p is a prime integer, have several applications in cryptography, such as RSA algorithm, Diffie-Hellman key exchange algorithm [1 ...
Koc, Cetin Kaya+3 more
core +2 more sources
A distributed key establishment scheme for wireless mesh networks using identity-based cryptography [PDF]
In this paper, we propose a secure and efficient key establishment scheme designed with respect to the unique requirements of Wireless Mesh Networks. Our security model is based on Identity-based key establishment scheme without the utilization of a ...
Karaoglan, Duygu+4 more
core +1 more source
Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage
The key exposure is a serious threat for the security of data integrity auditing. Once the user's private key for auditing is exposed, most of the existing data integrity auditing schemes would inevitably become unable to work. To deal with this problem,
Wenting Shen+3 more
semanticscholar +1 more source