Results 31 to 40 of about 12,967 (325)
A STUDY OF BILINEAR MAPS IN WIRELESS SENSOR NETWORKS
In the past, a large part of security requirements of wireless sensor networks (WSN) were fulfilled by symmetric cryptography systems. But, today by introduction of new needs in these networks and their security development, researchers of security and ...
Reza Alimoradi +2 more
doaj +1 more source
PRESTvO: PRivacy Enabled Smartphone Based Access to Vehicle On-Board Units
Smartphones are quickly moving toward complementing or even replacing traditional car keys. We advocate a role-based access control policy mixed with attributes that facilitates access to various functionalities of vehicular on-board units from ...
Bogdan Groza +4 more
doaj +1 more source
Practical Certificate-Less Infrastructure with Application in TLS
We propose highly efficient certificate-less (CL) protocols for the infrastructure used by authenticated key exchange (AKE). The construction is based on elliptic curves (EC) without pairing, which means it can be easily supported by most industrial ...
Li Duan, Yong Li, Lijun Liao
doaj +1 more source
A survey of Fault Attacks in Pairing Based Cryptography [PDF]
Article published in the journal Cryptography and Communications http://link.springer.com/article/10.1007%2Fs12095-014-0114-5The latest implementations of pairings allow efficient schemes for Pairing Based Cryptography.
El Mrabet, Nadia +3 more
core +6 more sources
An identity-based key infrastructure suitable for messaging applications [PDF]
—Identity-based encryption (IBE) systems are relatively recently proposed; yet they are highly popular for messaging applications since they offer new features such as certificateless infrastructure and anonymous communication. In this paper, we intended
Karatop, Ayse Gul +3 more
core +2 more sources
In dieser Masterarbeit untersuchen wir Pairings auf elliptischen Kurven, deren Anwendung in der Kryptographie und deren Berechnung. Pairings sind bestimmte bilineare Funktionen zwischen Gruppen, wobei wir solche Abbildungen insbesondere für die Gruppe der Punkte elliptischer Kurven finden können. Beide diese Begriffe werden in dieser Arbeit eingeführt.
openaire +2 more sources
Bilinear cryptography using Lie algebras from p-groups [PDF]
Pairings are particular bilinear maps, and they have been defined based on elliptic curves whichare abelian groups. In cryptography and security problems use these pairings. Mrabet et al. proposedpairings from a tensor product of groups in 2013.
Elaheh Khamseh
doaj +1 more source
A versatile Montgomery multiplier architecture with characteristic three support [PDF]
We present a novel unified core design which is extended to realize Montgomery multiplication in the fields GF(2n), GF(3m), and GF(p). Our unified design supports RSA and elliptic curve schemes, as well as the identity-based encryption which requires a ...
Ozturk, Erdinc +4 more
core +2 more sources
Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography [PDF]
Article published in the proceedings of the C2SI conference, May 2015.Pairings are mathematical tools that have been proven to be very useful in the construction of many cryptographic protocols.
El Mrabet, Nadia, Fouotsa, Emmanuel
core +3 more sources
Cryptographic Energy Costs are Assumable in Ad Hoc Networks [PDF]
Performance of symmetric and asymmetric cryptography algorithms in small devices is presented. Both temporal and energy costs are measured and compared with the basic functional costs of a device. We demonstrate that cryptographic power costs are not
Herrera Joancomartí, Jordi +1 more
core +1 more source

