Results 31 to 40 of about 12,967 (325)

A STUDY OF BILINEAR MAPS IN WIRELESS SENSOR NETWORKS

open access: yesICTACT Journal on Communication Technology, 2017
In the past, a large part of security requirements of wireless sensor networks (WSN) were fulfilled by symmetric cryptography systems. But, today by introduction of new needs in these networks and their security development, researchers of security and ...
Reza Alimoradi   +2 more
doaj   +1 more source

PRESTvO: PRivacy Enabled Smartphone Based Access to Vehicle On-Board Units

open access: yesIEEE Access, 2020
Smartphones are quickly moving toward complementing or even replacing traditional car keys. We advocate a role-based access control policy mixed with attributes that facilitates access to various functionalities of vehicular on-board units from ...
Bogdan Groza   +4 more
doaj   +1 more source

Practical Certificate-Less Infrastructure with Application in TLS

open access: yesCryptography, 2023
We propose highly efficient certificate-less (CL) protocols for the infrastructure used by authenticated key exchange (AKE). The construction is based on elliptic curves (EC) without pairing, which means it can be easily supported by most industrial ...
Li Duan, Yong Li, Lijun Liao
doaj   +1 more source

A survey of Fault Attacks in Pairing Based Cryptography [PDF]

open access: yes, 2014
Article published in the journal Cryptography and Communications http://link.springer.com/article/10.1007%2Fs12095-014-0114-5The latest implementations of pairings allow efficient schemes for Pairing Based Cryptography.
El Mrabet, Nadia   +3 more
core   +6 more sources

An identity-based key infrastructure suitable for messaging applications [PDF]

open access: yes, 2007
—Identity-based encryption (IBE) systems are relatively recently proposed; yet they are highly popular for messaging applications since they offer new features such as certificateless infrastructure and anonymous communication. In this paper, we intended
Karatop, Ayse Gul   +3 more
core   +2 more sources

Pairing Based Cryptography

open access: yes, 2022
In dieser Masterarbeit untersuchen wir Pairings auf elliptischen Kurven, deren Anwendung in der Kryptographie und deren Berechnung. Pairings sind bestimmte bilineare Funktionen zwischen Gruppen, wobei wir solche Abbildungen insbesondere für die Gruppe der Punkte elliptischer Kurven finden können. Beide diese Begriffe werden in dieser Arbeit eingeführt.
openaire   +2 more sources

Bilinear cryptography using Lie algebras from p-groups [PDF]

open access: yesMathematics and Computational Sciences, 2021
Pairings are particular bilinear maps, and they have been defined based on elliptic curves whichare abelian groups. In cryptography and security problems use these pairings. Mrabet et al. proposedpairings from a tensor product of groups in 2013.
Elaheh Khamseh
doaj   +1 more source

A versatile Montgomery multiplier architecture with characteristic three support [PDF]

open access: yes, 2008
We present a novel unified core design which is extended to realize Montgomery multiplication in the fields GF(2n), GF(3m), and GF(p). Our unified design supports RSA and elliptic curve schemes, as well as the identity-based encryption which requires a ...
Ozturk, Erdinc   +4 more
core   +2 more sources

Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography [PDF]

open access: yes, 2015
Article published in the proceedings of the C2SI conference, May 2015.Pairings are mathematical tools that have been proven to be very useful in the construction of many cryptographic protocols.
El Mrabet, Nadia, Fouotsa, Emmanuel
core   +3 more sources

Cryptographic Energy Costs are Assumable in Ad Hoc Networks [PDF]

open access: yes, 2009
Performance of symmetric and asymmetric cryptography algorithms in small devices is presented. Both temporal and energy costs are measured and compared with the basic functional costs of a device. We demonstrate that cryptographic power costs are not
Herrera Joancomartí, Jordi   +1 more
core   +1 more source

Home - About - Disclaimer - Privacy