Sign Up to like & get
recommendations!
0
Published in 2018 at "Advances in Computational Mathematics"
DOI: 10.1007/s10444-017-9581-5
Abstract: This article presents two methods for developing algorithms of computing scalar multiplication in groups of points on an elliptic curve over finite fields. Two new effective algorithms have been presented: one of them is based…
read more here.
Keywords:
elliptic curve;
multiplication;
binary non;
non adjacent ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "Wireless Personal Communications"
DOI: 10.1007/s11277-016-3619-8
Abstract: Secret sharing techniques allow a secret to be shared among n participants in such a way that a specified subset of participant can reconstruct the secret by combining their shares. Secret sharing techniques are now…
read more here.
Keywords:
secret sharing;
scheme;
sharing scheme;
elliptic curve ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "Optik"
DOI: 10.1016/j.ijleo.2018.04.068
Abstract: Abstract The encryption scheme proposed by Tawalbeh et al. [1] is based on elliptic curve cryptography (ECC). ECC depends on the difficulty to solve the elliptic curve discrete logarithmic problem. However we found that the…
read more here.
Keywords:
curve cryptography;
encryption;
using elliptic;
curve ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "Optics and Laser Technology"
DOI: 10.1016/j.optlastec.2020.106173
Abstract: Abstract Excessive need for digitized images in all domains have necessitated the need for protecting the images against adversaries for secured transmission in the network. Sensitive images processed in medical, crime investigations are presumed to…
read more here.
Keywords:
elliptic curve;
hyper chaotic;
encryption;
hyper elliptic ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2938682
Abstract: Since supersingular elliptic curve isogenies are one of the several candidate sources of hardness for building post-quantum cryptographic primitives, the research of efficient signature schemes based on them is still a hot topic. In this…
read more here.
Keywords:
supersingular elliptic;
scheme;
elliptic curve;
signature ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3082704
Abstract: The classic Elliptic curve digital Signature Algorithm (ECDSA) uses one inversion operation in the process of signature and verification, which greatly reduces the efficiency of digital signatures. Up to now, most research schemes improve efficiency…
read more here.
Keywords:
curve digital;
signature algorithm;
elliptic curve;
signature ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3175829
Abstract: The privacy preservation has received considerable attention from organizations as the growing population is apprehensive regarding personal data being preserved.There are several privacy and security issues in existing systems, such as identity and location disclosure,…
read more here.
Keywords:
system;
elliptic curve;
curve cryptography;
parking recommender ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2022.3233632
Abstract: The need to ensure the longevity of Wireless Sensor Networks (WSNs) and secure their communication has spurred various researchers to come up with various WSN models. Prime among the methods for extending the life span…
read more here.
Keywords:
elliptic curve;
wireless sensor;
curve;
security ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2021.3121350
Abstract: The security and privacy of the network in Internet of Things (IoT) systems are becoming more critical as we are more dependent on smart systems. Considering that packets are exchanged between the end user and…
read more here.
Keywords:
authentication;
elliptic curve;
curve cryptography;
test ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Systems Journal"
DOI: 10.1109/jsyst.2018.2876226
Abstract: Cyber-physical systems (CPSs) have attracted the attention of researchers from all disciplines. In such systems, physical devices collect data, interact with Internet, and send the gathered data to serve people. As one important part of…
read more here.
Keywords:
curve cryptography;
elliptic curve;
key agreement;
smart grid ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Transactions on Circuits and Systems II: Express Briefs"
DOI: 10.1109/tcsii.2022.3194019
Abstract: A dual-core high-performance processor for Elliptic Curve Cryptography (ECC) in GF( ${p}$ ) over Generic Weierstrass Curves was presented in this brief. Firstly, an optimized radix-128 Montgomery modular multiplication algorithm was proposed. It takes 6…
read more here.
Keywords:
elliptic curve;
core high;
curve;
high performance ... See more keywords