Articles with "elliptic curve" as a keyword



Photo by nathananderson from unsplash

Fast elliptic curve point multiplication based on binary and binary non-adjacent scalar form methods

Sign Up to like & get
recommendations!
Published in 2018 at "Advances in Computational Mathematics"

DOI: 10.1007/s10444-017-9581-5

Abstract: This article presents two methods for developing algorithms of computing scalar multiplication in groups of points on an elliptic curve over finite fields. Two new effective algorithms have been presented: one of them is based… read more here.

Keywords: elliptic curve; multiplication; binary non; non adjacent ... See more keywords
Photo by krakenimages from unsplash

Secure and Efficient Secret Sharing Scheme with General Access Structures Based on Elliptic Curve and Pairing

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-016-3619-8

Abstract: Secret sharing techniques allow a secret to be shared among n participants in such a way that a specified subset of participant can reconstruct the secret by combining their shares. Secret sharing techniques are now… read more here.

Keywords: secret sharing; scheme; sharing scheme; elliptic curve ... See more keywords
Photo by nathananderson from unsplash

Cryptanalysis of multimedia encryption using elliptic curve cryptography

Sign Up to like & get
recommendations!
Published in 2018 at "Optik"

DOI: 10.1016/j.ijleo.2018.04.068

Abstract: Abstract The encryption scheme proposed by Tawalbeh et al. [1] is based on elliptic curve cryptography (ECC). ECC depends on the difficulty to solve the elliptic curve discrete logarithmic problem. However we found that the… read more here.

Keywords: curve cryptography; encryption; using elliptic; curve ... See more keywords
Photo by nathananderson from unsplash

H3-hybrid multilayered hyper chaotic hyper elliptic curve based image encryption system

Sign Up to like & get
recommendations!
Published in 2020 at "Optics and Laser Technology"

DOI: 10.1016/j.optlastec.2020.106173

Abstract: Abstract Excessive need for digitized images in all domains have necessitated the need for protecting the images against adversaries for secured transmission in the network. Sensitive images processed in medical, crime investigations are presumed to… read more here.

Keywords: elliptic curve; hyper chaotic; encryption; hyper elliptic ... See more keywords
Photo by nathananderson from unsplash

An Efficient Signature Scheme From Supersingular Elliptic Curve Isogenies

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2938682

Abstract: Since supersingular elliptic curve isogenies are one of the several candidate sources of hardness for building post-quantum cryptographic primitives, the research of efficient signature schemes based on them is still a hot topic. In this… read more here.

Keywords: supersingular elliptic; scheme; elliptic curve; signature ... See more keywords
Photo by georgie_cobbs from unsplash

An Efficient Double Parameter Elliptic Curve Digital Signature Algorithm for Blockchain

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3082704

Abstract: The classic Elliptic curve digital Signature Algorithm (ECDSA) uses one inversion operation in the process of signature and verification, which greatly reduces the efficiency of digital signatures. Up to now, most research schemes improve efficiency… read more here.

Keywords: curve digital; signature algorithm; elliptic curve; signature ... See more keywords
Photo by nathananderson from unsplash

A Secure and Privacy Preserved Parking Recommender System Using Elliptic Curve c Cryptography and Local Differential Privacy

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3175829

Abstract: The privacy preservation has received considerable attention from organizations as the growing population is apprehensive regarding personal data being preserved.There are several privacy and security issues in existing systems, such as identity and location disclosure,… read more here.

Keywords: system; elliptic curve; curve cryptography; parking recommender ... See more keywords
Photo by nathananderson from unsplash

An Efficient Authenticated Elliptic Curve Cryptography Scheme for Multicore Wireless Sensor Networks

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2022.3233632

Abstract: The need to ensure the longevity of Wireless Sensor Networks (WSNs) and secure their communication has spurred various researchers to come up with various WSN models. Prime among the methods for extending the life span… read more here.

Keywords: elliptic curve; wireless sensor; curve; security ... See more keywords
Photo by nathananderson from unsplash

Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3121350

Abstract: The security and privacy of the network in Internet of Things (IoT) systems are becoming more critical as we are more dependent on smart systems. Considering that packets are exchanged between the end user and… read more here.

Keywords: authentication; elliptic curve; curve cryptography; test ... See more keywords
Photo by hudsoncrafted from unsplash

A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2018.2876226

Abstract: Cyber-physical systems (CPSs) have attracted the attention of researchers from all disciplines. In such systems, physical devices collect data, interact with Internet, and send the gathered data to serve people. As one important part of… read more here.

Keywords: curve cryptography; elliptic curve; key agreement; smart grid ... See more keywords
Photo from wikipedia

A Dual-Core High-Performance Processor for Elliptic Curve Cryptography in GF(p) Over Generic Weierstrass Curves

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Circuits and Systems II: Express Briefs"

DOI: 10.1109/tcsii.2022.3194019

Abstract: A dual-core high-performance processor for Elliptic Curve Cryptography (ECC) in GF( ${p}$ ) over Generic Weierstrass Curves was presented in this brief. Firstly, an optimized radix-128 Montgomery modular multiplication algorithm was proposed. It takes 6… read more here.

Keywords: elliptic curve; core high; curve; high performance ... See more keywords