-
281
Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols
Published 2022“…<jats:p>Public key cryptography protocols, such as RSA and elliptic curve cryptography, will be rendered insecure by Shor’s algorithm when large-scale quantum computers are built. …”
Get full text
Article -
282
CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives
Published 2023“…The overall prototype is quite practical, e.g. producing new fastest-known implementations of finite-field arithmetic for both Curve25519 (part of the TLS standard) and the Bitcoin elliptic curve secp256k1 for the Intel 12��ℎ and 13��ℎ generations.…”
Get full text
Article -
283
-
284
A secure blockchain-based authentication and key agreement scheme for 3GPP 5G networks
Published 2022“…Linkability attacks are also prevented by deprecating the sequence number with Elliptic Curve Diffie-Hellman (ECDH). We use Burrows-Abadi-Needham (BAN) logic and the Scyther tool to formally verify our protocol. …”
Get full text
Journal Article -
285
A new technical framework for security, trust and privacy (STP) of RFID system / Mohd Faizal Mubarak
Published 2015“…The framework offers enhanced unified STP features in RFID system advanced techniques such as encrypted-based attestation, integrity verification techniques with respect to protect user privacy, utilization of Trusted Platform Module (TPM), a tamper proof hardware to provide integrity verification for RFID system and utilization of MJS-Watcher as runtime integrity-checker, elliptic curve cryptography (ECC) for security protection and anonymizer for privacy-preserving protection. …”
Get full text
Thesis -
286
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANET
Published 2022“…The hybrid cryptography module contains Advanced Encryption Standard (AES) and Elliptic Curve Cryptosystems (ECC) algorithms. It attempts to improve the security and privacy of the network. …”
Get full text
Article -
287
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANETs
Published 2023“…The hybrid cryptography module contains Advanced Encryption Standard (AES) and Elliptic Curve Cryptosystems (ECC) algorithms. It attempts to improve the security and privacy of the network. …”
Get full text
Article -
288
Research on Bitcoin design and explore Bitcoin mining techniques
Published 2015“…Digital keys stored within a client wallet, specifically public and private key pairs, were generated using the Elliptic Curve Cryptography algorithm. The secp256k1 curve was chosen for its special property of non-randomness, which allows more efficient computation as compared to curves with random structure [1]. …”
Get full text
Final Year Project (FYP) -
289
The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios
Published 2022“…The test findings prove that the decentralized authentication platform-based blockchain-based IoT (BIoT) device-to-device architecture has a significantly higher throughput than the gateway-based architecture. To encrypt the elliptical curve cryptographic (ECC) and to generate keys, the Chinese remainder theorem (CRT)-based scheme is proposed and compared with the secure hash algorithm (SHA-256). …”
Get full text
Get full text
Article -
290
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…This random pixel se- lection is achieved via the use of an Elliptic Curve equation. In terms of security, the proposed solution is studied against brute-force attacks and the analysis shows that the new algorithm can withstand this type of attack with an ample amount of hiding possibilities that make the process of retrieving the message extremely diffi- cult. …”
Get full text
Thesis -
291
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancingm Efficiency and Security of VANET
Published 2022“…The hybrid cryptography module contains Advanced Encryption Standard (AES) and Elliptic Curve Cryptosystems (ECC) algorithms. It attempts to improve the security and privacy of the network. …”
Get full text
Article -
292
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANETs
Published 2022“…The hybrid cryptography module contains Advanced Encryption Standard (AES) and Elliptic Curve Cryptosystems (ECC) algorithms. It attempts to improve the security and privacy of the network. …”
Get full text
Article -
293
Hardware and protocols for authentication and secure computation
Published 2018Get full text
Thesis