Showing 281 - 293 results of 293 for search '"elliptic curves"', query time: 0.06s Refine Results
  1. 281

    Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols by Banerjee, Utsav, Ukyab, Tenzin S, Chandrakasan, Anantha P

    Published 2022
    “…<jats:p>Public key cryptography protocols, such as RSA and elliptic curve cryptography, will be rendered insecure by Shor’s algorithm when large-scale quantum computers are built. …”
    Get full text
    Article
  2. 282

    CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives by Kuepper, Joel, Erbsen, Andres, Gross, Jason, Conoly, Owen, Sun, Chuyue, Tian, Samuel, Wu, David, Chlipala, Adam, Chuengsatiansup, Chitchanok, Genkin, Daniel, Wagner, Markus, Yarom, Yuval

    Published 2023
    “…The overall prototype is quite practical, e.g. producing new fastest-known implementations of finite-field arithmetic for both Curve25519 (part of the TLS standard) and the Bitcoin elliptic curve secp256k1 for the Intel 12&#55349;&#56417;&#8462; and 13&#55349;&#56417;&#8462; generations.…”
    Get full text
    Article
  3. 283
  4. 284

    A secure blockchain-based authentication and key agreement scheme for 3GPP 5G networks by Chow, Man Chun, Ma, Maode

    Published 2022
    “…Linkability attacks are also prevented by deprecating the sequence number with Elliptic Curve Diffie-Hellman (ECDH). We use Burrows-Abadi-Needham (BAN) logic and the Scyther tool to formally verify our protocol. …”
    Get full text
    Journal Article
  5. 285

    A new technical framework for security, trust and privacy (STP) of RFID system / Mohd Faizal Mubarak by Mubarak, Mohd Faizal

    Published 2015
    “…The framework offers enhanced unified STP features in RFID system advanced techniques such as encrypted-based attestation, integrity verification techniques with respect to protect user privacy, utilization of Trusted Platform Module (TPM), a tamper proof hardware to provide integrity verification for RFID system and utilization of MJS-Watcher as runtime integrity-checker, elliptic curve cryptography (ECC) for security protection and anonymizer for privacy-preserving protection. …”
    Get full text
    Thesis
  6. 286

    A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANET by JUBAIR, MOHAMMED AHMED, Mostafa, Salama A., ZEBARI, DILOVAN ASAAD, HARIZ, HUSSEIN MUHEE, ABDULSATTAR, NEJOOD FAISAL, HASSAN, MUSTAFA HAMID, ABBAS, ALI HASHIM, ABBAS, FATIMA HASHIM, ALASIRY, AREEJ, ALOUANE, M. TURKI-HADJ

    Published 2022
    “…The hybrid cryptography module contains Advanced Encryption Standard (AES) and Elliptic Curve Cryptosystems (ECC) algorithms. It attempts to improve the security and privacy of the network. …”
    Get full text
    Article
  7. 287

    A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANETs by JUBAIR, MOHAMMED AHMED, A. MOSTAFA, SALAMA, DZEBARI, DILOVAN ASAAD, MUHEE HARIZ, HUSSEIN, ABDULSATTAR, NEJOOD FAISAL, HASSAN, MUSTAFA HAMID, ABBAS, ALI HASHIM, HASHIM ABBAS, FATIMA, ALASIRY, AREEJ, ALOUANE, M. TURKI-HADJ

    Published 2023
    “…The hybrid cryptography module contains Advanced Encryption Standard (AES) and Elliptic Curve Cryptosystems (ECC) algorithms. It attempts to improve the security and privacy of the network. …”
    Get full text
    Article
  8. 288

    Research on Bitcoin design and explore Bitcoin mining techniques by Ang, Zheng Jie

    Published 2015
    “…Digital keys stored within a client wallet, specifically public and private key pairs, were generated using the Elliptic Curve Cryptography algorithm. The secp256k1 curve was chosen for its special property of non-randomness, which allows more efficient computation as compared to curves with random structure [1]. …”
    Get full text
    Final Year Project (FYP)
  9. 289

    The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios by Arun Rana, Sharad Sharma, Kashif Nisar, Ag. Asri Ag. Ibrahim, Sachin Dhawan, Bhawani Chowdhry, Samreen Hussain, Nitin Goyal

    Published 2022
    “…The test findings prove that the decentralized authentication platform-based blockchain-based IoT (BIoT) device-to-device architecture has a significantly higher throughput than the gateway-based architecture. To encrypt the elliptical curve cryptographic (ECC) and to generate keys, the Chinese remainder theorem (CRT)-based scheme is proposed and compared with the secure hash algorithm (SHA-256). …”
    Get full text
    Get full text
    Article
  10. 290

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…This random pixel se- lection is achieved via the use of an Elliptic Curve equation. In terms of security, the proposed solution is studied against brute-force attacks and the analysis shows that the new algorithm can withstand this type of attack with an ample amount of hiding possibilities that make the process of retrieving the message extremely diffi- cult. …”
    Get full text
    Thesis
  11. 291

    A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancingm Efficiency and Security of VANET by JUBAIR, MOHAMMED AHMED, MOSTAFA, SALAMA A., ASAAD ZEBARI, DILOVAN, MUHEE HARIZ, HUSSEIN MUHEE, ABDULSATTAR, NEJOOD FAISAL A, HAMID HASSAN, MUSTAFA, HASHIM ABBAS, ALI, HASHIM ABBAS, FATIMA, ALASIRY, AREEJ, ALOUANE, M. TURKI-HADJ

    Published 2022
    “…The hybrid cryptography module contains Advanced Encryption Standard (AES) and Elliptic Curve Cryptosystems (ECC) algorithms. It attempts to improve the security and privacy of the network. …”
    Get full text
    Article
  12. 292
  13. 293