-
1
Elliptic-Curve Cryptography Implementation on RISC-V Processors for Internet of Things Applications
Published 2024-01-01“…Elliptic-curve cryptography (ECC) is a popular technique of public-key cryptography used for secure communications in Internet of Things (IoT) applications. …”
Get full text
Article -
2
A high speed processor for elliptic curve cryptography over NIST prime field
Published 2022-07-01“…Abstract Elliptic curve cryptography (ECC), as one of the public key cryptography systems, has been widely applied to many security applications. …”
Get full text
Article -
3
-
4
ECC-Based Authentication Protocol for Military Internet of Drone (IoD): A Holistic Security Framework
Published 2025-01-01Subjects: Get full text
Article -
5
An Integrated Image Encryption Scheme Based on Elliptic Curve
Published 2023-01-01Subjects: Get full text
Article -
6
The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field
Published 2022-01-01Subjects: “…Elliptic curve cryptography…”
Get full text
Article -
7
Analysis of the Fault Attack ECDLP over Prime Field
Published 2011-01-01“…In 2000, Biehl et al. proposed a fault-based attack on elliptic curve cryptography. In this paper, we refined the fault attack method. …”
Get full text
Article -
8
Topological Indices of Total Graph and Zero Divisor Graph of Commutative Ring: A Polynomial Approach
Published 2023-01-01“…Graphs containing finite commutative rings have wide applications in robotics, information and communication theory, elliptic curve cryptography, physics, and statistics. In this article, the topological indices of the total graph Tℤnn∈ℤ+, the zero divisor graph Γℤrn (r is prime, n∈ℤ+), and the zero divisor graph Γℤr×ℤs×ℤt (r,s,t are primes) are computed using some algebraic polynomials.…”
Get full text
Article -
9
Breaking the Blockchain Trilemma: A Comprehensive Consensus Mechanism for Ensuring Security, Scalability, and Decentralization
Published 2024-01-01“…Employing established techniques such as elliptic curve cryptography, Schnorr verifiable random function, and zero-knowledge proof (zk-SNARK), alongside groundbreaking methodologies for stake distribution, anomaly detection, and incentive alignment, our framework sets a new benchmark for secure, scalable, and decentralized blockchain ecosystems. …”
Get full text
Article -
10
Adaptable Security in Wireless Sensor Networks by Using Reconfigurable ECC Hardware Coprocessors
Published 2010-10-01“…In order to avoid dependencies on a compromised level of security, a WSN node with a microcontroller and a Field Programmable Gate Array (FPGA) is used along this work to implement a state-of-the art solution based on ECC (Elliptic Curve Cryptography). In this paper it is described how the reconfiguration possibilities of the system can be used to adapt ECC parameters in order to increase or reduce the security level depending on the application scenario or the energy budget. …”
Get full text
Article