![](images/graphics/blank.gif)
Elliptic curves
-
In this paper, we propose a geographically lightweight secure routing protocol (LS-TPGF) in a wireless multimedia sensor network (WMSN) using Cyclic Redundancy Check (CRC) and Elliptic Curve Cryptography (ECC) for node and message authentication.
10p
vithomson
02-07-2024
0
0
Download
-
In this paper, the authors propose a solution to improve the security of the digital signature scheme, this solution is implemented on two levels of digital signature scheme construction.
8p
viambani
18-06-2024
3
1
Download
-
Ebook Advances in elliptic curve cryptography presents the following content: Chapter I: elliptic curve based protocols, chapter II: on the provable security of ECDSA, chapter III: proofs of security for ECIES, chapter IV: side-channel analysis, chapter V: defences against side-channel analysis, chapter VI: advances in point counting, chapter VII: hyperelliptic curves and the HCDLP, chapter VIII: weil descent attacks, chapter IX: pairings, chapter X: cryptography from pairings.
299p
zizaybay1103
29-05-2024
4
2
Download
-
Ebook Fundamentals of cryptology: A professional reference & interactive tutorial presents the following content: Chapter 1 introduction, chapter 2 classical cryptosystems, chapter 3 shift register sequences, chapter 4 block ciphers, chapter 5 shannon theory, chapter 6 data compression techniques, chapter 7 public-key cryptography, chapter 8 discrete logarithm based systems, chapter 9 RSA based systems, chapter 10 elliptic curves based systems, chapter 11 coding theory based systems, chapter 12 knapsack based systems.
508p
zizaybay1103
29-05-2024
5
2
Download
-
This book is intended as a guide for security professionals, developers, and those interested in learning how elliptic curve cryptography can be deployed to secure applications. The presentation is targeted to a diverse audience, and generally assumes no more than an undergraduate degree in computer science, engineering, or mathematics. The book was not written for theoreticians as is evident from the lack of proofs for mathematical statements.
332p
zizaybay1103
29-05-2024
3
2
Download
-
Part 2 of ebook "Software engineering, artificial intelligence, networking and parallel/distributed computing 2011" includes the following main contents: comparison of region based and weighted principal component analysis and locally salient ICA in terms of facial expression recognition; web health portal to enhance patient safety in Australian healthcare systems; peer-based complex profile management; detecting unwanted email using VAT; improving smart card security using elliptic curve cryptography over prime field (Fp);...
101p
khuynhlinhnguyet1009
05-04-2024
2
1
Download
-
In this paper, the authors propose a solution to improve the secure of digital signature schemes, this solution is implemented on two levels of digital signature scheme construction. At the second level, the authors propose a method to construct new digital signature algorithms based on this hard problem.
10p
vigojek
02-02-2024
0
0
Download
-
This paper presents a lightweight digital signature-based routing message and node authentication solution for wireless multimedia sensor networks (WMSNs). The lightweight geographical security routing protocol (ECDSA-TPGF) is proposed on the basis of improving the original two-phase greedy geographical forwarding protocol (TPGF), in which we have added the solution Elliptic curve cryptography (ECC) and cyclic redundancy check (CRC) to create a digital signature for a sensor node attached to a routing message.
8p
vimarillynhewson
02-01-2024
6
3
Download
-
Ebook Computer security and cryptography part 2 includes contents: Chapter 9 block-ciphers: lucifer, DES, and AES; chapter 10 the paradigm of public key cryptography; chapter 11 the knapsack cryptosystem; chapter 12 the rsa cryptosystem; chapter 13 prime numbers and factorization; chapter 14 the discrete logarithm problem; chapter 15 elliptic curve cryptography; chapter 16 key exchange in a network; chapter 17 digital signatures and authentication; chapter 18 applications of cryptography; chapter 19 cryptographic patents.
239p
haojiubujain06
05-09-2023
8
3
Download
-
Ebook Web services security and e-business: Part 2 includes contents: Chapter X Verifiable encryption of digital signatures using elliptic curve digital signature algorithm and its implementation issues; Chapter XI An introductory study on business intelligence security; Chapter XII Secure trust transfer using chain signatures; Chapter XIII Distributed intrusion detection systems: An overview;…
210p
haojiubujain06
06-09-2023
10
3
Download
-
Ebook Wireless network security: Part 1 includes contents: Chapter 1: High performance elliptic curve cryptographic co-processor; Chapter 2: An adaptive encryption protocol in mobile computing; Chapter 3: Pre-authentication and authentication models in ad hoc networks; Chapter 4: Promoting identity-based key management in wireless ad hoc networks; Chapter 5: A survey of attacks and countermeasures in mobile ad hoc networks; Chapter 6: Secure routing in wireless ad-hoc networks; Chapter 7: A survey on intrusion detection in mobile ad hoc networks.
186p
haojiubujain06
06-09-2023
16
3
Download
-
Ebook Information security management handbook: Part 2 includes the following content: Chapter 15: Application Whitelisting; Chapter 16: Design of Information Security for Large System Development Projects; Chapter 17: Building Application Security Testing into the Software Development Life Cycle; Chapter 18: Twenty-Five (or Forty) Years of Malware History; Chapter 19: Format Preserving Encryption; Chapter 20: Elliptic Curve Cryptosystems; Chapter 21: Pirating the Ultimate Killer App: Hacking Military Unmanned Aerial Vehicles; Chapter 22: Service-Oriented Architecture; Chapter 23: Cloud Sec...
287p
haojiubujain01
24-06-2023
6
5
Download
-
Handbook of elliptic and hyperelliptic curve cryptography: Part 1 presents the following content: Chapter 1 introduction to public-key cryptography, chapter 2 algebraic background, chapter 3 background on p-adic numbers, chapter 4 background on curves and jacobians, chapter 5 varieties over special fields, chapter 6 background on pairings, chapter 7 background on weil descent, chapter 8 cohomological backgroundon point counting, chapter 9 exponentiation, chapter 10 integer arithmetic, chapter 11 finite field arithmetic, chapter 12 arithmetic of p-adic numbers, chapter 13 arithmetic of ellip...
423p
runthenight08
12-04-2023
8
5
Download
-
Handbook of elliptic and hyperelliptic curve cryptography: Part 2 presents the following content: Chapter 16 implementation of pairings, chapter 17 point counting on elliptic and hyperelliptic curves, chapter 18 complex multiplication, chapter 19 generic algorithms for computing discrete logarithms, chapter 20 index calculus, chapter 21 index calculus for hyperelliptic curves, chapter 22 transfer of discrete logarithms, chapter 23 algebraic realizations of DL systems, chapter 24 pairing-based cryptography, chapter 25 compositeness and primality testing factoring, chapter 26 fast arithmetic ...
420p
runthenight08
12-04-2023
15
5
Download
-
Schnorr signature schemas and the version on its elliptic curve (EC-Schnorr) are signature schemas that are not only highly secure but are also rated as having the highest performance among signature schemas based on discrete logarithm problems (on the Fp finite field and on the elliptic curve).
16p
viargus
20-02-2023
5
1
Download
-
One option for a digital signature solution for devices with low memory and low bandwidth transmission over channels uses a short digital signature scheme based on Weil bilinear pairing aimed at short processing times, fast computation, and convenient deployment on applications.
7p
vimalfoy
08-02-2023
5
2
Download
-
The article proposes a method for constructing public-key block cipher schemes based on the difficulty of the discrete logarithm problem on elliptic curves. The schemas are construc according to the proposed method and can simultaneously perform security functions and authenticate the origin and integrity of the encrypted message.
8p
visirius
19-01-2023
7
2
Download
-
Bài viết "Phương pháp tấn công phân tích năng lượng đơn giản lên hệ mật dựa trên đường cong elliptich" trình bày kết quả thực hiện tấn công SPA lên phép nhân điểm phương pháp nhị phân của mật mã đường cong Elliptic (Elliptic Curve Cryptography – ECC). Tấn công được thực hiện thông qua việc phân tích và nhận dạng các phép tính cơ bản khi thuật toán thực thi trên phần cứng.
6p
hoabingan205
08-12-2022
15
5
Download
-
Xây dựng hệ mật mã đường cong Elliptic với khóa đối xứng Affine để mã hóa giải mã văn bản tiếng Việt
Mật mã đường cong Elliptic là một hướng trong mật mã nguyên thủy hạng nhẹ. Bài báo này dựa trên ý tưởng khóa đối xứng của mật mã Affine, hệ mật đường cong Elliptic (ECC- Elliptic Curve Cryptography). Số học đường cong Elliptic có thể được sử dụng để phát triển các sơ đồ mã hóa đường cong Elliptic bao gồm trao đổi khóa, mã hóa và chữ ký số.
9p
vijihyo2711
25-09-2021
34
2
Download
-
"Handbook of Elliptic and hyperelliptic curve cryptography" present introduction to public-key cryptography; mathematical background; algebraic background; background on p-adic numbers; background on curves and jacobians; varieties over special fields; background on pairings; background on weil descent; cohomological background on point counting...
843p
haphuonglan2021
25-04-2021
59
36
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)