A review of techniques for implementing elliptic curve point multiplication on hardware

A Verri Lucca, GA Mariano Sborz… - Journal of Sensor and …, 2020 - mdpi.com
Cryptography is considered indispensable among security measures applied to data
concerning insecure means of transmission. Among various existent algorithms on …

A practical evaluation of a high-security energy-efficient gateway for IoT fog computing applications

M Suárez-Albela, TM Fernández-Caramés… - Sensors, 2017 - mdpi.com
Fog computing extends cloud computing to the edge of a network enabling new Internet of
Things (IoT) applications and services, which may involve critical data that require privacy …

[PDF][PDF] Data Mining with Privacy Protection Using Precise Elliptical Curve Cryptography.

B Murugeshwari, D Selvaraj… - … Automation & Soft …, 2023 - cdn.techscience.cn
Protecting the privacy of data in the multi-cloud is a crucial task. Data mining is a technique
that protects the privacy of individual data while mining those data. The most significant task …

A secure and improved two factor authentication scheme using elliptic curve and bilinear pairing for cyber physical systems

A Sengupta, A Singh, P Kumar, T Dhar - Multimedia Tools and …, 2022 - Springer
In order to equip the technical fraternity with smart technologies, the past few years have
witnessed increasing usage of Cyber-Physical Systems (CPS) in different critical …

Message mapping and reverse mapping in elliptic curve cryptosystem

A Sengupta, UK Ray - Security and Communication Networks, 2016 - Wiley Online Library
Elliptic curve cryptography is used as a public‐key cryptosystem for encryption and
decryption in such a way that if one has to encrypt a message, then they attempt to map the …

A parallel elliptic curve crypto-processor architecture with reduced clock cycle for FPGA platforms

M Kalaiarasi, VR Venkatasubramani… - The Journal of …, 2022 - Springer
The Elliptic curve cryptosystem is a public-key cryptosystem that receives more focus in
recent years due to its higher security with smaller key size when compared to RSA …

A novel framework using elliptic curve cryptography for extremely secure transmission in distributed privacy preserving data mining

P Kiran, SS Kumar, NP Kavya - arXiv preprint arXiv:1204.2610, 2012 - arxiv.org
Privacy Preserving Data Mining is a method which ensures privacy of individual information
during mining. Most important task involves retrieving information from multiple data bases …

An Innovative Way to Increase the Speed and Efficiency of Reverse Mapping of Elliptic Curve Points

RS Ray, D Das, A Sengupta, P Kumar… - … on Emerging Smart …, 2024 - ieeexplore.ieee.org
Elliptic curve cryptography is a widely recognized method of using a public key cryptosystem
for encrypting and decrypting data. The message must be transformed to points on an …

Securing number plates based on digital signatures and RFID

AJ Hoffman, DJS Geldenhuys… - 16th International IEEE …, 2013 - ieeexplore.ieee.org
The automated detection of vehicles forms an important part of Intelligent Transportation
Systems. The vehicle number plate is the primary token used for the identification of the …

Definition and implementation of an elliptic curve cryptosystem using a new message mapping scheme

L Younes, A Youssef, L Saiida - … of the 3rd International Conference on …, 2020 - dl.acm.org
Elliptic curve cryptography (ECC) is strongly requested for encryption and decryption
processes since its guarantees high level of data security, insured by small key sizes that …