A review of techniques for implementing elliptic curve point multiplication on hardware
A Verri Lucca, GA Mariano Sborz… - Journal of Sensor and …, 2020 - mdpi.com
Cryptography is considered indispensable among security measures applied to data
concerning insecure means of transmission. Among various existent algorithms on …
concerning insecure means of transmission. Among various existent algorithms on …
A practical evaluation of a high-security energy-efficient gateway for IoT fog computing applications
M Suárez-Albela, TM Fernández-Caramés… - Sensors, 2017 - mdpi.com
Fog computing extends cloud computing to the edge of a network enabling new Internet of
Things (IoT) applications and services, which may involve critical data that require privacy …
Things (IoT) applications and services, which may involve critical data that require privacy …
[PDF][PDF] Data Mining with Privacy Protection Using Precise Elliptical Curve Cryptography.
B Murugeshwari, D Selvaraj… - … Automation & Soft …, 2023 - cdn.techscience.cn
Protecting the privacy of data in the multi-cloud is a crucial task. Data mining is a technique
that protects the privacy of individual data while mining those data. The most significant task …
that protects the privacy of individual data while mining those data. The most significant task …
A secure and improved two factor authentication scheme using elliptic curve and bilinear pairing for cyber physical systems
In order to equip the technical fraternity with smart technologies, the past few years have
witnessed increasing usage of Cyber-Physical Systems (CPS) in different critical …
witnessed increasing usage of Cyber-Physical Systems (CPS) in different critical …
Message mapping and reverse mapping in elliptic curve cryptosystem
A Sengupta, UK Ray - Security and Communication Networks, 2016 - Wiley Online Library
Elliptic curve cryptography is used as a public‐key cryptosystem for encryption and
decryption in such a way that if one has to encrypt a message, then they attempt to map the …
decryption in such a way that if one has to encrypt a message, then they attempt to map the …
A parallel elliptic curve crypto-processor architecture with reduced clock cycle for FPGA platforms
M Kalaiarasi, VR Venkatasubramani… - The Journal of …, 2022 - Springer
The Elliptic curve cryptosystem is a public-key cryptosystem that receives more focus in
recent years due to its higher security with smaller key size when compared to RSA …
recent years due to its higher security with smaller key size when compared to RSA …
A novel framework using elliptic curve cryptography for extremely secure transmission in distributed privacy preserving data mining
Privacy Preserving Data Mining is a method which ensures privacy of individual information
during mining. Most important task involves retrieving information from multiple data bases …
during mining. Most important task involves retrieving information from multiple data bases …
An Innovative Way to Increase the Speed and Efficiency of Reverse Mapping of Elliptic Curve Points
Elliptic curve cryptography is a widely recognized method of using a public key cryptosystem
for encrypting and decrypting data. The message must be transformed to points on an …
for encrypting and decrypting data. The message must be transformed to points on an …
Securing number plates based on digital signatures and RFID
AJ Hoffman, DJS Geldenhuys… - 16th International IEEE …, 2013 - ieeexplore.ieee.org
The automated detection of vehicles forms an important part of Intelligent Transportation
Systems. The vehicle number plate is the primary token used for the identification of the …
Systems. The vehicle number plate is the primary token used for the identification of the …
Definition and implementation of an elliptic curve cryptosystem using a new message mapping scheme
L Younes, A Youssef, L Saiida - … of the 3rd International Conference on …, 2020 - dl.acm.org
Elliptic curve cryptography (ECC) is strongly requested for encryption and decryption
processes since its guarantees high level of data security, insured by small key sizes that …
processes since its guarantees high level of data security, insured by small key sizes that …